Overview
overview
10Static
static
1007117c02a0...99.dll
windows7-x64
107117c02a0...99.dll
windows10-2004-x64
11391c20a26...80.dll
windows7-x64
101391c20a26...80.dll
windows10-2004-x64
10350ba7fca6...bd.exe
windows7-x64
9350ba7fca6...bd.exe
windows10-2004-x64
1051eb749d6c...3e.dll
windows7-x64
351eb749d6c...3e.dll
windows10-2004-x64
1017205c4318...90.exe
windows7-x64
917205c4318...90.exe
windows10-2004-x64
95d2204f3a2...aa.exe
windows7-x64
5d2204f3a2...aa.exe
windows10-2004-x64
7883f01096...8a.exe
windows7-x64
107883f01096...8a.exe
windows10-2004-x64
10ae7c868713...6e.exe
windows7-x64
10ae7c868713...6e.exe
windows10-2004-x64
10Analysis
-
max time kernel
166s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 12:59
Behavioral task
behavioral1
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240226-en
General
-
Target
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
-
Size
524KB
-
MD5
20d03f8272648fa3fd31e222b8e2220f
-
SHA1
ac20624e8aff3d4f9c42a8e2ddd493250e631f47
-
SHA256
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80
-
SHA512
3bcfde35141671b4de022ae2423d020e53de35075c9a2c0a2dde45dc993364543af443dc97e6d3cc96c9a1d34533d6adb50c2495a23b5c4de97f64b3176ebd70
-
SSDEEP
12288:SwCt9ZABL6wADs7yjyYTW3nMxIg/NmGta1WeGcvc4OulNI:AHUADs+jVW3nMxIKMOa1Wpecule
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (208) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" rundll32.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\F12.dll rundll32.exe File opened for modification C:\Program Files\Internet Explorer\perfcore.dll rundll32.exe File created C:\Program Files\Microsoft Games\Solitaire\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-string-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\7-Zip\History.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l2-1-0.dll rundll32.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\readme.txt rundll32.exe File opened for modification C:\Program Files\DVD Maker\audiodepthconverter.ax rundll32.exe File created C:\Program Files\Common Files\SpeechEngines\readme.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx rundll32.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe rundll32.exe File opened for modification C:\Program Files\ReadSubmit.ppsm rundll32.exe File opened for modification C:\Program Files\Internet Explorer\sqmapi.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe.sig rundll32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe rundll32.exe File created C:\Program Files\Internet Explorer\images\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\mozglue.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\nssckbi.dll rundll32.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.dll rundll32.exe File created C:\Program Files (x86)\Reference Assemblies\readme.txt rundll32.exe File opened for modification C:\Program Files\DisableRemove.au rundll32.exe File opened for modification C:\Program Files\RestartRead.m1v rundll32.exe File opened for modification C:\Program Files\TestClear.mpv2 rundll32.exe File created C:\Program Files\Internet Explorer\ja-JP\readme.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\License.txt rundll32.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe rundll32.exe File created C:\Program Files (x86)\Microsoft Sync Framework\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\defaultagent_localized.ini rundll32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\F12Tools.dll rundll32.exe File created C:\Program Files\Microsoft Games\FreeCell\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-utility-l1-1-0.dll rundll32.exe File created C:\Program Files (x86)\Common Files\Services\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\libEGL.dll rundll32.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsink.ax rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iedvtool.dll rundll32.exe File created C:\Program Files\DVD Maker\en-US\readme.txt rundll32.exe File opened for modification C:\Program Files\RenameComplete.jpeg rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-localization-l1-2-0.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe rundll32.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\readme.txt rundll32.exe File opened for modification C:\Program Files\DisableSuspend.odp rundll32.exe File created C:\Program Files\DVD Maker\fr-FR\readme.txt rundll32.exe File opened for modification C:\Program Files\Internet Explorer\pdm.dll rundll32.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml rundll32.exe File opened for modification C:\Program Files\Internet Explorer\Timeline_is.dll rundll32.exe File created C:\Program Files\Microsoft Games\Minesweeper\readme.txt rundll32.exe File created C:\Program Files\Java\readme.txt rundll32.exe File created C:\Program Files\Internet Explorer\fr-FR\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\osclientcerts.dll rundll32.exe File opened for modification C:\Program Files\InitializeAssert.mhtml rundll32.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe rundll32.exe File created C:\Program Files\Microsoft Games\Purble Place\readme.txt rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\Accessible.tlb rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\update-settings.ini rundll32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe rundll32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\pdmproxy100.dll rundll32.exe File opened for modification C:\Program Files\WriteStop.xlsm rundll32.exe File opened for modification C:\Program Files\Internet Explorer\MemoryAnalyzer.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe rundll32.exe File opened for modification C:\Program Files\SubmitDeny.vbs rundll32.exe File created C:\Program Files\7-Zip\Lang\readme.txt rundll32.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3028 vssadmin.exe 1332 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2576 vssvc.exe Token: SeRestorePrivilege 2576 vssvc.exe Token: SeAuditPrivilege 2576 vssvc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 3056 wrote to memory of 1224 3056 rundll32.exe 27 PID 1224 wrote to memory of 2116 1224 rundll32.exe 28 PID 1224 wrote to memory of 2116 1224 rundll32.exe 28 PID 1224 wrote to memory of 2116 1224 rundll32.exe 28 PID 1224 wrote to memory of 2116 1224 rundll32.exe 28 PID 2116 wrote to memory of 3028 2116 cmd.exe 30 PID 2116 wrote to memory of 3028 2116 cmd.exe 30 PID 2116 wrote to memory of 3028 2116 cmd.exe 30 PID 2116 wrote to memory of 3028 2116 cmd.exe 30 PID 1224 wrote to memory of 1936 1224 rundll32.exe 35 PID 1224 wrote to memory of 1936 1224 rundll32.exe 35 PID 1224 wrote to memory of 1936 1224 rundll32.exe 35 PID 1224 wrote to memory of 1936 1224 rundll32.exe 35 PID 1936 wrote to memory of 1332 1936 cmd.exe 37 PID 1936 wrote to memory of 1332 1936 cmd.exe 37 PID 1936 wrote to memory of 1332 1936 cmd.exe 37 PID 1936 wrote to memory of 1332 1936 cmd.exe 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll,#12⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1332
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394B
MD5b17425a4db71b2ef8b7decd01038e502
SHA17e761bce96cc3033dec3a1c61d2672c6fbae3718
SHA25636c359b9db03e7a6df3c37a25b16c53a71d6a866e6332faf203f19ddbfc1ed68
SHA512fbe107f9275231e2e2dbbd80475d51e641a38fd24241366c3af0ed14d0f383bd9de731f2ed8b355c40a68008a6d80dbfb4008e06fd2538483bb8388c7085f636