Analysis

  • max time kernel
    2s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2024 06:47

General

  • Target

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe

  • Size

    2.6MB

  • MD5

    523d6d251e5f8f9d7db1a3645967e72e

  • SHA1

    aca4932ac18f5c0227ee85e01da35a0b66285424

  • SHA256

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b

  • SHA512

    f4910a6c30e3f18564e77e47f5a2d0172775a880e39d93629de5c4094b22efc90c0d5c5518ed5952c7eeeb8861b55b2bdfac5a402fa11d1dac205d986046e05b

  • SSDEEP

    49152:vFDi8DIuiRIGgmGjunBD95D8L5ZtGtXaP4La47RvmcfXGhCz7CNyHbn877QZI1w:vXxYSm9BfDCn4tqP4W2RvhfXGQzOQHbJ

Malware Config

Extracted

Path

C:\Program Files (x86)\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 66e18026-1453-4fe2-8621-d51fcc9dc54e *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe
    "C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3952
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
        PID:348
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
          3⤵
            PID:216
            • C:\Windows\system32\vssadmin.exe
              C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:1104
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:5096
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:4448
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:2132

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\instructions_read_me.txt

              Filesize

              1KB

              MD5

              4fd4c95249ac102be0c05c6a1a329cb6

              SHA1

              4be08872b8145d645c2e6fa80a1c6921b8d4a902

              SHA256

              df149c57c4fe9dd19d37c27014cdb7a6a1c72f19f555c83d9b87210c132492d5

              SHA512

              b66b202beae41a49c862ca9b08b4010c302b67014cb73907fb27a8e5c87c9b0c9a1e661cc9706a60a97cd2c414e2ee2cbe39b07803e0f8d03ad311fb148c65a8

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133744852496061152.txt

              Filesize

              75KB

              MD5

              310d178e88314bd8c3ffaf1e0f54babe

              SHA1

              e526f7494930214e8bbcce012a71f71859a0a2b1

              SHA256

              b341ad61ab5248be28ac4ef98249e8153fa5920b934681cf109c5784e95d16ee

              SHA512

              0f772dea12a0595f4bd8cb027ea92c3507775aad1990215aecec3a4ab64e562324ba8952681c29e4321e2a4cb2471262101e70445a0e95d428e1541d3d709fdd

            • memory/348-15-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-16-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-12-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-13-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-14-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-11-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-0-0x0000000000600000-0x00000000006AD000-memory.dmp

              Filesize

              692KB

            • memory/348-10-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-17-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-4-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-583-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/348-1-0x0000000002900000-0x00000000029E3000-memory.dmp

              Filesize

              908KB

            • memory/2132-591-0x00000194DCBE0000-0x00000194DCCE0000-memory.dmp

              Filesize

              1024KB

            • memory/2132-615-0x00000194DD7D0000-0x00000194DD7F0000-memory.dmp

              Filesize

              128KB

            • memory/2132-631-0x00000194DE000000-0x00000194DE020000-memory.dmp

              Filesize

              128KB

            • memory/2132-596-0x00000194DDA20000-0x00000194DDA40000-memory.dmp

              Filesize

              128KB