Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 12:29
Behavioral task
behavioral1
Sample
21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe
Resource
win10v2004-20230220-en
General
-
Target
21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe
-
Size
7.0MB
-
MD5
ed891e4fd173700fac93b3dda30517c9
-
SHA1
e05e9cc2f28bcd17f5285a34db2894bad9ccd53a
-
SHA256
21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda
-
SHA512
58d3254bca944cb60450e3ac352a3674ca5a1dea1142112726349931cbed6428e5db03004480d218bf4c63ce6d9847e74dfe9f0da455c9587cf47c5a7089e7fc
-
SSDEEP
98304:wkwtlijhe6cZyFAz5FNZiTfVFScxge3SO9o:wkilvxFNkxpx/19o
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\PopSkip.png => C:\Users\Admin\Pictures\PopSkip.png.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File renamed C:\Users\Admin\Pictures\ClearRedo.tiff => C:\Users\Admin\Pictures\ClearRedo.tiff.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File renamed C:\Users\Admin\Pictures\OutResolve.png => C:\Users\Admin\Pictures\OutResolve.png.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File renamed C:\Users\Admin\Pictures\RepairEnable.png => C:\Users\Admin\Pictures\RepairEnable.png.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File renamed C:\Users\Admin\Pictures\BackupRequest.tif => C:\Users\Admin\Pictures\BackupRequest.tif.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Users\Admin\Pictures\ClearRedo.tiff 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File renamed C:\Users\Admin\Pictures\BlockJoin.png => C:\Users\Admin\Pictures\BlockJoin.png.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_OEM_Perp-ul-oob.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\mfc140enu.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-pl.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-ppd.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-phn.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\mraut.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond.xml 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.cpl 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\pkeyconfig-office-client15.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipTsf.dll.mui 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\release 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\readme.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-phn.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Custom.propdesc 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mip_telemetry.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\excel.x-none.msi.16.x-none.tree.dat 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File created C:\Program Files\VideoLAN\VLC\locale\si\readme.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\sound.properties 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.PPT 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-100.png 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RUI.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcDemoR_BypassTrial365-ppd.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-pl.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\STSLIST.DLL 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8ES.DLL 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\readme.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-phn.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.XLS 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN048.XML 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File created C:\Program Files\Common Files\microsoft shared\readme.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File created C:\Program Files\Common Files\System\ado\en-US\readme.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\adcvbs.inc 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-localization-l1-2-0.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial-pl.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ul-oob.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\libEGL.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\ieinstal.exe.mui 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-80.png 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-pl.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-pl.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ppd.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\ReadMe.htm 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-oob.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-private-l1-1-0.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-1000-0000000FF1CE.xml 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\hijrah-config-umalqura.properties 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-core-file-l2-1-0.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-pl.xrm-ms 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\pe.dll 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1572 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2644 vssvc.exe Token: SeRestorePrivilege 2644 vssvc.exe Token: SeAuditPrivilege 2644 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1364 4804 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe 85 PID 4804 wrote to memory of 1364 4804 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe 85 PID 4804 wrote to memory of 5052 4804 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe 87 PID 4804 wrote to memory of 5052 4804 21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe 87 PID 5052 wrote to memory of 1572 5052 cmd.exe 89 PID 5052 wrote to memory of 1572 5052 cmd.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe"C:\Users\Admin\AppData\Local\Temp\21033cd24a9d775d7daa7bbc5c5b007553f205ac0febb6bae3fa35c700676bda.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵PID:1364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\System32\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1572
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394B
MD50394335bf42f1f1a1a730ec7eec45b73
SHA1f1d6f7decd3120826b870479f45501acd979df47
SHA256677ddbeefb459f03432a0d2d24f13f0dcec1289722639fb34849aa41a4bac620
SHA512ea61fcecab48e463b2737c35247b30d03e626f3db9bccdce200b818bf52b6c3a32707b4356fbd6ff915b69cac2b5829d44a3f9fa31357dc5cb9ee5381636ddd3