Analysis
-
max time kernel
86s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
BlackBasta_03.bin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BlackBasta_03.bin.exe
Resource
win10v2004-20241007-en
General
-
Target
BlackBasta_03.bin.exe
-
Size
716KB
-
MD5
ac625552601c190656dcb8cf4c21cd1d
-
SHA1
acad7a91c2812a0652d62f252774454c217666e9
-
SHA256
03309c90e6c60a2e3cd44374efa3003ae10cd9e05ba6a39c77aa5289b32cb969
-
SHA512
9e04dbbc624e808a678e64648dbc12deb286341876ea4590d50f996732dde2b91c6b7defbffcbdd3883c74a98488a0ad26540b364942d3117625770bc4e5e6d3
-
SSDEEP
12288:nB6xrkyoUKbidQN0M2TNK36YPiCuL1+jZ5tXdAD6x/NJxaZUzrd9gW6PdrO5SAou:nwrkyoUGJJgWQrOUAua
Malware Config
Extracted
C:\Recovery\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3747) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" BlackBasta_03.bin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe BlackBasta_03.bin.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ppd.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\giflib.md BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\Client2019_eula.txt BlackBasta_03.bin.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-file-l1-2-0.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dtplugin\deployJava1.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\ReadMe.htm BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProMSDNR_Retail-ul-phn.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\cryptocme.sig BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Data.Common.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.RegularExpressions.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdaer.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ul-phn.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-pl.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ccme_asym.dll BlackBasta_03.bin.exe File created C:\Program Files\dotnet\swidtag\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Facet.thmx BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-phn.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\wordmui.msi.16.en-us.tree.dat BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\dicjp.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ppd.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_KMS_Client_AE-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.RegularExpressions.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\System\wab32.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\Office16\SLERROR.XML BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Acrofx32.dll BlackBasta_03.bin.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscorlib.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\InstallerMainShell.tlb BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\rtscom.dll.mui BlackBasta_03.bin.exe File created C:\Program Files\Common Files\System\de-DE\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessDemoR_BypassTrial365-ul-oob.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\dcf.x-none.msi.16.x-none.tree.dat BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.StackTrace.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.FileSystem.DriveInfo.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Memory.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-utility-l1-1-0.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msxactps.dll BlackBasta_03.bin.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\readme.txt BlackBasta_03.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\micaut.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\sound.properties BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_af.dll BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\EdgeUpdate.dat BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ul-phn.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ppd.xrm-ms BlackBasta_03.bin.exe File opened for modification C:\Program Files (x86)\Common Files\System\es-ES\wab32res.dll.mui BlackBasta_03.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\axvlc.dll BlackBasta_03.bin.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4764 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon BlackBasta_03.bin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta BlackBasta_03.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" BlackBasta_03.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4336 vssvc.exe Token: SeRestorePrivilege 4336 vssvc.exe Token: SeAuditPrivilege 4336 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1020 5068 BlackBasta_03.bin.exe 83 PID 5068 wrote to memory of 1020 5068 BlackBasta_03.bin.exe 83 PID 5068 wrote to memory of 3104 5068 BlackBasta_03.bin.exe 85 PID 5068 wrote to memory of 3104 5068 BlackBasta_03.bin.exe 85 PID 3104 wrote to memory of 4764 3104 cmd.exe 87 PID 3104 wrote to memory of 4764 3104 cmd.exe 87 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlackBasta_03.bin.exe"C:\Users\Admin\AppData\Local\Temp\BlackBasta_03.bin.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵PID:1020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\System32\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4764
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395B
MD5ff661a42071a777d8fed3b587d062834
SHA1b252a1ec08506c23ff99ba343daf15e5ff69e6b9
SHA25688cdaa00b27e88a0fb1851cbe59d1365ac7b625ff535e1e68451ecf48928da8e
SHA51211c582f053ec64e4e398a8d3c7c5c36fc76deb4a3b9c569ae7475e8c7b1f1673779fac8dfa84eae6bb4f8efee2cde16d186686afa1c4dd5a472366789ec9d6a1