Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe
Resource
win10v2004-20240226-en
General
-
Target
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe
-
Size
743KB
-
MD5
b3c9bb42bca62dea8ba72b8c04200ead
-
SHA1
4a535112c45ea02782a154d271556a324110db52
-
SHA256
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c
-
SHA512
721d0f67c552b79ceb8fdef092e75de1308e062c6b783d220f992e5b9c001e07c40b8a416adee5da20292157057e81cfa3eb618d33f0ebd1e89b9d5355fd0a7b
-
SSDEEP
12288:B9uxWTNaFP2vTXhyy9cetos+cjMHeUT3VBoKfzY5gVNI3Ng+t:B9uxWTo52Thn9ce5675BoIz0gV6dvt
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2460) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exedescription ioc process File created C:\Program Files\Common Files\System\es-ES\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\System\fr-FR\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntry2019R_PrepidBypass-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WordCombinedFloatieModel.bin d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RCom.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSZIP.DIC d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_OEM_Perp-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WordInterProviderRanker.bin d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files (x86)\Common Files\System\msadc\fr-FR\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavutil.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_KMS_Client-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OSFPROXY.DLL d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCtxUICellModel.bin d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Mozilla Firefox\defaults\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OSM.OSM.x-none.msi.16.x-none.xml d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O17EnterpriseVL_Bypass30-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-phn.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProMSDNR_Retail-ul-phn.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.cpl d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msvcp140.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Adobe.Reader.Dependencies.manifest d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProXC2RVL_MAKC2R-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-ul-phn.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_KMS_Client-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\react-native-win32.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\VideoLAN\VLC\locale\am\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\VideoLAN\VLC\New_Skins.url d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Grace-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp-ul-phn.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Internet Explorer\uk-UA\iexplore.exe.mui d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\microsoft shared\ink\sl-SI\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-ul-oob.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-phn.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File created C:\Program Files\Common Files\microsoft shared\ink\hu-HU\readme.txt d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ppd.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Trial-pl.xrm-ms d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2744 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1348 vssvc.exe Token: SeRestorePrivilege 1348 vssvc.exe Token: SeAuditPrivilege 1348 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.execmd.exedescription pid process target process PID 4412 wrote to memory of 100 4412 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 4412 wrote to memory of 100 4412 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 4412 wrote to memory of 100 4412 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 100 wrote to memory of 2744 100 cmd.exe vssadmin.exe PID 100 wrote to memory of 2744 100 cmd.exe vssadmin.exe PID 4412 wrote to memory of 880 4412 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 4412 wrote to memory of 880 4412 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe PID 4412 wrote to memory of 880 4412 d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe"C:\Users\Admin\AppData\Local\Temp\d9d2838327c081a6daf9528c77ff3a8ac88e8ff73521b97d34af0d3da5807e7c.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵PID:880
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD5b4a2e3e446d794ab467364956096c047
SHA17b520a2b0b954a03ffd7fae189f933c94784f1c2
SHA2565c7f7d725ae586b8914eb7e4514a6a52189ca3dc32af6be20d5a404e3f7ff298
SHA5126f7d06b4b8a724372b5e3e6bf0881024bbc7a20a4d7c8b6a588ee65708b2c10a9d1862ae09102aa13eb02f089a1b8152ef87576bc14a953ac004c325594118c1