Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 06:47

General

  • Target

    09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe

  • Size

    454KB

  • MD5

    848c0e307336503fda4fd86bb89cc4fd

  • SHA1

    92d43641583917e1f0dbb47569a0a4364f44d41d

  • SHA256

    09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25

  • SHA512

    f9c38f0627ad6250e45d08bbd65a5e58409aa26038409331f7b67a2bc40f0833554185202aa341f7ef8ca32bac88aa815d41cfbfe2071750ff77301feec299ed

  • SSDEEP

    12288:rMiWg4KiCCBfILnvJ8KHJj8Zp3pWF/kP8P:AiWg4jCJbve0A3EJdP

Score
10/10

Malware Config

Extracted

Path

C:\odt\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: aa6b49d0-713d-46fb-b7ac-fb5605e2ac0a
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 54 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe
    "C:\Users\Admin\AppData\Local\Temp\09bc7247b50a166996b667b9a6e696cfbafa203ffcbec46ad0cca27deacd5c25.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
      2⤵
        PID:872
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1196

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2152-134-0x0000000002B70000-0x0000000002BD8000-memory.dmp

      Filesize

      416KB

    • memory/2152-135-0x0000000000AE0000-0x0000000000B6E000-memory.dmp

      Filesize

      568KB