Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe
Resource
win10v2004-20220812-en
General
-
Target
653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe
-
Size
464KB
-
MD5
1c9880912a1c9229b4c3120dcbfd1322
-
SHA1
0ae047b7fe5d688638b9a33423c754c911d4dbe4
-
SHA256
653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33
-
SHA512
e7df5a6da7ff6d1878bd670e963d80cb060f1e6e5c8c729c0181f1f97ddd0293a0233886e7c8fd6275afc654b99642ba9d756303ebfdee153ba84c024b389fef
-
SSDEEP
6144:GeafQzobGtL9sNP3IlXt4HSS53/7krnpMIg3D/Io5hTvpKqXy2dlFGYOxEpXir7s:SfQ5tLcSf27FFDXRRdf0UPb
Malware Config
Extracted
C:\odt\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\io.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0409-1000-0000000FF1CE.xml 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\osclientcerts.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\microsoft shared\TextConv\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Internet Explorer\de-DE\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Java\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Google\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Google\Chrome\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\IA2Marshal.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\System\fr-FR\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\System\it-IT\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Microsoft Office\root\Office16\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\softokn3.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Google\Policies\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Microsoft Office\Updates\Download\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\ieinstal.exe.mui 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Common Files\System\fr-FR\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\SetDisable.pptx 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe.sig 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\release 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Common Files\System\de-DE\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavutil.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\ucrtbase.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\COPYRIGHT 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\LICENSE 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Internet Explorer\ja-JP\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\omni.ja 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Google\Chrome\Application\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files\Reference Assemblies\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-filesystem-l1-1-0.dll 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\readme.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AuthoredExtensions.16.xml 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5020 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2080 vssvc.exe Token: SeRestorePrivilege 2080 vssvc.exe Token: SeAuditPrivilege 2080 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 488 wrote to memory of 5044 488 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe 78 PID 488 wrote to memory of 5044 488 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe 78 PID 488 wrote to memory of 5044 488 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe 78 PID 5044 wrote to memory of 5020 5044 cmd.exe 80 PID 5044 wrote to memory of 5020 5044 cmd.exe 80 PID 488 wrote to memory of 2420 488 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe 83 PID 488 wrote to memory of 2420 488 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe 83 PID 488 wrote to memory of 2420 488 653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe"C:\Users\Admin\AppData\Local\Temp\653da5127b0ecbc5c373ce510c0d5191f61f2df912c9b6f4989aa3775933bc33.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵PID:2420
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2080