Analysis
-
max time kernel
364s -
max time network
1588s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/07/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe
Resource
win11-20240709-en
General
-
Target
BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe
-
Size
21.6MB
-
MD5
a7cd1c302ac2307e938cfdd72a5fa46e
-
SHA1
20ed0d49e19f881ca96ef313e4e86aa97ec3eac4
-
SHA256
eaa3dd23cc0aaa9920d42ab19fd77bc8a196ca769522e14410f7314dfcb8948e
-
SHA512
bce1aeaa0839ff2de7d5bece3181359d5089d1dc34fbe00221458f9a7dcabea2124c7000497d8fdda2b5d26ca99644e1c4ce1de310ddeca0721349cd6cff13cb
-
SSDEEP
393216:XZYRO8cf3CntDJWVb6K/S/wfUPKqbUkx3eEQG+13q0WYxEjZrJixUoXuSZ:XZYR2KtDVmS4fUXleH13LKjGx4e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1132 CustomerFWU2Point5.exe -
Loads dropped DLL 12 IoCs
pid Process 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe 1132 CustomerFWU2Point5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CustomerFWU2Point5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1132 4780 BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe 72 PID 4780 wrote to memory of 1132 4780 BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe 72 PID 4780 wrote to memory of 1132 4780 BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe"C:\Users\Admin\AppData\Local\Temp\BasiliskV3_0099_FirmwareUpdater_v1.02.00_r1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\CustomerFWU2Point5.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\CustomerFWU2Point5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD589d56e1b1f4b4624e1ec4028c3d43e2d
SHA1db3fe0c6b9c9bb34991d0131741c477a5fc063b0
SHA2562cd0f79eb0336567430694378719f14e0592c0a220d33255f231a8eeb1e3b2f1
SHA51214e4428dcc3aedb9ffca34be53dc8619d6d3f8ac0a9f5fdee7bb600acf94dff41de4a6e44378c28fce21668d01323146ab0955461ed4c313c49c0429937856f4
-
Filesize
145KB
MD599ab204d7c7c8a06348d4440ed3509b2
SHA14774b05f1696ab8812c0e21a23bed931efc83b99
SHA256a3abce1cf68f068df4987d9afcfa66135df19ab5579abf1959df4ec2e5408b74
SHA5126bc65cceed2409abd77b449c6beda63d50b994132b4f02200aa17e4b3aa2befc72ab08905f76371f577be5cc4a341bd98224017ec905fb3354a709c1b10c4d78
-
Filesize
102KB
MD57b384e81afee307038ff2f58464c0435
SHA15f21c129ba4512663fe3d21f6c4ae553fc633da7
SHA2563a6771f7184886605d49e9f2919ccdc9e1262d9bb4cf47710eea9497942fd7d9
SHA512e7430c4d888204291de50e6b1436d6bc7441f2674db3a1f59ebda560cb3de54c68bdb6f7a39ccf46505f64434f1bf5b12e6a905431d4bc3137062b1a7f745d85
-
Filesize
10KB
MD5f330db8b214a490c806427b60a0683f9
SHA11efc4410a250a412ec0c56d54baaac33df918878
SHA2565b5f6e2f139e4d484e0ade33630af6c123246646ee526c5d58549ce72f77fe19
SHA512206bfc19a9c7409b87226051e6ce5c9733cbb4e3c966b051cad84a410d6d1f455192198aceb899f2e56c765c8ba9115efc8c88d7a60500c1e3d926046cb760cb
-
Filesize
12.7MB
MD5afb4ff23613e4bd191fd1a12089df26d
SHA194637e22f12b58f84ef59b8b0beaa34f4580c8cd
SHA2565675cc57d5b6cd0c60bb18c467a5bc5ef4b4750b7b79b8eac6f9a92151de56c7
SHA5129bba6a5c8c17618050a1b45e2b60c8f23751c4b2d4802f5fafce60b58df4a518b12ee8e0c87856da3997b67771f72771bbdf314027abcc08c0368f7f1782c18e
-
Filesize
322KB
MD5de621fddf0cacd284279e20ab02a1fac
SHA12beb3cb14356d9700aaf13fcb7c5c358e9fed227
SHA256375d1457b1f78f62524efc9c46e8288065eb57ce1e830c6fb76d1c1c6cddda54
SHA512f9be1b0b854da6466cb181a2cf7ede4ec12b4a7c9ff2ea644304f4d157706fe5aea8c3e9fce4af5943f22e2e2cc564335ee17b1a4280c36040af59fdb8eb0bf9
-
Filesize
1.9MB
MD5d5cef51f625a67978890abc2e50247c9
SHA14e6419b9b71f9075a8562b685a6031e3146deb98
SHA2567dccfd96b16bc5ff172087487a8c724ef597b812a22b94651179f988c40bdb50
SHA5122af1297665deba7024f1b52cee81dc35126ec2639157915d27202a5918448cba2b0989985dae312902da7ebdb5746ea87688752ef2e742a6cf0617f58ad37efb
-
Filesize
21KB
MD5dec081ca650617a3ca9f54b8ec8ac61f
SHA15313c1a46c6835c59b12f151047c1157084abcbb
SHA256a194735a2ae6a76df56236ace5d316734a632f7caaf47932ce37ca760603d177
SHA512d6c57f27532f4c9356d45dca0928bf12768af66103dd06e7c6b2fd8293c0e3eda2a86f755056eca2a3d24a4eff59810b7a594ec31bda8bf52e43adacd8a830ed
-
Filesize
23KB
MD5d73fcf8da5ec0a15a0c00fe87ea8d32b
SHA1205e61419312a7fae29fad112e7395c425c9ad46
SHA256e31ce32dd66ef9e2ecc4ec4e5e94a5bb50ebbd4fa7fb698d754d057a245f8a6a
SHA512f8c79e324c5e090d60bc56b54b768a755e32d71460df6eaae9d0ccd9aac786707eaf3da2ddb61fa35cdb112a1da90757dbac52436d73a246ace2c2190e59ab8f