Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
BlackBasta_03.bin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BlackBasta_03.bin.exe
Resource
win10v2004-20241007-en
General
-
Target
BlackBasta_03.bin.exe
-
Size
716KB
-
MD5
ac625552601c190656dcb8cf4c21cd1d
-
SHA1
acad7a91c2812a0652d62f252774454c217666e9
-
SHA256
03309c90e6c60a2e3cd44374efa3003ae10cd9e05ba6a39c77aa5289b32cb969
-
SHA512
9e04dbbc624e808a678e64648dbc12deb286341876ea4590d50f996732dde2b91c6b7defbffcbdd3883c74a98488a0ad26540b364942d3117625770bc4e5e6d3
-
SSDEEP
12288:nB6xrkyoUKbidQN0M2TNK36YPiCuL1+jZ5tXdAD6x/NJxaZUzrd9gW6PdrO5SAou:nwrkyoUGJJgWQrOUAua
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9743) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt BlackBasta_03.bin.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI BlackBasta_03.bin.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" BlackBasta_03.bin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core.jar BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\TAB_OFF.GIF BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00012_.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241773.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0251871.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_COL.HXT BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\OMSMMS.CFG BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\HEADER.GIF BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\bckgRes.dll.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_mlp_plugin.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18238_.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CONTACTL.ICO BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Resolute BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jre7\bin\deploy.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00068_.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Earthy.gif BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\deployJava1.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-sendopts_zh_CN.jar BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Regina BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cambridge_Bay BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGREPFRM.XML BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\PREVIEW.GIF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR1F.GIF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Form_StatusImageMask.bmp BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jre7\bin\kcms.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Darwin BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00413_.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libdvbsub_plugin.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-api_zh_CN.jar BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14980_.GIF BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\promointl.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\it.pak BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignleft.gif BlackBasta_03.bin.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WWINTL.DLL.IDX_DLL BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGN.XML BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\t2k.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\MedianFax.Dotx BlackBasta_03.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsftp_plugin.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\de-DE\msaddsr.dll.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME50.CSS BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert_5.5.0.165303.jar BlackBasta_03.bin.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\Chess.exe.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\ShapeCollector.exe.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.Royale.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143750.GIF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.DesignTime.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe BlackBasta_03.bin.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00426_.WMF BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.LEX BlackBasta_03.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libadpcm_plugin.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.sun.el_2.2.0.v201303151357.jar BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewAttachmentIconsMask.bmp BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_justify.gif BlackBasta_03.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libgnutls_plugin.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Web.Entity.Resources.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\Office64MUISet.XML BlackBasta_03.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Slipstream.xml BlackBasta_03.bin.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2804 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon BlackBasta_03.bin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta BlackBasta_03.