Analysis
-
max time kernel
0s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc.bin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc.bin.exe
Resource
win10v2004-20241007-en
General
-
Target
96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc.bin.exe
-
Size
890KB
-
MD5
cbcdea93331bf90f7f2ca77ac98fe13c
-
SHA1
b9c7e3371dd668847d73c661a93ed28d046f0f75
-
SHA256
96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc
-
SHA512
519d9f5f0762bda56e3c5ff1330255038259af7a7d6b595448711ca408a26e5f9f1691729f1eca13f144cae730a59ba294efb34a1d142bc1de698326fc63773f
-
SSDEEP
24576:aPXdcPawe01sAN3BSWM0sdcOHgbLTB8/JYYaj:aK1sW3B6dcOHgbBgJYYaj
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc.bin.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2948 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4616 NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc.bin.exe"C:\Users\Admin\AppData\Local\Temp\96baed262fd126604299b719bb1c5f44376149693c9d5c66f663b2ea693854cc.bin.exe"1⤵
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵PID:4500
-
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2948
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2616
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\instructions_read_me.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD579db15db62f6645bb49a0b177029178a
SHA1e82d9e8e69584da086d483dd19b6bc1f4607122e
SHA256e95ecbffa283bfe32b8383a3d500a2e99dcf8626b352f381b2caf6c478da8127
SHA5120dbec2e6cf9b675ab757b138fc7de403ea4f433f77bc597e7c7a0263d71f086638bdd795cb829014d3213a5fb080f2a4a6c82071aed985c154d36546b140e3bc