Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 02:33

General

  • Target

    3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe

  • Size

    928KB

  • MD5

    2dc4adf06247b4ed9031a53ef910626c

  • SHA1

    789437e946b3e8d1ccd14ee70e42c7d89ba054b2

  • SHA256

    3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e

  • SHA512

    9e6eaa4b27e2d6bc1306c33e74465256fab086972680d3a0014cafca8f22bbf865ffaa0f81332ffef83287252faf2ca0c7f369d11412b19ffb57e8e72ea5e0ae

  • SSDEEP

    24576:oUY29aeV/XqzB+qv6w8zJx/W2nz9dPOmX:oUYMPqzFvT8/W2nznP

Malware Config

Extracted

Path

C:\ProgramData\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: 41bdf082-8936-4e21-9f70-5446160a730f
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (6702) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
    "C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2428
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\vssadmin.exe
        C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
        3⤵
        • System Location Discovery: System Language Discovery
        • Interacts with shadow copies
        PID:2172
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\readme.txt

    Filesize

    394B

    MD5

    b17425a4db71b2ef8b7decd01038e502

    SHA1

    7e761bce96cc3033dec3a1c61d2672c6fbae3718

    SHA256

    36c359b9db03e7a6df3c37a25b16c53a71d6a866e6332faf203f19ddbfc1ed68

    SHA512

    fbe107f9275231e2e2dbbd80475d51e641a38fd24241366c3af0ed14d0f383bd9de731f2ed8b355c40a68008a6d80dbfb4008e06fd2538483bb8388c7085f636

  • C:\Users\Public\Music\Sample Music\Kalimba.mp3.basta

    Filesize

    8.0MB

    MD5

    d99e62116efa31e342b4be26df032dba

    SHA1

    68afde0f6229ed6b944af05359c9674cd5c8d01b

    SHA256

    3fd54aee0b842e4166bcbe2d8dc517eb7039cf9d3c8164ab744b8e39dbdecc74

    SHA512

    7dd64829da110732b9cf8f6d61376d1422e73ec47fd185cb0859ce3dced2accf3d7d5ecd6a0471c85252dd6c933f268c2076e8558574c7770cde8ab694bb672b

  • C:\Users\Public\Music\Sample Music\Maid with the Flaxen Hair.mp3.basta

    Filesize

    3.9MB

    MD5

    84b1caf533ffa8ee22599d27b9837685

    SHA1

    e7dbba65bbc62c709649cbb9c30634187e5d03e3

    SHA256

    15ab61bf455b6e8882bfe31556e1862731a6cec34ca8aae775bb2fc263b2bb3b

    SHA512

    b0d9947f295f8cee91032b2c6ef06be18fd6ada5db4f5aab02c21db1105ebc344f993ca0a11c8e56bc60d18ecb1aa18edf7a7faeb2cad70d049ce0d6da3ac704

  • C:\Users\Public\Music\Sample Music\Sleep Away.mp3.basta

    Filesize

    4.6MB

    MD5

    aacd17cd11545d183b76c67e191921f5

    SHA1

    29185c678752a930c56d6c0cfb6f25f9d5ff2327

    SHA256

    983414deb7b9112cfe0c6e0547479ff10992937e255573a952b6d9bd36b6670f

    SHA512

    b973f773e3794969896d95de71192ab4170ebd1fe2a453c152ddb3c638271ff6423f5f2e1126f606c55a85ba33e48aa928add613971080e71ce7dd0bc50e2e4d

  • C:\Users\Public\Pictures\Sample Pictures\Chrysanthemum.jpg.basta

    Filesize

    859KB

    MD5

    3526b349a038939a2f60fb32f800dfe7

    SHA1

    1252f056e153718f0a5bcaa49a0138101d3b3e98

    SHA256

    2bc4108eeeac18889403f75f87dbdab9416c8e3e4ece2855b72dbb741f600d32

    SHA512

    ceb4c903a8ea994b69c47f78b0bd6dbe499176d0b626a23faf41a8816363ccddc1dd2eb7b1724eb16c97f9188de2df9503814aa37933f5bb17a1405c467e5923

  • C:\Users\Public\Pictures\Sample Pictures\Desert.jpg.basta

    Filesize

    826KB

    MD5

    fec1460ee787349aa4efcb0de5aa6d77

    SHA1

    ec5eb1512584bdafdccf17982b52168e99208c3e

    SHA256

    f2bc2b985fe64523a20231829ac7882d7b8bf8bcfc47d182ae22d5931ee353b2

    SHA512

    20b96b88a749433d19646e0b16146ab5068e521c170038c8673d794b3e31b806630a58b64048fa921cf01fecf84dfa242ab0808123bb908bb5327f0452700381

