Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    89s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2022, 23:19

General

  • Target

    a9503a3d998e705c37d3bec7fea0ff188bcf7e753833c8b4b195e590c4ed9625.exe

  • Size

    830KB

  • MD5

    a2086f41bc06adc69517bc0d9c07bf6e

  • SHA1

    1d30388c1235da56a2f17d645f0a66ead7b59159

  • SHA256

    a9503a3d998e705c37d3bec7fea0ff188bcf7e753833c8b4b195e590c4ed9625

  • SHA512

    10432474743e46dda5e9247aae8b8c7c474fd4a0521e30d5be09942f88c2cd6ce7bde89b7858dd9f28b63bb3b515817a4ca4a6f82c5998d5e482645bb8d6fc30

  • SSDEEP

    24576:qPCxmUtjDcK/IhU06NZim3gG8jq+wh+A:stUtfcANY/m

Malware Config

Extracted

Path

C:\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: 460c3c4c-c19d-4567-b16a-a28e49949214 @>B
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Black Basta payload 3 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9503a3d998e705c37d3bec7fea0ff188bcf7e753833c8b4b195e590c4ed9625.exe
    "C:\Users\Admin\AppData\Local\Temp\a9503a3d998e705c37d3bec7fea0ff188bcf7e753833c8b4b195e590c4ed9625.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Users\Admin\AppData\Local\Temp\a9503a3d998e705c37d3bec7fea0ff188bcf7e753833c8b4b195e590c4ed9625.exe
      OMC_BC
      2⤵
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Windows\system32\vssadmin.exe
          C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:4740
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
        3⤵
          PID:4164
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/724-134-0x00000000004F0000-0x000000000057E000-memory.dmp

      Filesize

      568KB

    • memory/724-140-0x00000000004F0000-0x000000000057E000-memory.dmp

      Filesize

      568KB

    • memory/724-142-0x0000000000400000-0x00000000004EC000-memory.dmp

      Filesize

      944KB

    • memory/724-145-0x00000000004F0000-0x000000000057E000-memory.dmp

      Filesize

      568KB

    • memory/4180-132-0x0000000000400000-0x00000000004EC000-memory.dmp

      Filesize

      944KB

    • memory/4180-136-0x0000000000400000-0x00000000004EC000-memory.dmp

      Filesize

      944KB