Resubmissions

15-03-2024 10:54

240315-mz23tagg69 10

Analysis

  • max time kernel
    146s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2024 10:54

General

  • Target

    txt.exe

  • Size

    885KB

  • MD5

    497ef4779c6770e4497adf0bc71655f1

  • SHA1

    328a8793323f11c1d0c5f3ddedf4ae10caafb063

  • SHA256

    62e63388953bb30669b403867a3ac2c8130332cf78133f7fd4a7f23cdc939087

  • SHA512

    35c2c131a84205ecda974fc0cdf93db38184547586c28671379b13b98311289459b5b87c6c8ffa3233ccd42953d4faef47e27195ecd40011cc72cbf3b3e5af35

  • SSDEEP

    24576:pAWf/LUup7zmMl8tOKnvwYQ62jaeekMEoBmn64:pTUS2Ml8trnvwYQ62japkMEQS64

Malware Config

Extracted

Path

C:\Program Files\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 91ff2d86-ecd6-429f-9cfe-ef43ac53155b *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\txt.exe
    "C:\Users\Admin\AppData\Local\Temp\txt.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3548
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1388
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:868
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2696
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4476
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2448
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:380
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3076
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
      PID:224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\instructions_read_me.txt

      Filesize

      1KB

      MD5

      48fd4f0bdadd9e2a934c4aef789f7e13

      SHA1

      7e5c99a356f4fac0b9e538f8a2a8927d1c0c6850

      SHA256

      f1e74dfde27137949c2352cb782ed6b2d5cf5fcd2ad6fc1f6e91f2f89649e29e

      SHA512

      17ac0d35284095eea40c68a7d1ac2fb0eb7d19b429ffc072a4b4504a8b80ba7297958cf205a176fd3c651d18f8ba01e2b41f3155715c9e20a34b474e36cc4cb2

    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1SA07OI6\microsoft.windows[1].xml

      Filesize

      97B

      MD5

      fb9854a5b056cc3d006b38bf0eab1b7c

      SHA1

      0a2b0432e2e9938be1f652c2247827e47b265f44

      SHA256

      3d454d15255bb82fb8a4cfa40ea848af32395be899aaaf83b6d626a814aa21c2

      SHA512

      20366182bf5a658b19e3df4eef2fa4e484bdcecc85a893834fbcb2b0ab64100a7694c3dbbdf1597bf3e3a747ede6fe7b81aab5f07653ef40a515edbef90ed00d

    • memory/380-3846-0x0000025357140000-0x0000025357160000-memory.dmp

      Filesize

      128KB

    • memory/380-3848-0x0000025357550000-0x0000025357570000-memory.dmp

      Filesize

      128KB

    • memory/380-3844-0x0000025357180000-0x00000253571A0000-memory.dmp

      Filesize

      128KB

    • memory/2448-3111-0x00000227F48E0000-0x00000227F4900000-memory.dmp

      Filesize

      128KB

    • memory/2448-3175-0x00000227F48A0000-0x00000227F48C0000-memory.dmp

      Filesize

      128KB

    • memory/2448-3180-0x00000227F4F50000-0x00000227F4F70000-memory.dmp

      Filesize

      128KB

    • memory/2696-1274-0x000001BB102E0000-0x000001BB10300000-memory.dmp

      Filesize

      128KB

    • memory/2696-1319-0x000001BB106B0000-0x000001BB106D0000-memory.dmp

      Filesize

      128KB

    • memory/2696-1290-0x000001BB102A0000-0x000001BB102C0000-memory.dmp

      Filesize

      128KB

    • memory/3076-4975-0x00000208CB790000-0x00000208CB7B0000-memory.dmp

      Filesize

      128KB

    • memory/3076-4962-0x00000208CB7D0000-0x00000208CB7F0000-memory.dmp

      Filesize

      128KB

    • memory/3076-5000-0x00000208CBBA0000-0x00000208CBBC0000-memory.dmp

      Filesize

      128KB

    • memory/4476-2623-0x0000029F0EDA0000-0x0000029F0EDC0000-memory.dmp

      Filesize

      128KB

    • memory/4476-2610-0x0000029F0EC40000-0x0000029F0EC60000-memory.dmp

      Filesize

      128KB

    • memory/4476-2598-0x0000029F0E6B0000-0x0000029F0E6D0000-memory.dmp

      Filesize

      128KB