Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe
Resource
win10v2004-20221111-en
General
-
Target
09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe
-
Size
454KB
-
MD5
848c0e307336503fda4fd86bb89cc4fd
-
SHA1
92d43641583917e1f0dbb47569a0a4364f44d41d
-
SHA256
09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25
-
SHA512
f9c38f0627ad6250e45d08bbd65a5e58409aa26038409331f7b67a2bc40f0833554185202aa341f7ef8ca32bac88aa815d41cfbfe2071750ff77301feec299ed
-
SSDEEP
12288:rMiWg4KiCCBfILnvJ8KHJj8Zp3pWF/kP8P:AiWg4jCJbve0A3EJdP
Malware Config
Extracted
C:\odt\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe -
Drops file in Program Files directory 54 IoCs
description ioc Process File created C:\Program Files\Google\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Mozilla Firefox\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\ja-JP\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\PingPop.mpe 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\7-Zip\Lang\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\ApproveRestore.svg 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\LimitExit.ogg 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Common Files\DESIGNER\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\SubmitBackup.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Common Files\System\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\SelectStart.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\7-Zip\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Common Files\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\it-IT\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Reference Assemblies\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\HideGrant.xlsm 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Common Files\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Common Files\Services\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\MoveUnprotect.xml 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\SkipSuspend.wmv 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\es-ES\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\images\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Java\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Adobe\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\MergeSkip.ex_ 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\VideoLAN\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Common Files\microsoft shared\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\AddSkip.mpg 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\en-US\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\fr-FR\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Google\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Microsoft.NET\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Reference Assemblies\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\SaveEnable.mpp 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Microsoft Office\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Uninstall Information\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Microsoft\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\MSBuild\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\MSBuild\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\ShowCopy.mov 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\SIGNUP\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Google\Chrome\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\InvokeGrant.M2T 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\JoinGrant.eprtx 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\RequestDisable.dwg 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Microsoft Office 15\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\ConvertFromSuspend.mpg 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files (x86)\Internet Explorer\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File created C:\Program Files\Internet Explorer\de-DE\readme.txt 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe File opened for modification C:\Program Files\AssertSend.au3 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1604 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1196 vssvc.exe Token: SeRestorePrivilege 1196 vssvc.exe Token: SeAuditPrivilege 1196 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2152 wrote to memory of 3112 2152 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe 82 PID 2152 wrote to memory of 3112 2152 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe 82 PID 2152 wrote to memory of 3112 2152 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe 82 PID 3112 wrote to memory of 1604 3112 cmd.exe 84 PID 3112 wrote to memory of 1604 3112 cmd.exe 84 PID 2152 wrote to memory of 872 2152 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe 87 PID 2152 wrote to memory of 872 2152 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe 87 PID 2152 wrote to memory of 872 2152 09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe"C:\Users\Admin\AppData\Local\Temp\09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵PID:872
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196