Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe
Resource
win10v2004-20240226-en
General
-
Target
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe
-
Size
743KB
-
MD5
b3c9bb42bca62dea8ba72b8c04200ead
-
SHA1
4a535112c45ea02782a154d271556a324110db52
-
SHA256
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c
-
SHA512
721d0f67c552b79ceb8fdef092e75de1308e062c6b783d220f992e5b9c001e07c40b8a416adee5da20292157057e81cfa3eb618d33f0ebd1e89b9d5355fd0a7b
-
SSDEEP
12288:B9uxWTNaFP2vTXhyy9cetos+cjMHeUT3VBoKfzY5gVNI3Ng+t:B9uxWTo52Thn9ce5675BoIz0gV6dvt
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1345) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Loads dropped DLL 1 IoCs
Processes:
pid process 1200 -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exedescription ioc process File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Microsoft Games\Hearts\en-US\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-string-l1-1-0.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Common Files\System\wab32res.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Common Files\System\ado\msado20.tlb d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\System\msadc\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_fr.dub d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre7\lib\tzmappings d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceer35EN.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_glass_Thumbnail.bmp d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\oisctrl.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\HeartsMCE.lnk d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\PurblePlace.exe.mui d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CGMIMP32.HLP d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\Mahjong.exe.mui d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_buttongraphic.png d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\System\en-US\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ie9props.propdesc d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCVDT.DLL d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre7\bin\w2k_lsa_auth.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre7\lib\charsets.jar d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\System\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\Office14\GROOVEEX.DLL d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Metro.thmx d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPST32.DLL d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\DVD Maker\it-IT\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mshwgst.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdater.cer d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_scrapbook_Thumbnail.bmp d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre7\lib\accessibility.properties d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\Microsoft Shared\VGX\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\locale\da\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTIRMV.XML d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWRECS.DLL d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2924 vssadmin.exe 2408 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2948 vssvc.exe Token: SeRestorePrivilege 2948 vssvc.exe Token: SeAuditPrivilege 2948 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.execmd.execmd.exedescription pid process target process PID 2776 wrote to memory of 940 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2776 wrote to memory of 940 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2776 wrote to memory of 940 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2776 wrote to memory of 940 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 940 wrote to memory of 2924 940 cmd.exe vssadmin.exe PID 940 wrote to memory of 2924 940 cmd.exe vssadmin.exe PID 940 wrote to memory of 2924 940 cmd.exe vssadmin.exe PID 940 wrote to memory of 2924 940 cmd.exe vssadmin.exe PID 2776 wrote to memory of 2576 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2776 wrote to memory of 2576 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2776 wrote to memory of 2576 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2776 wrote to memory of 2576 2776 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 2576 wrote to memory of 2408 2576 cmd.exe vssadmin.exe PID 2576 wrote to memory of 2408 2576 cmd.exe vssadmin.exe PID 2576 wrote to memory of 2408 2576 cmd.exe vssadmin.exe PID 2576 wrote to memory of 2408 2576 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe"C:\Users\Admin\AppData\Local\Temp\d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2408
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD5b4a2e3e446d794ab467364956096c047
SHA17b520a2b0b954a03ffd7fae189f933c94784f1c2
SHA2565c7f7d725ae586b8914eb7e4514a6a52189ca3dc32af6be20d5a404e3f7ff298
SHA5126f7d06b4b8a724372b5e3e6bf0881024bbc7a20a4d7c8b6a588ee65708b2c10a9d1862ae09102aa13eb02f089a1b8152ef87576bc14a953ac004c325594118c1
-
Filesize
953KB
MD52f4759c23abcd639ac3ca7f8fa9480ac
SHA19a3fece585fa01b7b941e124ead0c39c8ce9bc7c
SHA2566d66fa59407862e0fddfcb36472fe810eb308653321ca0e374ac870f9aa8cec6
SHA5126ab14d6a8d3e9a751d68133e734cc804de2b50a7ef223d484d0f727cdfbd00d48f6e0666c3b86a0daf9ca42c0b726f6c2a088e5bb32c993748abfea7b5904ec6