Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 12:37
Behavioral task
behavioral1
Sample
tmp9_c0xj_s.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
tmp9_c0xj_s.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
tmp9_c0xj_s.exe
-
Size
563KB
-
MD5
3f400f30415941348af21d515a2fc6a3
-
SHA1
bd0bf9c987288ca434221d7d81c54a47e913600a
-
SHA256
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa
-
SHA512
0d4c3ee8807bbbf635ce2d1ce1b747c23cc2724ff999580169e5514c7c97109083bea169bd6a5f8be35f3b679bb8446839fcc7a38f78503658eda306bec69154
-
SSDEEP
12288:TFx0B/O7JxPzW9JPlHKtxYRkG7zLfpXE6SbJ:Rx7zW9JPlGskG1v
Malware Config
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 1892 bcdedit.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" tmp9_c0xj_s.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9_c0xj_s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2676 vssadmin.exe 2984 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon tmp9_c0xj_s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta tmp9_c0xj_s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" tmp9_c0xj_s.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 2884 vssvc.exe Token: SeRestorePrivilege 2884 vssvc.exe Token: SeAuditPrivilege 2884 vssvc.exe Token: SeShutdownPrivilege 2772 shutdown.exe Token: SeRemoteShutdownPrivilege 2772 shutdown.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2788 2636 tmp9_c0xj_s.exe 31 PID 2636 wrote to memory of 2788 2636 tmp9_c0xj_s.exe 31 PID 2636 wrote to memory of 2788 2636 tmp9_c0xj_s.exe 31 PID 2636 wrote to memory of 2788 2636 tmp9_c0xj_s.exe 31 PID 2788 wrote to memory of 2676 2788 cmd.exe 33 PID 2788 wrote to memory of 2676 2788 cmd.exe 33 PID 2788 wrote to memory of 2676 2788 cmd.exe 33 PID 2788 wrote to memory of 2676 2788 cmd.exe 33 PID 2636 wrote to memory of 2568 2636 tmp9_c0xj_s.exe 36 PID 2636 wrote to memory of 2568 2636 tmp9_c0xj_s.exe 36 PID 2636 wrote to memory of 2568 2636 tmp9_c0xj_s.exe 36 PID 2636 wrote to memory of 2568 2636 tmp9_c0xj_s.exe 36 PID 2568 wrote to memory of 2984 2568 cmd.exe 38 PID 2568 wrote to memory of 2984 2568 cmd.exe 38 PID 2568 wrote to memory of 2984 2568 cmd.exe 38 PID 2568 wrote to memory of 2984 2568 cmd.exe 38 PID 2636 wrote to memory of 1744 2636 tmp9_c0xj_s.exe 39 PID 2636 wrote to memory of 1744 2636 tmp9_c0xj_s.exe 39 PID 2636 wrote to memory of 1744 2636 tmp9_c0xj_s.exe 39 PID 2636 wrote to memory of 1744 2636 tmp9_c0xj_s.exe 39 PID 2636 wrote to memory of 2776 2636 tmp9_c0xj_s.exe 42 PID 2636 wrote to memory of 2776 2636 tmp9_c0xj_s.exe 42 PID 2636 wrote to memory of 2776 2636 tmp9_c0xj_s.exe 42 PID 2636 wrote to memory of 2776 2636 tmp9_c0xj_s.exe 42 PID 2636 wrote to memory of 2072 2636 tmp9_c0xj_s.exe 44 PID 2636 wrote to memory of 2072 2636 tmp9_c0xj_s.exe 44 PID 2636 wrote to memory of 2072 2636 tmp9_c0xj_s.exe 44 PID 2636 wrote to memory of 2072 2636 tmp9_c0xj_s.exe 44 PID 2072 wrote to memory of 1892 2072 cmd.exe 46 PID 2072 wrote to memory of 1892 2072 cmd.exe 46 PID 2072 wrote to memory of 1892 2072 cmd.exe 46 PID 2072 wrote to memory of 1892 2072 cmd.exe 46 PID 2636 wrote to memory of 2588 2636 tmp9_c0xj_s.exe 47 PID 2636 wrote to memory of 2588 2636 tmp9_c0xj_s.exe 47 PID 2636 wrote to memory of 2588 2636 tmp9_c0xj_s.exe 47 PID 2636 wrote to memory of 2588 2636 tmp9_c0xj_s.exe 47 PID 2588 wrote to memory of 2772 2588 cmd.exe 49 PID 2588 wrote to memory of 2772 2588 cmd.exe 49 PID 2588 wrote to memory of 2772 2588 cmd.exe 49 PID 2588 wrote to memory of 2772 2588 cmd.exe 49 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp9_c0xj_s.exe"C:\Users\Admin\AppData\Local\Temp\tmp9_c0xj_s.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set safeboot network2⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\bcdedit.exe /set safeboot network2⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\bcdedit.exe /set safeboot network2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\bcdedit.exeC:\Windows\SysNative\bcdedit.exe /set safeboot network3⤵
- Modifies boot configuration data using bcdedit
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C shutdown -r -f -t 02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -f -t 03⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2764
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2900