Analysis

  • max time kernel
    127s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2024 06:47

General

  • Target

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe

  • Size

    2.6MB

  • MD5

    523d6d251e5f8f9d7db1a3645967e72e

  • SHA1

    aca4932ac18f5c0227ee85e01da35a0b66285424

  • SHA256

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b

  • SHA512

    f4910a6c30e3f18564e77e47f5a2d0172775a880e39d93629de5c4094b22efc90c0d5c5518ed5952c7eeeb8861b55b2bdfac5a402fa11d1dac205d986046e05b

  • SSDEEP

    49152:vFDi8DIuiRIGgmGjunBD95D8L5ZtGtXaP4La47RvmcfXGhCz7CNyHbn877QZI1w:vXxYSm9BfDCn4tqP4W2RvhfXGQzOQHbJ

Malware Config

Extracted

Path

C:\Program Files\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 66e18026-1453-4fe2-8621-d51fcc9dc54e *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Blackbasta family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe
    "C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\system32\vssadmin.exe
          C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:2548
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c start /MAX notepad.exe c:\instructions_read_me.txt
        3⤵
          PID:1948
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe c:\instructions_read_me.txt
            4⤵
            • Opens file in notepad (likely ransom note)
            PID:2096
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2120

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\instructions_read_me.txt

      Filesize

      1KB

      MD5

      4fd4c95249ac102be0c05c6a1a329cb6

      SHA1

      4be08872b8145d645c2e6fa80a1c6921b8d4a902

      SHA256

      df149c57c4fe9dd19d37c27014cdb7a6a1c72f19f555c83d9b87210c132492d5

      SHA512

      b66b202beae41a49c862ca9b08b4010c302b67014cb73907fb27a8e5c87c9b0c9a1e661cc9706a60a97cd2c414e2ee2cbe39b07803e0f8d03ad311fb148c65a8

    • memory/1224-17-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-16-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-4-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-6-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-14-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-13-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-2-0x0000000000150000-0x00000000001FD000-memory.dmp

      Filesize

      692KB

    • memory/1224-0-0x0000000000150000-0x00000000001FD000-memory.dmp

      Filesize

      692KB

    • memory/1224-15-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-18-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-19-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-20-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-3-0x0000000000150000-0x00000000001FD000-memory.dmp

      Filesize

      692KB

    • memory/1224-11848-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB

    • memory/1224-11864-0x0000000002790000-0x0000000002873000-memory.dmp

      Filesize

      908KB