Analysis

  • max time kernel
    84s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 17:09

General

  • Target

    3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe

  • Size

    928KB

  • MD5

    2dc4adf06247b4ed9031a53ef910626c

  • SHA1

    789437e946b3e8d1ccd14ee70e42c7d89ba054b2

  • SHA256

    3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e

  • SHA512

    9e6eaa4b27e2d6bc1306c33e74465256fab086972680d3a0014cafca8f22bbf865ffaa0f81332ffef83287252faf2ca0c7f369d11412b19ffb57e8e72ea5e0ae

  • SSDEEP

    24576:oUY29aeV/XqzB+qv6w8zJx/W2nz9dPOmX:oUYMPqzFvT8/W2nznP

Malware Config

Extracted

Path

C:\ProgramData\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: 41bdf082-8936-4e21-9f70-5446160a730f
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (2649) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
    "C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2500
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\vssadmin.exe
        C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2836
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\readme.txt

    Filesize

    394B

    MD5

    b17425a4db71b2ef8b7decd01038e502

    SHA1

    7e761bce96cc3033dec3a1c61d2672c6fbae3718

    SHA256

    36c359b9db03e7a6df3c37a25b16c53a71d6a866e6332faf203f19ddbfc1ed68

    SHA512

    fbe107f9275231e2e2dbbd80475d51e641a38fd24241366c3af0ed14d0f383bd9de731f2ed8b355c40a68008a6d80dbfb4008e06fd2538483bb8388c7085f636

  • C:\Users\Public\Music\Sample Music\Kalimba.mp3.basta

    Filesize

    8.0MB

    MD5

    9ce075c297fb66e9eb829df004d9f296

    SHA1

    b8d0db4a6e5b9aeae80ef1336553dda8d0673770

    SHA256

    dc5765daac91a333e6d43e8bce409e56e298b7f92f13d48e8a022e35134df57f

    SHA512

    5387f76e31ebcf1e9873b5ed6920fada39b4f6858fda627691e957a1940661fe119fb462ac3aa7d46cc0287bb32fb380f61384bc1e1c2c08c69fde22b465352e

  • C:\Users\Public\Music\Sample Music\Maid with the Flaxen Hair.mp3.basta

    Filesize

    3.9MB

    MD5

    1b9a49edb9768e7dc3180a615204ef92

    SHA1

    e787c42b11aa01ed340b2f5181f444cbb3a9b84b

    SHA256

    badf6be2fc0958336b5e3b2c228273777f468267c7c4c0a578f4356d81b74c42

    SHA512

    e4c51d13b79df1a9ba631cca5edf0da41119c0fb8bba2397375ce9405974ba83b7242b99051806d15d4bc566331111c31a702e2325211b52ba2ff6da7e49fe13

  • C:\Users\Public\Music\Sample Music\Sleep Away.mp3.basta

    Filesize

    4.6MB

    MD5

    7c613861f6b20abb7c6e78b84cb3dde8

    SHA1

    89049d1884df3adaa8550d226be68a3fbad13a7f

    SHA256

    d8aba874f9aa405b38d1df830b72a53a97a2bc5504e234e9ab1f942f890e4e75

    SHA512

    7f62f26cae99d83ed8709e7a308600f86be58c56091a6e04dd5129d8d80e4e98fda29511b43a69aecfa8cc0f3ecbf0346f1f0bf117e65007c31f981a40ea3d0b

  • C:\Users\Public\Pictures\Sample Pictures\Chrysanthemum.jpg.basta

    Filesize

    859KB

    MD5

    609e54493edf3bb0707d55d30caa0447

    SHA1

    ad1536552f9a874e8053dc457efdf293c778b618

    SHA256

    0da779abaf00bbf82591eaecf13a2ae2f8f7a656396a59f9c6d80a218f3e7de3

    SHA512

    28de3ed5478944418c02cbb85512711c3a073e436306acc883ec657a59beb183873f10f26e02874a897df680c18794d17380577c6bb97997871ec75a94252dff

  • C:\Users\Public\Pictures\Sample Pictures\Desert.jpg.basta

    Filesize

    826KB

    MD5

    a6bd699aee507cdd815b41fb517c9ddb

    SHA1

    d7154a9c367b4ad3c67963c5eb671f4c243d9959

    SHA256

    7dc083e1ea9db52e4229d81790575c855fe815aeda45c58830eedcd89dca69ad

    SHA512

    e3dafe8094b7b5f03448650090cb6711b278c469638e471ce3a30d51fc5ad191bfaca23fb84be60e8c88719c9ad3fc762e9c63805e2fdd8c8a55881ace42ea69