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" BlackBasta_03.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2312 vssvc.exe Token: SeRestorePrivilege 2312 vssvc.exe Token: SeAuditPrivilege 2312 vssvc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2688 1036 BlackBasta_03.bin.exe 32 PID 1036 wrote to memory of 2688 1036 BlackBasta_03.bin.exe 32 PID 1036 wrote to memory of 2688 1036 BlackBasta_03.bin.exe 32 PID 1036 wrote to memory of 2820 1036 BlackBasta_03.bin.exe 34 PID 1036 wrote to memory of 2820 1036 BlackBasta_03.bin.exe 34 PID 1036 wrote to memory of 2820 1036 BlackBasta_03.bin.exe 34 PID 2820 wrote to memory of 2804 2820 cmd.exe 36 PID 2820 wrote to memory of 2804 2820 cmd.exe 36 PID 2820 wrote to memory of 2804 2820 cmd.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlackBasta_03.bin.exe"C:\Users\Admin\AppData\Local\Temp\BlackBasta_03.bin.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵PID:2688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2804
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2312
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD5ff661a42071a777d8fed3b587d062834
SHA1b252a1ec08506c23ff99ba343daf15e5ff69e6b9
SHA25688cdaa00b27e88a0fb1851cbe59d1365ac7b625ff535e1e68451ecf48928da8e
SHA51211c582f053ec64e4e398a8d3c7c5c36fc76deb4a3b9c569ae7475e8c7b1f1673779fac8dfa84eae6bb4f8efee2cde16d186686afa1c4dd5a472366789ec9d6a1
-
Filesize
8.0MB
MD50c029f01f18509abae8c55038078a61a
SHA1866f19a335c045df6df40ff7a01c1ef5ae4c2816
SHA2567b47c2032d84ff2ee93959a4d7c9d7115b4ad74baf3cd2dff4e68c4ff494c6f5
SHA512f04407b674dd365e1dc556c74dbd2fcdc2cb3500b8c07ec3ea41fff3fd53f0c4227351a4dab35e676219eb13c1dcc2e353412ddab933382835d1531602427a0b
-
Filesize
3.9MB
MD5b00986ed3c5c042949b327a00a9a567f
SHA14412435b9b673952647d39d9e82e165b34baf4c4
SHA25634e05472c8e1ea2aa1291f53d3ea1ae52017b56b5943c4c0e21cf1b45a8fdd16
SHA5123d9de3db5f3f3ebe1c1672af1ae069aec0ccbabe57859c05e4d6de6454985cd393c14c1eb5d6b3d90031c714a5af7e30ca6021d6432b8f50a7eec184f4c8ec27
-
Filesize
4.6MB
MD590248197996883ad7cbdb433c1bbbc16
SHA186b768588ea46fa2d512079170a1a3da6ef09693
SHA256c415862a3d5b08801414bce5fb16968db8c1a25291abb62952336f9b4b4c970b
SHA51230ec85794a3789489a6a518e99131924816376fc4b93ca1df66b7ae500e57ea742ecdd4cb488c06a15aea82f99c9fd5189d815c5ff193b95631d47ba53990c80
-
Filesize
859KB
MD5ec705ad732046836c97e5f0e2c679ed8
SHA12c5a2798b2f0dcdf45c78b19d374354415fb315d
SHA25668bc5302325292e229b0f22e1e419854f8cc37e595e736bf16e600993a4b4806
SHA5124db1d3c0ca618d53f5ec281c878431e592e52f4f3b29b2f1a679981b42634d93def0a62e9e6add30b01cbd57ccac1c67035228d5ff2422e345d90bc993392f9f
-
Filesize
826KB
MD572f6141cdc4297331f59609c4d3c0a19
SHA14a4ce0920bc1ece311ff5239df224b6aa309cefd
SHA256f4a08e91a0f4c1e086e3b2344b6cfdcc24083abae31ac1f271879298cd862801
SHA51288f25acdbe41dec133d598e55ded988fc64a95d7acd1a960bfd0d21046d1b1cef2f0ab99cdea147b80d76750e9e93dd5eebfe6162ac93212792938f964f97b0b
-
Filesize
581KB
MD580179ec33949167d45cfeab37e349bea
SHA1a91a1c233c50eb333efb4d10abcc43c5dfd9f93a
SHA256bd063815012c916d3a7f6ebc71d7c32fd5459dbf73702f8e885bf8a145a2111b
SHA512aca32ab60c28189c74b22d4975b0f65476013791e5cfb6291f8543ee2243f9e0a292710898a047c258f8b8498d89acc677ef067375bbd448ce1447f83a2f8d17
-
Filesize
758KB
MD530e4ed28160e9cc3ba33a9767de4ee64
SHA134e22a444ec855156ecac4ff92023cf636a5fe53
SHA256bf5800450be6bae2057afecc2ab9b03f5dc27165a4cf5ffeab44fa376f628df4
SHA512bb218d614dc75a204dd9218bdd30571153538008842770ef5db52f6dd889131710cb2633c2473bba6f15272f499663e6a3fc5a9fd64973d07f9dbbbfef278561
-
Filesize
763KB
MD59e43f3380ee83dec9c27f9b40f7d7c85
SHA100b25e84788a202ab79e704103c3b23874e83274
SHA2564f7f2e813fce776ed915c4a5a397b7f461bc9479fd5c5775c4880fdbc7c3cdc3
SHA51209ffd656cc0e70cc3c96de48c50bf1469a398951215cfffed8cbe1ca8dc4d7f7531094624bb2fc50d00f19f10d7e4e9447932217f37b2cfb69946e95f1c7459c
-
Filesize
548KB
MD5bb36b0dd470f80b78ab9fdfd79e37e8b
SHA10d5f75ea1e84ebe311f506cdac69dfd2a68b6dde
SHA256f0d7d66fbd854a809263adb313f755eff83b17fd134d0cf2e2b60a8ef86b251d
SHA512310740d7ff670804378faf57d89e098f32296ae7f971e6875127951c1ef9183019c5a0696da1fa682019ce41f4036182763d590a77c929d33d334d1fd09b0e6d
-
Filesize
760KB
MD57d8f891432a5a3ab5cd8007b440e76a3
SHA106f933093d02fdef4bf79a144e83399744057ca5
SHA2560f5bf15a2ad52a4159ffe65dd88ca14c76bdd0b5c483dbd583ef2b5323280e54
SHA51278344d09fbb311bca91f646ae8c234a64c0501d875c0695153c4aa6cdd3ef40095c771bd3b421ef3c4a90301c449f5d99345ea7e7e7922efc8e7dda3328d459f
-
Filesize
606KB
MD5aa91bbbeb01eaf4ccac8692e16f426b8
SHA15d02f12c9bb87dae7e2fe57b910c743d680bbee4
SHA25672ea21b5ebe3db5ced73218b19673bda06c8f43af9483557465686f8e2771008
SHA5128578bf3536a2448fe6d1324d7527bef3ec0107388983917fa90a38cc28253bc54b32e82eb15cfe92025f49220decfa7a4a7a6f176d6cb48bc351ce2e7fb6773d
-
Filesize
25.0MB
MD52467a7200d90e7113b3aa306127051c8
SHA1cbffd142af4789b8d0ad41320a273b7cd2e0e9af
SHA256d36b274b79c3de29d511502b8d6d89e2339a4397baf804fb2df679c71bb33ea3
SHA512ecb0dc5ee664626f5df3c1f82c7771dbec2b7edd1b83a70567c448cdacf603e2970085b06f383ab5114b62167d27d6a445267fbce4651815983e93d66f53b727