Overview
overview
10Static
static
10084c57449c...0e.exe
windows7-x64
10084c57449c...0e.exe
windows10-2004-x64
1014b94844b9...c3.exe
windows7-x64
1014b94844b9...c3.exe
windows10-2004-x64
102daa514408...2e.exe
windows7-x64
102daa514408...2e.exe
windows10-2004-x64
102e6f094748...ec.exe
windows7-x64
2e6f094748...ec.exe
windows10-2004-x64
2e96b55980...ea.exe
windows7-x64
12e96b55980...ea.exe
windows10-2004-x64
134c392448f...ea.exe
windows7-x64
1034c392448f...ea.exe
windows10-2004-x64
1037d8add251...4c.exe
windows7-x64
1037d8add251...4c.exe
windows10-2004-x64
83a72653053...59.exe
windows7-x64
103a72653053...59.exe
windows10-2004-x64
1049aca08f5b...24.exe
windows7-x64
1049aca08f5b...24.exe
windows10-2004-x64
104a2ad49c93...9f.exe
windows7-x64
34a2ad49c93...9f.exe
windows10-2004-x64
35199b64b50...3c.exe
windows7-x64
5199b64b50...3c.exe
windows10-2004-x64
55c30024ae...15.exe
windows7-x64
1055c30024ae...15.exe
windows10-2004-x64
1056f7b48f38...59.exe
windows7-x64
1056f7b48f38...59.exe
windows10-2004-x64
105a96b92938...a4.exe
windows7-x64
105a96b92938...a4.exe
windows10-2004-x64
10606b88fce1...c4.exe
windows7-x64
1606b88fce1...c4.exe
windows10-2004-x64
36bda9faf71...4b.exe
windows7-x64
106bda9faf71...4b.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
2e6f094748124800d8cf6bdb28bb8aa4caa066923cf3e9778dae8bcb2b6e85ec.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
2e6f094748124800d8cf6bdb28bb8aa4caa066923cf3e9778dae8bcb2b6e85ec.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
2e96b55980a827011a7e0784ab95dcee53958a1bb19f5397080a434041bbeeea.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2e96b55980a827011a7e0784ab95dcee53958a1bb19f5397080a434041bbeeea.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win10v2004-20250314-en
General
-
Target
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
-
Size
80KB
-
MD5
e3269531cf93d040b08074bfb31b72a0
-
SHA1
45b6d89dcea02cc90ae054d72ec80a2eb1036a7e
-
SHA256
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859
-
SHA512
e4de5613557ff15f23e2c28763fee6443c81351401974389e1c01cb979efc81c0ff397b85ba3fc6f0204f7c5e0c7617617130d38b441748446e72a0fbb7a12b0
-
SSDEEP
1536:NE+VYVYMC2F7Aoter2j1lYgpM2HT02F4mHI5PsOqy:2+G3eaj0g+2HT025Hs
Malware Config
Extracted
C:\BNuuQUGu2.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV
Extracted
blackmatter
1.2
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Blackmatter family
-
Renames multiple (196) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\BNuuQUGu2.bmp" 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\BNuuQUGu2.bmp" 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
resource yara_rule behavioral15/memory/2176-0-0x0000000001120000-0x0000000001137000-memory.dmp upx behavioral15/memory/2176-245-0x0000000001120000-0x0000000001137000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\WallpaperStyle = "10" 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeDebugPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: 36 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeImpersonatePrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeIncBasePriorityPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeIncreaseQuotaPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: 33 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeManageVolumePrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeProfSingleProcessPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeRestorePrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeSecurityPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeSystemProfilePrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeTakeOwnershipPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeShutdownPrivilege 2176 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeBackupPrivilege 2800 vssvc.exe Token: SeRestorePrivilege 2800 vssvc.exe Token: SeAuditPrivilege 2800 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe"C:\Users\Admin\AppData\Local\Temp\3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f66968c47a64569e2281f65a95991be0
SHA1ef9e3e80bfbea4c3021b226cb8cd00687013b8a8
SHA2564b950c763006e7c4569df8742855cec31bf82f835bd7e2bdcb5f128db34c82bf
SHA512cb4ace1b3e891ab100b3950c6bc133b216e91c8978a3af1ffd75617b606bb7ceb0133f44d37a30a827655e5b84b016d736a732f5f37635bb727e1a5b722cad24
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc