Analysis

  • max time kernel
    190s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 20:19

General

  • Target

    9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll

  • Size

    1.2MB

  • MD5

    42c15072a8aa222a10d96311969aa77a

  • SHA1

    a87e4a21996a4a35e0b96a19bcd0b6964d459378

  • SHA256

    9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7

  • SHA512

    d48489ac42670749e98a77469a35320621f0597fd2da70fd4407e86d283c62c7ccf8ce67b5a4e20208bd5fd8f826d082e5f6286719eb5a8b098a762abba77184

  • SSDEEP

    24576:9KuyRQZ7taLNQyucw8VQ3QhCtGEiCefenQ83pZkBTz8GE652kt:d2eQob7Q+ZITzqIV

Score
10/10

Malware Config

Extracted

Path

C:\ProgramData\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: 9f2cd3ed-1d30-45ac-b47c-7d480426138d 
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Black Basta payload 27 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (961) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\SysWOW64\regsvr32.exe"
        3⤵
        • Sets desktop wallpaper using registry
        • Drops file in Program Files directory
        • Modifies registry class
        PID:1012
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
          4⤵
            PID:3728
            • C:\Windows\system32\vssadmin.exe
              C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
              5⤵
              • Interacts with shadow copies
              PID:1108
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
            4⤵
              PID:3948
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4512

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\readme.txt

        Filesize

        395B

        MD5

        0ec3bfc39acd6e4e5d682271d4d2a6eb

        SHA1

        622f9571f0cceae1580e73f35b89efabdba35468

        SHA256

        1c5b4b54df5b38d96cbef7cf2041e37305664ccf89ef6757437f98bdc90f018e

        SHA512

        d4e1dd3b0ca0d0122a83ffa4846c5e6676b774f6e812105aab82d5da9b8a49b3b971e52869385187bbb085f5c9075fd92a09828351448cce5be78f64217ff7b6

      • memory/1012-25-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-16-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-23-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-12-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-13-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-14-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-15-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-19-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-18-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-20-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-17-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-21-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-11-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-7-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-29-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-31-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-33-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-34-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-8-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-32-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-30-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-27-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-28-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-26-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-24-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-22-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB

      • memory/1012-0-0x0000000000AB0000-0x0000000000B3A000-memory.dmp

        Filesize

        552KB