  • C:\Users\Public\Pictures\Sample Pictures\Hydrangeas.jpg.basta

    Filesize

    581KB

    MD5

    835e005b9902dba5191394ad81ce4da5

    SHA1

    c922a54ccf932ce82c31955c25766899f0a51dcd

    SHA256

    13ef42ac5b31189b887b89b867028bc63a18a33ca909d39641a9f2bc66f436cd

    SHA512

    77a94ade965bfe46de9d6998faf2327f7fe509755e5ad9338bcb0f4272bd87739130c0c2d9a967bfe5c3bd55d3ee955c2725567611c41d77ba7ef5530ee0c344

  • C:\Users\Public\Pictures\Sample Pictures\Jellyfish.jpg.basta

    Filesize

    758KB

    MD5

    f5b794f81eb1403fea0f42deeba1be7b

    SHA1

    513b523643a6a9ad4091554f89f001f12360004f

    SHA256

    a249c6b04c4120b4cf50a230bbfeade1d705f2edf315f8cadb3bc480f7c19c01

    SHA512

    211a79660396efce30cc8087b83b599a32c85925803c3c5f67748695cf4199f13b5e9fb0b2d74d1e2f1ae9955dfa46734721e69b7bd443d4a60b4b00f16b4661

  • C:\Users\Public\Pictures\Sample Pictures\Koala.jpg.basta

    Filesize

    763KB

    MD5

    b8c726e4fdf31c3c142b490e3c8af7f4

    SHA1

    f44f9eccbb569bbf9dcab7a0a28f02fe0603d1f2

    SHA256

    5dad253a7e364f791e8b50b35654960b1dffcf2f22783e2ed86130d9d780186e

    SHA512

    9c401633d223187942ffafc3c01820ed404f53bb6018ffed672bbb88c84d7f013384fd5836e17ab417af1b7f2509182fd77d73b08143dbbf1de2c155af264d70

  • C:\Users\Public\Pictures\Sample Pictures\Lighthouse.jpg.basta

    Filesize

    548KB

    MD5

    fc4b8b5264f3ac28233dad5bf5b02196

    SHA1

    6d0e75571aed71881bce1065d1d8aa31d8e32d34

    SHA256

    f192d26af87983c5006ba3ad649e7d220e95b1a0f96d32e54ebd581f204afdfd

    SHA512

    50322620f93c74948038d0a5dacef8f923c16c7be8e2568c911d3aee5c69441198f4b7d9e6ca042938b182f81ed9bc63a983e025830574039a843f1063672f3f

  • C:\Users\Public\Pictures\Sample Pictures\Penguins.jpg.basta

    Filesize

    760KB

    MD5

    e103cb746dd2b9ed0ff783f65f2f8de8

    SHA1

    abc0c504d48387adf3a50ac908e32ed940783aee

    SHA256

    d3622802356b53a6f497cf7b0e0288bbe3d8510acc5bf86b6a45ce35085cd2ec

    SHA512

    cc61e62921336659d98e3c778afbbaf2a8833304071b9f50872cf0f303a67fbc13875e2671b1831db68775d8827a76fc5dac5a6d59dbead0e6f17ecf9b65ce80

  • C:\Users\Public\Pictures\Sample Pictures\Tulips.jpg.basta

    Filesize

    606KB

    MD5

    0d96186d566113c79eea6ee9f44a7dd2

    SHA1

    142d99380bef9fa33a7a509e68ffd62696232dcb

    SHA256

    446fbbd08b190819991e3e174c6151aba91973f35aa12357c329756904f61cb8

    SHA512

    256fd884689c82daa0e2c418a09673920f79fe6ee0c6f5b214630f382bd83e8ed379be6fe7248cc641a58a8552b8d0b3ac4c9041427c658e620019d986062bca

  • C:\Users\Public\Videos\Sample Videos\Wildlife.wmv.basta

    Filesize

    25.0MB

    MD5

    2744e01188c30b8992183277299cbdab

    SHA1

    138c0b22bd18c06ab860ef24a5a1fa923f338f4d

    SHA256

    52d4ee3217aef49e01a91793d2c780c7843439244db9e83703e070940b4f840f

    SHA512

    92431cccc1c0126aa09aec1ec60b041fccfd4605d92270d178f80af555b802a53e3d1c508ea91d27b80ee614dc44f5f3ea5bd277f6223a71a9a112cbafa91f45

  • memory/2980-22243-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22229-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-10-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-16-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-11-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-0-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22249-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22247-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22245-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22241-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22238-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22235-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22232-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-4-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22226-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22223-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22220-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22215-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22212-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22253-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22258-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22260-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22256-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22252-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22263-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2980-22266-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB