Analysis

  • max time kernel
    1s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 02:08

General

  • Target

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe

  • Size

    2.6MB

  • MD5

    523d6d251e5f8f9d7db1a3645967e72e

  • SHA1

    aca4932ac18f5c0227ee85e01da35a0b66285424

  • SHA256

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b

  • SHA512

    f4910a6c30e3f18564e77e47f5a2d0172775a880e39d93629de5c4094b22efc90c0d5c5518ed5952c7eeeb8861b55b2bdfac5a402fa11d1dac205d986046e05b

  • SSDEEP

    49152:vFDi8DIuiRIGgmGjunBD95D8L5ZtGtXaP4La47RvmcfXGhCz7CNyHbn877QZI1w:vXxYSm9BfDCn4tqP4W2RvhfXGQzOQHbJ

Malware Config

Extracted

Path

C:\Program Files (x86)\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 66e18026-1453-4fe2-8621-d51fcc9dc54e *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe
    "C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3452
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
        PID:3076
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
          3⤵
            PID:2496
            • C:\Windows\system32\vssadmin.exe
              C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:3444
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:3500
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:544
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:836

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\instructions_read_me.txt

              Filesize

              1KB

              MD5

              4fd4c95249ac102be0c05c6a1a329cb6

              SHA1

              4be08872b8145d645c2e6fa80a1c6921b8d4a902

              SHA256

              df149c57c4fe9dd19d37c27014cdb7a6a1c72f19f555c83d9b87210c132492d5

              SHA512

              b66b202beae41a49c862ca9b08b4010c302b67014cb73907fb27a8e5c87c9b0c9a1e661cc9706a60a97cd2c414e2ee2cbe39b07803e0f8d03ad311fb148c65a8

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133745549367426269.txt

              Filesize

              75KB

              MD5

              55917baf0b842ae59c51ca768cb5eb24

              SHA1

              933d1e6105779a8f69efec514a9d1b4c8ae575af

              SHA256

              5023f13e569762e619f8eaf803fd4af604aa1a36e6fedc9f8f78f3791dafeb99

              SHA512

              1f5061689f42fd9c185ff55e8280241042212e905317b7148a30802bd2cf193045f9226ccceabb30798ad617bb77037cdc88c5a9414f22802275f0f1ca887b1c

            • memory/836-682-0x00000205ED390000-0x00000205ED3B0000-memory.dmp

              Filesize

              128KB

            • memory/836-630-0x00000205DCCE0000-0x00000205DCD00000-memory.dmp

              Filesize

              128KB

            • memory/836-622-0x00000205DC840000-0x00000205DC860000-memory.dmp

              Filesize

              128KB

            • memory/836-589-0x00000205DB850000-0x00000205DB950000-memory.dmp

              Filesize

              1024KB

            • memory/836-596-0x00000205DC880000-0x00000205DC8A0000-memory.dmp

              Filesize

              128KB

            • memory/3076-10-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-17-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-16-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-15-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-585-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-11-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-14-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-0-0x0000000000310000-0x00000000003BD000-memory.dmp

              Filesize

              692KB

            • memory/3076-13-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-3-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB

            • memory/3076-1-0x0000000002740000-0x0000000002823000-memory.dmp

              Filesize

              908KB