Analysis
-
max time kernel
54s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
09-10-2022 17:10
Static task
static1
Behavioral task
behavioral1
Sample
9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe
Resource
win10v2004-20220812-en
General
-
Target
9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe
-
Size
542KB
-
MD5
c115bbbdb1a61f8c553d74802bfd78fb
-
SHA1
1f439569e3c1c14ea9f02235f8f45c49e2764160
-
SHA256
9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc
-
SHA512
6ad701415ce5e1f94144a979f7e347499ecd80e4de4705dbe9570ad53a90b58034ea98f2ec9d257a330ec47ffeacdbd420f581ad8a4d76b0c7ad4bb198b1ab84
-
SSDEEP
12288:trkm8R9qXgmj3d7khtgfpedbKbiTuDZWhswtik5j2w+f:2Ujt7+twpedbKb1dWhse9K
Malware Config
Extracted
C:\MSOCache\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll.sig 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\CopyCompare.ADT 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Java\jdk1.7.0_80\db\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\README.html 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Microsoft Office\Office14\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\COPYRIGHT 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-environment-l1-1-0.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\qipcap64.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files (x86)\Internet Explorer\pdmproxy100.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Common Files\Microsoft Shared\VGX\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\7z.exe 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Microsoft Games\Purble Place\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\en-US\eula.rtf 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Microsoft Games\Multiplayer\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\en-US\jsprofilerui.dll.mui 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\F12.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Microsoft.NET\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieproxy.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\WMM2CLIP.dll.mui 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\7-Zip\Lang\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-conio-l1-1-0.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files (x86)\Microsoft Sync Framework\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\jsdebuggeride.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\Timeline_is.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Mozilla Firefox\mozglue.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\en-US\F12.dll.mui 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\en-US\F12Tools.dll.mui 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\History.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\Internet Explorer\DiagnosticsHub_is.dll 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File created C:\Program Files\Common Files\SpeechEngines\readme.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 688 vssadmin.exe 1516 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 332 vssvc.exe Token: SeRestorePrivilege 332 vssvc.exe Token: SeAuditPrivilege 332 vssvc.exe Token: 33 1140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1140 AUDIODG.EXE Token: 33 1140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1140 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 592 wrote to memory of 1392 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 28 PID 592 wrote to memory of 1392 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 28 PID 592 wrote to memory of 1392 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 28 PID 592 wrote to memory of 1392 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 28 PID 1392 wrote to memory of 688 1392 cmd.exe 30 PID 1392 wrote to memory of 688 1392 cmd.exe 30 PID 1392 wrote to memory of 688 1392 cmd.exe 30 PID 1392 wrote to memory of 688 1392 cmd.exe 30 PID 592 wrote to memory of 1996 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 35 PID 592 wrote to memory of 1996 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 35 PID 592 wrote to memory of 1996 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 35 PID 592 wrote to memory of 1996 592 9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe 35 PID 1996 wrote to memory of 1516 1996 cmd.exe 37 PID 1996 wrote to memory of 1516 1996 cmd.exe 37 PID 1996 wrote to memory of 1516 1996 cmd.exe 37 PID 1996 wrote to memory of 1516 1996 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe"C:\Users\Admin\AppData\Local\Temp\9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1516
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:332
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1604
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1140