Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe
Resource
win10v2004-20241007-en
General
-
Target
2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe
-
Size
1.9MB
-
MD5
7c62976c8d0e7434b327ce3c402d8a62
-
SHA1
0d91b68c7b1a1fb5471258591676fcf89025e238
-
SHA256
2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759
-
SHA512
51e43e3d863ff2f549699653c27bf4e08aaabe1d3853a3ed0b2a713ac627295646ef309906ecf1765d9372fc653891c31c87b6bd39676a59ec5b12876e38d58c
-
SSDEEP
49152:qfM4iMoQz20361ERIJ0UWGtT069FKdqd:qfM4RoQz20KVsG+akdqd
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (4269) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe" 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\include\jawt.h 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\8080_20x20x32.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrfralm.dat 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\images\Square71x71Logo.scale-100.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-40_altform-lightunplated.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteWideTile.scale-400.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-180.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\RuntimeConfiguration.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\micaut.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsMedTile.contrast-white_scale-200.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_~_kzf8qxf38zg5c\instructions_read_me.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-400.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_2019.904.1644.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\StoreRatingPromotion.winmd 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OSFUI.DLL 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\TimerWideTile.contrast-white_scale-200.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense2019_eula.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-256.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-64_contrast-black.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.Specialized.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Common Files\System\ado\msado26.tlb 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_OEM_Perp-ul-oob.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-200.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-16_altform-unplated_contrast-black.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\FirstRunMailBlurred.layoutdir-LTR.jpg 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\GameBar_SplashScreen.scale-200.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_sv.properties 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\MicrosoftAccount.scale-100.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\instructions_read_me.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\YahooPromoTile.scale-200.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\instructions_read_me.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.X509Certificates.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.AccessControl.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Windows Media Player\mpvis.DLL 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\powerpoint.x-none.msi.16.x-none.tree.dat 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\instructions_read_me.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\jpeg_fx.md 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\libxslt.md 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019DemoR_BypassTrial180-ul-oob.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-runtime-l1-1-0.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedStoreLogo.scale-100.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\instructions_read_me.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-pl.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ul-oob.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-pl.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-localization-l1-2-0.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Java\jre-1.8\Welcome.html 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Primitives.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Emit.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial2-pl.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File created C:\Program Files (x86)\Microsoft.NET\instructions_read_me.txt 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Windows Media Player\uk-UA\wmpnscfg.exe.mui 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntryR_PrepidBypass-ul-oob.xrm-ms 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\TXP_DiningReservation_Light.png 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ccme_base.dll 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe File opened for modification C:\Program Files\Windows Media Player\wmpnscfg.exe 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3972 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xuy08dak6\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xuy08dak6\DefaultIcon 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xuy08dak6 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 5112 vssvc.exe Token: SeRestorePrivilege 5112 vssvc.exe Token: SeAuditPrivilege 5112 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4308 5064 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe 88 PID 5064 wrote to memory of 4308 5064 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe 88 PID 5064 wrote to memory of 4308 5064 2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe 88 PID 4308 wrote to memory of 3972 4308 cmd.exe 90 PID 4308 wrote to memory of 3972 4308 cmd.exe 90 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe"C:\Users\Admin\AppData\Local\Temp\2413841b2f5f656e269f61644d3957847b199107bb6b141c3208a03df59f0759.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3972
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56c9d880ec05571bddccc87024900a16a
SHA1755249de858335b5f093aaedb35702b703a31800
SHA256aebc04130914171934740c1815a9c762bdf5d829c5e69a4038e45716402cbf41
SHA5123e9bc0b1cdf86a19c7c33f0fcd728ceec86d864c745e736ea5c9d36ac19916cd19c22622158d2344dbd0731e208ab093f06667cf9b6a97a277993404d17180ec