Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
Resource
win7-20231215-en
General
-
Target
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
-
Size
1.2MB
-
MD5
42c15072a8aa222a10d96311969aa77a
-
SHA1
a87e4a21996a4a35e0b96a19bcd0b6964d459378
-
SHA256
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7
-
SHA512
d48489ac42670749e98a77469a35320621f0597fd2da70fd4407e86d283c62c7ccf8ce67b5a4e20208bd5fd8f826d082e5f6286719eb5a8b098a762abba77184
-
SSDEEP
24576:9KuyRQZ7taLNQyucw8VQ3QhCtGEiCefenQ83pZkBTz8GE652kt:d2eQob7Q+ZITzqIV
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Black Basta payload 57 IoCs
Processes:
resource yara_rule behavioral1/memory/2788-4-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-6-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-8-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-11-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-12-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-10-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-13-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-14-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-15-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-16-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-17-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-19-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-18-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-21-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-20-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-25-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-24-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-22-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-23-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-26-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-63-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-62-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-61-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-60-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-59-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-58-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-57-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-56-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-55-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-54-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-53-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-52-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-51-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-50-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-49-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-48-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-47-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-46-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-45-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-44-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-43-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-42-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-41-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-40-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-39-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-38-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-37-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-36-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-35-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-34-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-33-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-32-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-31-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-30-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-29-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-28-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta behavioral1/memory/2788-27-0x0000000000090000-0x000000000011A000-memory.dmp family_blackbasta -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (595) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2512 set thread context of 2788 2512 regsvr32.exe regsvr32.exe -
Drops file in Program Files directory 64 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\mr.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Common Files\System\wab32res.dll regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\JFONT.DAT regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_es.dub regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NL7MODELS000C.dll regsvr32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CSS7DATA000C.DLL regsvr32.exe File opened for modification C:\Program Files\HideSync.7z regsvr32.exe File opened for modification C:\Program Files\DVD Maker\es-ES\DVDMaker.exe.mui regsvr32.exe File opened for modification C:\Program Files\Java\jre7\COPYRIGHT regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7es.kic regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\platform.ini regsvr32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe regsvr32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MLCFG32.CPL regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe regsvr32.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\readme.txt regsvr32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\readme.txt regsvr32.exe File created C:\Program Files (x86)\Common Files\System\it-IT\readme.txt regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll regsvr32.exe File created C:\Program Files\Mozilla Firefox\browser\features\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm regsvr32.exe File created C:\Program Files\Java\readme.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm regsvr32.exe File opened for modification C:\Program Files\Internet Explorer\D3DCompiler_47.dll regsvr32.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\readme.txt regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE regsvr32.exe File created C:\Program Files (x86)\Internet Explorer\readme.txt regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUDIOSEARCHMAIN.DLL regsvr32.exe File created C:\Program Files\Uninstall Information\readme.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt regsvr32.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp regsvr32.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\readme.txt regsvr32.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\readme.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\HeartsMCE.lnk regsvr32.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlaceMCE.png regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Custom.propdesc regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excel.exe.manifest regsvr32.exe File opened for modification C:\Program Files\Internet Explorer\jsprofilerui.dll regsvr32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe regsvr32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\readme.txt regsvr32.exe File created C:\Program Files\Common Files\readme.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.png regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE regsvr32.exe File created C:\Program Files\Internet Explorer\images\readme.txt regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\axvlc.dll regsvr32.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe regsvr32.exe File opened for modification C:\Program Files\Internet Explorer\ie9props.propdesc regsvr32.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\readme.txt regsvr32.exe File created C:\Program Files (x86)\Common Files\System\en-US\readme.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ContactPicker.dll regsvr32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\readme.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVTEL.DIC regsvr32.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2800 vssadmin.exe 2028 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2728 vssvc.exe Token: SeRestorePrivilege 2728 vssvc.exe Token: SeAuditPrivilege 2728 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2224 wrote to memory of 2512 2224 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe PID 2512 wrote to memory of 2788 2512 regsvr32.exe regsvr32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"3⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet4⤵PID:1440
-
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet4⤵PID:2360
-
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2028
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD50ec3bfc39acd6e4e5d682271d4d2a6eb
SHA1622f9571f0cceae1580e73f35b89efabdba35468
SHA2561c5b4b54df5b38d96cbef7cf2041e37305664ccf89ef6757437f98bdc90f018e
SHA512d4e1dd3b0ca0d0122a83ffa4846c5e6676b774f6e812105aab82d5da9b8a49b3b971e52869385187bbb085f5c9075fd92a09828351448cce5be78f64217ff7b6