Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2023 11:50

General

  • Target

    17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe

  • Size

    636KB

  • MD5

    267d5c3137d313ce1a86c2f255a835e6

  • SHA1

    c7a37c0edeffd23777cca44f9b49076be1bd43e6

  • SHA256

    17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90

  • SHA512

    9c119a9f973dae77f2cdd6a855ae45c20660aadc5c592f6d06f6360dd0bb5a380d0ed1fcc23c0cb721da70bcca7d32db46181be675bf0587276d35d6da26a31e

  • SSDEEP

    12288:aEky5bwpy02iRaeXCP2CIcdoKAXMr+Mr+kJZ4:j02iRaeHPcdo18rTrf6

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme.txt

Family

blackbasta

Ransom Note
All of your files are currently encrypted by no_name_software. These files cannot be recovered by any means without contacting our team directly. DON'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value. DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publish it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. DON'T TRY TO CONTACT feds or any recovery companies. We have our informants in these structures, so any of your complaints will be immediately directed to us. So if you will hire any recovery company for negotiations or send requests to the police/FBI/investigators, we will consider this as a hostile intent and initiate the publication of whole compromised data immediately. DON'T move or rename your files. These parameters can be used for encryption/decryption process. To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/ Your company id for log in: c98fa42b-3233-45df-bd7c-42529c44cb70 Your company key: 3 of any of your dc through comma. Example: "DC1, DC2, DC3". You can type less if you have no enough YOU SHOULD BE AWARE! We will speak only with an authorized person. It can be the CEO, top management, etc. In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm!
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Renames multiple (356) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
    "C:\Users\Admin\AppData\Local\Temp\17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    PID:2468
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1620
  • C:\Windows\eHome\ehshell.exe
    "C:\Windows\eHome\ehshell.exe" /prefetch:1003 "C:\Users\Admin\Desktop\LockExpand.DVR"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2860
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x5a4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1172
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1140
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\Files.docx"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2000
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1312

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Desktop\readme.txt

        Filesize

        1KB

        MD5

        040ae5c2bdd54884b227cdf4e078ddb9

        SHA1

        9e9664a02b14214082beb31e839180ce9500b40b

        SHA256

        5f8d967a475fb1170cbdfe5173af63c1d19a0751f823cf4a3de594bcab3f517a

        SHA512

        fee91e14b5a87099804a8ff41706e97b5861c55eca45cda87c14a9e057710dc0d41b677295dc363a6a2337688bd4ceb6ddc176ff10d75c100c1450dd36e1e41f

      • memory/2000-428-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2000-429-0x00000000716DD000-0x00000000716E8000-memory.dmp

        Filesize

        44KB

      • memory/2000-427-0x000000002F270000-0x000000002F3CD000-memory.dmp

        Filesize

        1.4MB

      • memory/2860-414-0x000000001EA10000-0x000000001EAAE000-memory.dmp

        Filesize

        632KB

      • memory/2860-417-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-408-0x000000001DB70000-0x000000001E178000-memory.dmp

        Filesize

        6.0MB

      • memory/2860-409-0x000000001E180000-0x000000001E304000-memory.dmp

        Filesize

        1.5MB

      • memory/2860-410-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

        Filesize

        9.6MB

      • memory/2860-411-0x000000001AFC0000-0x000000001AFC1000-memory.dmp

        Filesize

        4KB

      • memory/2860-412-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-413-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

        Filesize

        9.6MB

      • memory/2860-405-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-415-0x000000001EAB0000-0x000000001EB68000-memory.dmp

        Filesize

        736KB

      • memory/2860-416-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-407-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-418-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-419-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-421-0x000000001E950000-0x000000001E987000-memory.dmp

        Filesize

        220KB

      • memory/2860-423-0x000000001B0E0000-0x000000001B0EA000-memory.dmp

        Filesize

        40KB

      • memory/2860-422-0x000000001B0E0000-0x000000001B0EA000-memory.dmp

        Filesize

        40KB

      • memory/2860-425-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

        Filesize

        9.6MB

      • memory/2860-426-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-404-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

        Filesize

        9.6MB

      • memory/2860-403-0x00000000021B0000-0x0000000002230000-memory.dmp

        Filesize

        512KB

      • memory/2860-402-0x000007FEF5D60000-0x000007FEF66FD000-memory.dmp

        Filesize

        9.6MB