Analysis
-
max time kernel
17s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-08-2023 14:42
Behavioral task
behavioral1
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win10v2004-20230703-en
Errors
General
-
Target
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
-
Size
563KB
-
MD5
3f400f30415941348af21d515a2fc6a3
-
SHA1
bd0bf9c987288ca434221d7d81c54a47e913600a
-
SHA256
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa
-
SHA512
0d4c3ee8807bbbf635ce2d1ce1b747c23cc2724ff999580169e5514c7c97109083bea169bd6a5f8be35f3b679bb8446839fcc7a38f78503658eda306bec69154
-
SSDEEP
12288:TFx0B/O7JxPzW9JPlHKtxYRkG7zLfpXE6SbJ:Rx7zW9JPlGskG1v
Malware Config
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1876 vssadmin.exe 2340 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
vssvc.exeshutdown.exedescription pid process Token: SeBackupPrivilege 2668 vssvc.exe Token: SeRestorePrivilege 2668 vssvc.exe Token: SeAuditPrivilege 2668 vssvc.exe Token: SeShutdownPrivilege 568 shutdown.exe Token: SeRemoteShutdownPrivilege 568 shutdown.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1956 wrote to memory of 1448 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1448 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1448 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1448 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1448 wrote to memory of 1876 1448 cmd.exe vssadmin.exe PID 1448 wrote to memory of 1876 1448 cmd.exe vssadmin.exe PID 1448 wrote to memory of 1876 1448 cmd.exe vssadmin.exe PID 1448 wrote to memory of 1876 1448 cmd.exe vssadmin.exe PID 1956 wrote to memory of 2928 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2928 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2928 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2928 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 2928 wrote to memory of 2340 2928 cmd.exe vssadmin.exe PID 2928 wrote to memory of 2340 2928 cmd.exe vssadmin.exe PID 2928 wrote to memory of 2340 2928 cmd.exe vssadmin.exe PID 2928 wrote to memory of 2340 2928 cmd.exe vssadmin.exe PID 1956 wrote to memory of 1952 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1952 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1952 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1952 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2780 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2780 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2780 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 2780 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1920 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1920 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1920 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1920 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1920 wrote to memory of 2072 1920 cmd.exe bcdedit.exe PID 1920 wrote to memory of 2072 1920 cmd.exe bcdedit.exe PID 1920 wrote to memory of 2072 1920 cmd.exe bcdedit.exe PID 1920 wrote to memory of 2072 1920 cmd.exe bcdedit.exe PID 1956 wrote to memory of 1084 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1084 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1084 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1956 wrote to memory of 1084 1956 5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe cmd.exe PID 1084 wrote to memory of 568 1084 cmd.exe shutdown.exe PID 1084 wrote to memory of 568 1084 cmd.exe shutdown.exe PID 1084 wrote to memory of 568 1084 cmd.exe shutdown.exe PID 1084 wrote to memory of 568 1084 cmd.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe"C:\Users\Admin\AppData\Local\Temp\5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set safeboot network2⤵PID:1952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\bcdedit.exe /set safeboot network2⤵PID:2780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\bcdedit.exe /set safeboot network2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\bcdedit.exeC:\Windows\SysNative\bcdedit.exe /set safeboot network3⤵
- Modifies boot configuration data using bcdedit
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C shutdown -r -f -t 02⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -f -t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1964
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:984