Analysis

  • max time kernel
    1s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 02:12

General

  • Target

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe

  • Size

    2.6MB

  • MD5

    523d6d251e5f8f9d7db1a3645967e72e

  • SHA1

    aca4932ac18f5c0227ee85e01da35a0b66285424

  • SHA256

    11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b

  • SHA512

    f4910a6c30e3f18564e77e47f5a2d0172775a880e39d93629de5c4094b22efc90c0d5c5518ed5952c7eeeb8861b55b2bdfac5a402fa11d1dac205d986046e05b

  • SSDEEP

    49152:vFDi8DIuiRIGgmGjunBD95D8L5ZtGtXaP4La47RvmcfXGhCz7CNyHbn877QZI1w:vXxYSm9BfDCn4tqP4W2RvhfXGQzOQHbJ

Malware Config

Extracted

Path

C:\Program Files (x86)\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 66e18026-1453-4fe2-8621-d51fcc9dc54e *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe
    "C:\Users\Admin\AppData\Local\Temp\11129aad3b5baa1d118ec0ee3922278c194e43f6e2f0fcef221c65e5f4490d3b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3008
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
        PID:904
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
          3⤵
            PID:4100
            • C:\Windows\system32\vssadmin.exe
              C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:3868
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:2052
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:4648
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:2608
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:2904

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\instructions_read_me.txt

                Filesize

                1KB

                MD5

                4fd4c95249ac102be0c05c6a1a329cb6

                SHA1

                4be08872b8145d645c2e6fa80a1c6921b8d4a902

                SHA256

                df149c57c4fe9dd19d37c27014cdb7a6a1c72f19f555c83d9b87210c132492d5

                SHA512

                b66b202beae41a49c862ca9b08b4010c302b67014cb73907fb27a8e5c87c9b0c9a1e661cc9706a60a97cd2c414e2ee2cbe39b07803e0f8d03ad311fb148c65a8

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                Filesize

                2KB

                MD5

                b092deb29a0888b6a262b730d68eb3bd

                SHA1

                37f0332b581a5647060a2370d72746a95ed47f59

                SHA256

                f0a252f749d40f054e876fa96fdb4210a81690a4e51851198dd3dc70ae82d651

                SHA512

                22ee06ea047579624942436d7daadd834c89c35386c6ea2d9f79e6115f5136c862d3d8c20715fbfabd65e3d6ca5ecae32e91c912d45d45fffc016eb327285f2b

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133745551922176847.txt

                Filesize

                75KB

                MD5

                8f474e8ff027e3c366b417ffab73f270

                SHA1

                5d6f4c65ff8518e1ca26c40f81c22b16d76778ac

                SHA256

                7def31ddefe77cc71acf393ed6c86603fe3c501a14a06d65e02f4c887326266c

                SHA512

                ba198ace1daa2951b4158fe2c1bd9e87daedb3a9f2b492316c724df476fe1771c4a478c469cd353e793588c2e7f6fcaedd0ae3761ed9ffb42c24e24204109d3b

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\YCLWQ4BV\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                781c2d6d1f6f2f8ae243c569925a6c44

                SHA1

                6d5d26acc2002f5a507bd517051095a97501931b

                SHA256

                70687e419879f006d0c50c08657c66b1187b94ea216cfe0a2e6be8bd2de77bc8

                SHA512

                3599fa8f2ffe140a8f68ec735810d24a5b367a9a551d620baa6dc611ca755dce1a662bf22b90f842d499d2c9530fb8acd634d1654d5e2c1b319574cbf35eadf7

              • memory/904-580-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-12-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-13-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-11-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-10-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-16-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-17-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-15-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-0-0x0000000000920000-0x00000000009CD000-memory.dmp

                Filesize

                692KB

              • memory/904-1-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-3-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/904-14-0x00000000014A0000-0x0000000001583000-memory.dmp

                Filesize

                908KB

              • memory/2608-1173-0x000002103BD60000-0x000002103BD80000-memory.dmp

                Filesize

                128KB

              • memory/2608-1145-0x000002103B500000-0x000002103B520000-memory.dmp

                Filesize

                128KB

              • memory/2608-1113-0x000002103A700000-0x000002103A800000-memory.dmp

                Filesize

                1024KB

              • memory/2608-1120-0x000002103B540000-0x000002103B560000-memory.dmp

                Filesize

                128KB

              • memory/2904-2886-0x000002CDDE4D0000-0x000002CDDE4F0000-memory.dmp

                Filesize

                128KB

              • memory/2904-2880-0x000002CDDD560000-0x000002CDDD660000-memory.dmp

                Filesize

                1024KB

              • memory/2904-2915-0x000002CDDE490000-0x000002CDDE4B0000-memory.dmp

                Filesize

                128KB

              • memory/2904-3011-0x000002CDDE470000-0x000002CDDE490000-memory.dmp

                Filesize

                128KB