  • C:\Users\Public\Pictures\Sample Pictures\Hydrangeas.jpg.basta

    Filesize

    581KB

    MD5

    f45ebebb8f62034dc36af1ecfeb27485

    SHA1

    e232931250555978db6708b792ec754a0d38635b

    SHA256

    e7746092ed2cf0e460caee7e85a9aacad1f67296209641dc0daabaadc0a9c46e

    SHA512

    d3299cf7a689254b646a470662932c6b5d41082b0c051f320129e0343d7f82d4ca785c57cab67b2a2cb37c3794f334e43c63439519b4d5e587d97d324f492d44

  • C:\Users\Public\Pictures\Sample Pictures\Jellyfish.jpg.basta

    Filesize

    758KB

    MD5

    79f8905280f53e59ba596dc9af636818

    SHA1

    932f145ada50e93b8fb39dbcd0ccd193232a9276

    SHA256

    f5b363c2d5b8cabb7ce532334f778d86d3a8db894a380a703ef442dedbd12348

    SHA512

    52e9302d383376e7e687a91a0ced7f323e1454c85dba34bf0d9b026ed5b953487722b8f108e801ffb3b43b3fd7c9315d4e022e50980cd24ea0b92c6225fcb907

  • C:\Users\Public\Pictures\Sample Pictures\Koala.jpg.basta

    Filesize

    763KB

    MD5

    44107657fef5d513583701a02c5198bd

    SHA1

    a52ccfb916c50e96b88eb370ad8c0f0579545060

    SHA256

    47cba0756d62a687957ee11cede96741856c5459e4656a6cd878c375fc0f74c1

    SHA512

    1cdcbf68d8b3aad6fd33dec37f91d8e0992ba5d65d24bc0b3525d4695af64231bf2a9d9e0ec6abb5a07195e40061fe032f90892c60760136d4aae2f7bb520735

  • C:\Users\Public\Pictures\Sample Pictures\Lighthouse.jpg.basta

    Filesize

    548KB

    MD5

    4acd753c011908596acd1741dd4a520c

    SHA1

    eb05e5e2bdef9c85f866d772c0df6b174b12dc20

    SHA256

    f521f68f678c001981a70fbb9c8d4e859e1f4e6f8accc1f455bfc6d05ec2820a

    SHA512

    2af780044551bfd2d061c428e39055e731551fb10eece584044dc19d7c47cab22ffeac8168b32b5747172954a3e43612362b119d5f24d1f055b4d3c0b5235b97

  • C:\Users\Public\Pictures\Sample Pictures\Penguins.jpg.basta

    Filesize

    760KB

    MD5

    9b0bc20a2283ef403c962e42b2add4dd

    SHA1

    d18f386cb0cf2ac66fe7bd54de8ec769334e2878

    SHA256

    1370d378fabe991a894ea94f4290c1874416d3e6c45f4a1f497dd7305d48c422

    SHA512

    215c20245a485c5ed952084621c13e24f03070f4dd3d4b26cdc9f6d9b0f7336b2094ea491779d7e11a0fa095748a4f89569b72b371c750d2cfbb3896530d9873

  • C:\Users\Public\Pictures\Sample Pictures\Tulips.jpg.basta

    Filesize

    606KB

    MD5

    ac24c929dfa821bfe7f4181726dc1292

    SHA1

    556be186ea5cd93ab5500b552c446c3858ea3671

    SHA256

    d2bf26d14bfec404772b5f142d078b2504ab11614823b476797039bc01b5f703

    SHA512

    7283cd14e4e089002821a3c00dd2b00cfe56459c2ec8785d2faea9b52f85a0a4e03910aaf878769673092a6453d9b07dc3b4a5633fb5d5d89f21754e7fb016fd

  • C:\Users\Public\Videos\Sample Videos\Wildlife.wmv.basta

    Filesize

    25.0MB

    MD5

    795725e20f9537767af694043a0d798e

    SHA1

    557a63b5aad4484e1038dcc55de0922881be05e7

    SHA256

    71dfc9c35b37b37784472bdff5a9a56770b47e77adba8d6b93771b63b558324d

    SHA512

    7b473d6654ac487191d27b091277fe110053672adb712fe32ea261863fcba73277e0b263d03578ab1936578f957ef9f64a1829a7bea2252358459df69b358631

  • memory/1940-23-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-18-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-6-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-10-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-12-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-14-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-17-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-12628-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-20-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-0-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-24-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-26-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-4-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB

  • memory/1940-8-0x0000000000350000-0x00000000003DE000-memory.dmp

    Filesize

    568KB