Analysis
-
max time kernel
190s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
Resource
win10v2004-20231215-en
General
-
Target
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll
-
Size
1.2MB
-
MD5
42c15072a8aa222a10d96311969aa77a
-
SHA1
a87e4a21996a4a35e0b96a19bcd0b6964d459378
-
SHA256
9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7
-
SHA512
d48489ac42670749e98a77469a35320621f0597fd2da70fd4407e86d283c62c7ccf8ce67b5a4e20208bd5fd8f826d082e5f6286719eb5a8b098a762abba77184
-
SSDEEP
24576:9KuyRQZ7taLNQyucw8VQ3QhCtGEiCefenQ83pZkBTz8GE652kt:d2eQob7Q+ZITzqIV
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Black Basta payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/1012-0-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-8-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-7-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-11-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-12-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-13-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-14-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-15-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-19-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-18-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-20-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-17-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-21-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-23-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-25-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-27-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-31-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-33-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-34-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-32-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-30-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-29-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-28-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-26-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-24-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-22-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta behavioral2/memory/1012-16-0x0000000000AB0000-0x0000000000B3A000-memory.dmp family_blackbasta -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (961) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3548 set thread context of 1012 3548 regsvr32.exe regsvr32.exe -
Drops file in Program Files directory 64 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Program Files\RenameBlock.xlsx regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll regsvr32.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\readme.txt regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jawt.dll regsvr32.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui regsvr32.exe File opened for modification C:\Program Files\Java\jdk-1.8\README.html regsvr32.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\readme.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\sound.properties regsvr32.exe File opened for modification C:\Program Files\CheckpointSwitch.mpg regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-synch-l1-2-0.dll regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-tw.dll regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe regsvr32.exe File opened for modification C:\Program Files\AddLimit.ADT regsvr32.exe File opened for modification C:\Program Files\SuspendCompare.mpeg3 regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\nss3.dll regsvr32.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasql.dll regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\readme.txt regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0409-1000-0000000FF1CE.xml regsvr32.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.VisualElementsManifest.xml regsvr32.exe File created C:\Program Files (x86)\Reference Assemblies\readme.txt regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-string-l1-1-0.dll regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jli.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Retrospect.thmx regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Excel.Excel.x-none.msi.16.x-none.xml regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll regsvr32.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jsse.jar regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-file-l1-2-0.dll regsvr32.exe File opened for modification C:\Program Files\Internet Explorer\sqmapi.dll regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32mui.msi.16.en-us.xml regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll.sig regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe regsvr32.exe File created C:\Program Files\7-Zip\Lang\readme.txt regsvr32.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.stdformat.dll regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee.dll regsvr32.exe File created C:\Program Files\Microsoft Office\root\Client\C2R64.dll\readme.txt regsvr32.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\currency.data regsvr32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe regsvr32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe regsvr32.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll regsvr32.exe File created C:\Program Files\Java\jre-1.8\bin\server\readme.txt regsvr32.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-math-l1-1-0.dll regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll regsvr32.exe File opened for modification C:\Program Files\WatchLimit.aiff regsvr32.exe File created C:\Program Files\Microsoft Office\Updates\readme.txt regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\defaultagent.ini regsvr32.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\readme.txt regsvr32.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\readme.txt regsvr32.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvStreamingManager.dll regsvr32.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe.sig regsvr32.exe File created C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\readme.txt regsvr32.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.proofing.msi.16.en-us.xml regsvr32.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPoint.PowerPoint.x-none.msi.16.x-none.xml regsvr32.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1108 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4512 vssvc.exe Token: SeRestorePrivilege 4512 vssvc.exe Token: SeAuditPrivilege 4512 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2132 wrote to memory of 3548 2132 regsvr32.exe regsvr32.exe PID 2132 wrote to memory of 3548 2132 regsvr32.exe regsvr32.exe PID 2132 wrote to memory of 3548 2132 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe PID 3548 wrote to memory of 1012 3548 regsvr32.exe regsvr32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9f948af3a30f125dcd24d8a628b3a18c66b3d72baede8496ee735cbdfd9cf0c7.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"3⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet4⤵PID:3728
-
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet4⤵PID:3948
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD50ec3bfc39acd6e4e5d682271d4d2a6eb
SHA1622f9571f0cceae1580e73f35b89efabdba35468
SHA2561c5b4b54df5b38d96cbef7cf2041e37305664ccf89ef6757437f98bdc90f018e
SHA512d4e1dd3b0ca0d0122a83ffa4846c5e6676b774f6e812105aab82d5da9b8a49b3b971e52869385187bbb085f5c9075fd92a09828351448cce5be78f64217ff7b6