Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 06:31

General

  • Target

    1a8a283732f920d34233eac14ab03d681f3837b2e759df4ff1dd383249074e46.exe

  • Size

    461KB

  • MD5

    b1c520938a92644d0831b33df52d9e73

  • SHA1

    73d59c49596575a9bb08b87f28ebc7e7f8afec10

  • SHA256

    1a8a283732f920d34233eac14ab03d681f3837b2e759df4ff1dd383249074e46

  • SHA512

    5b513d9701cb6441a0fb33858dd616f10fe1332a2c70725ed1b568032428cbdffad2f2d8cb4dab0503f31dec7cb7d367ae98135c483e28037e66f97280dcd33f

  • SSDEEP

    12288:mXmpJhb0veHINIDfaQ/lHYkVeUlkIDXQxlPnpkcEgNa:m8JhCeHywhkOAxVn6cEh

Score
10/10

Malware Config

Extracted

Path

C:\odt\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: 533cd596-1fa4-477e-ae86-935498094e86
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a8a283732f920d34233eac14ab03d681f3837b2e759df4ff1dd383249074e46.exe
    "C:\Users\Admin\AppData\Local\Temp\1a8a283732f920d34233eac14ab03d681f3837b2e759df4ff1dd383249074e46.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3448
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
      2⤵
        PID:4308
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4072-132-0x0000000002DB0000-0x0000000002E18000-memory.dmp

      Filesize

      416KB

    • memory/4072-135-0x00000000000F0000-0x000000000017E000-memory.dmp

      Filesize

      568KB

    • memory/4072-137-0x00000000000F0000-0x000000000017E000-memory.dmp

      Filesize

      568KB