Analysis
-
max time kernel
76s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe
Resource
win10v2004-20240508-en
General
-
Target
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe
-
Size
623KB
-
MD5
9dbd19323b253a9758195c8efa72f329
-
SHA1
1661ae91f105b6854ebfbaa47563fce45660cc79
-
SHA256
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7
-
SHA512
2e34266b691a8041e525037ae67cf65142523c45f01b6da2008a50b452b9664697f86011cdb0daf0510cfea33bd786560bb2d147b06b00779f89199d32552e01
-
SSDEEP
12288:DIkz+rSP5VV3VG7rYyPT+p/VYXMJ8oD536bGIqs7GBvw0QygfmHH:DISj3IXYETQV1XD5VIZ7GOg1n
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3765) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxComm.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\vccorlib140.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-200_contrast-white.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-32.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-80_altform-unplated.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ScreenSketchSquare150x150Logo.scale-100_contrast-black.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Grace-ul-oob.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmmui.msi.16.en-us.boot.tree.dat a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\images\NoConnection.scale-100.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorMedTile.contrast-black_scale-200.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyView.scale-150.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeBadge.scale-150.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\psuser_64.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\icui18n56.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\vcruntime140.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_OEM_Perp-ul-oob.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTrial-ppd.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-40_contrast-black.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\AppxMetadata\instructions_read_me.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.common.16.xml a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\SPPRedist.msi a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.scale-125_contrast-black.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InkObj.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\AppxMetadata\instructions_read_me.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\instructions_read_me.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InkObj.dll.mui a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File created C:\Program Files (x86)\Windows Defender\instructions_read_me.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\msvcp140.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ppd.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-20_altform-lightunplated.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_targetsize-20.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\VideoLAN\VLC\NEWS.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Common Files\System\de-DE\wab32res.dll.mui a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-ul-phn.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Grace-ul-oob.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageWideTile.scale-100.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-filesystem-l1-1-0.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Net.WebHeaderCollection.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\resources.pri a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedSplash.scale-100_contrast-white.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.targetsize-96_altform-unplated.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\plugin.jar a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files (x86)\Windows Media Player\uk-UA\setup_wm.exe.mui a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-stdio-l1-1-0.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteLargeTile.scale-125.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ppd.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-runtime-l1-1-0.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.ThreadPool.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Private.Uri.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ppd.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ul-oob.xrm-ms a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ro-RO\tipresx.dll.mui a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\msvcp140_1_app.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\resources.pri a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\msvcp140_1.dll a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-20_altform-unplated_contrast-black.png a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe File created C:\Program Files\Reference Assemblies\instructions_read_me.txt a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4392 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tcw9lnz6q\DefaultIcon a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tcw9lnz6q a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tcw9lnz6q\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2924 vssvc.exe Token: SeRestorePrivilege 2924 vssvc.exe Token: SeAuditPrivilege 2924 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.execmd.exedescription pid process target process PID 448 wrote to memory of 4584 448 a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe cmd.exe PID 448 wrote to memory of 4584 448 a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe cmd.exe PID 448 wrote to memory of 4584 448 a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe cmd.exe PID 4584 wrote to memory of 4392 4584 cmd.exe vssadmin.exe PID 4584 wrote to memory of 4392 4584 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe"C:\Users\Admin\AppData\Local\Temp\a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4392
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4440,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4604 /prefetch:81⤵PID:5988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56eeca8554c5aa30e98d49e968ec2dafc
SHA175c5e5da3954945846b098ea2ac994d480491096
SHA2569ea25a44f97ac86387c8b29a6a519c8e66250d826aa3cdffb8742e871106b319
SHA512562315532e831b4b7abe70ad05c09e4f0d4b6a5ded9d0285aa6342e7ad3c35085f8d62608e2a77fd44711c2cc5574047bfc90e4b3de41ea9d0b748f8800f0670