Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2023 12:29

General

  • Target

    21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe

  • Size

    7.0MB

  • MD5

    ed891e4fd173700fac93b3dda30517c9

  • SHA1

    e05e9cc2f28bcd17f5285a34db2894bad9ccd53a

  • SHA256

    21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda

  • SHA512

    58d3254bca944cb60450e3ac352a3674ca5a1dea1142112726349931cbed6428e5db03004480d218bf4c63ce6d9847e74dfe9f0da455c9587cf47c5a7089e7fc

  • SSDEEP

    98304:wkwtlijhe6cZyFAz5FNZiTfVFScxge3SO9o:wkilvxFNkxpx/19o

Score
10/10

Malware Config

Extracted

Path

C:\ProgramData\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: ea3d3d33-1635-47f7-a1a4-0078267b30bb
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe
    "C:\Users\Admin\AppData\Local\Temp\21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
        PID:1364
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Windows\System32\vssadmin.exe
          C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:1572
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2644

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\readme.txt

      Filesize

      394B

      MD5

      0394335bf42f1f1a1a730ec7eec45b73

      SHA1

      f1d6f7decd3120826b870479f45501acd979df47

      SHA256

      677ddbeefb459f03432a0d2d24f13f0dcec1289722639fb34849aa41a4bac620

      SHA512

      ea61fcecab48e463b2737c35247b30d03e626f3db9bccdce200b818bf52b6c3a32707b4356fbd6ff915b69cac2b5829d44a3f9fa31357dc5cb9ee5381636ddd3