Analysis
-
max time kernel
286s -
max time network
281s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
Resource
win10v2004-20230703-en
General
-
Target
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
-
Size
1.2MB
-
MD5
42c15072a8aa222a10d96311969aa77a
-
SHA1
a87e4a21996a4a35e0b96a19bcd0b6964d459378
-
SHA256
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7
-
SHA512
d48489ac42670749e98a77469a35320621f0597fd2da70fd4407e86d283c62c7ccf8ce67b5a4e20208bd5fd8f826d082e5f6286719eb5a8b098a762abba77184
-
SSDEEP
24576:9KuyRQZ7taLNQyucw8VQ3QhCtGEiCefenQ83pZkBTz8GE652kt:d2eQob7Q+ZITzqIV
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Black Basta payload 26 IoCs
Processes:
resource yara_rule behavioral1/memory/4148-133-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-140-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-141-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-144-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-145-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-146-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-147-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-148-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-149-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-150-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-151-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-152-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-153-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-156-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-155-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-157-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-154-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-158-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-159-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-160-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-161-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-162-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-164-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-165-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-166-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta behavioral1/memory/4148-167-0x0000000000340000-0x00000000003CA000-memory.dmp family_blackbasta -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7154) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
Processes:
regsvr32.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt regsvr32.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\History\desktop.ini regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4792 set thread context of 4148 4792 regsvr32.exe regsvr32.exe -
Drops file in Program Files directory 64 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\MSOSEC.XML regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.ReportingServices.AdHoc.Excel.Client.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ACEDAO.DLL regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] regsvr32.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\v8_context_snapshot.bin regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-100.png regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-140.png regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\AdjacencyLetter.dotx regsvr32.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\InkObj.dll regsvr32.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\readme.txt regsvr32.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\AdobePDF417.pmp regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial3-ul-oob.xrm-ms regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.SETLANG.16.1033.hxn regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\application.ini regsvr32.exe File created C:\Program Files\Common Files\microsoft shared\ink\sk-SK\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\sqlxmlx.rll regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\msedge_200_percent.pak.DATA regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-charts.jar regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-awt_zh_CN.jar regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Grace-ul-oob.xrm-ms regsvr32.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AXE8SharedExpat.dll regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libxa_plugin.dll regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunmscapi.jar regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser_5.5.0.165303.jar regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Csi.dll regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.175.29\msedgeupdateres_el.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN121.XML regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.en-us.msi.16.en-us.tree.dat regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.175.29\msedgeupdateres_hi.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL087.XML regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightItalic.ttf regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-conio-l1-1-0.dll regsvr32.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.Runtime.dll regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libswscale_plugin.dll regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe regsvr32.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\readme.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-ppd.xrm-ms regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libscte18_plugin.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmmui.msi.16.en-us.tree.dat regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ORGCHART.CHM regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\LICENSE.txt regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jvmstat_ja.jar regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial4-pl.xrm-ms regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ul-oob.xrm-ms regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_lg.gif regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.175.29\psmachine.dll regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmkv_plugin.dll regsvr32.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Engine.resources.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE regsvr32.exe File created C:\Program Files (x86)\Common Files\System\ado\it-IT\readme.txt regsvr32.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jetty.security_8.1.14.v20131031.jar regsvr32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\readme.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Spatial.NetFX35.V7.dll regsvr32.exe File created C:\Program Files\Mozilla Firefox\uninstall\readme.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ul-phn.xrm-ms regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL081.XML regsvr32.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3988 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 4148 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1604 vssvc.exe Token: SeRestorePrivilege 1604 vssvc.exe Token: SeAuditPrivilege 1604 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1652 wrote to memory of 4792 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 4792 1652 regsvr32.exe regsvr32.exe PID 1652 wrote to memory of 4792 1652 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe PID 4792 wrote to memory of 4148 4792 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"3⤵
- Drops startup file
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: RenamesItself
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet4⤵PID:4200
-
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet4⤵PID:1904
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD50ec3bfc39acd6e4e5d682271d4d2a6eb
SHA1622f9571f0cceae1580e73f35b89efabdba35468
SHA2561c5b4b54df5b38d96cbef7cf2041e37305664ccf89ef6757437f98bdc90f018e
SHA512d4e1dd3b0ca0d0122a83ffa4846c5e6676b774f6e812105aab82d5da9b8a49b3b971e52869385187bbb085f5c9075fd92a09828351448cce5be78f64217ff7b6