Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 20:34
Static task
static1
Behavioral task
behavioral1
Sample
ENCRYPT_C_VISIBLEENTRY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ENCRYPT_C_VISIBLEENTRY.exe
Resource
win10v2004-20241007-en
General
-
Target
ENCRYPT_C_VISIBLEENTRY.exe
-
Size
391KB
-
MD5
4be7c8cdc4eb344bc3bce1e9d2bf4b6d
-
SHA1
5c18b5a920917420dfba267853769ce0e11ef57f
-
SHA256
6aabcc25ae4ca7804b2f70fdf4b9fd17ca8cfd70bb0c9903a8d537570ebb9405
-
SHA512
46492322b2392ab8ce9bde3f8ad62bd95e62de1d8c0a0c284ef58334a2e3e7a38ad193c2f69a0f6a5d769d12f6bc9fe815cb9699aa256dd474836c8d8bd7395c
-
SSDEEP
12288:SUyh8ETAbg65kkZ7oZXu6PWHzXzroCvczjCo:3dDbgerajCo
Malware Config
Extracted
C:\Program Files\instructions_read_me.txt
blackbasta
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Renames multiple (9633) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI ENCRYPT_C_VISIBLEENTRY.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msadcor.dll.mui ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\settings.js ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\setting_back.png ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_partly-cloudy.png ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG.wmv ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10297_.GIF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR7B.GIF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Journal\Templates\Genko_1.jtp ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\init.js ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\WMPSideShowGadget.exe.mui ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files\VideoLAN\VLC\locale\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\vlc.mo ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\vlc.mo ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\ja-JP\msader15.dll.mui ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_over.png ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14833_.GIF ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00685_.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\NPSWF32.dll ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STORYVERTBB.DPV ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files\Microsoft Games\Minesweeper\de-DE\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdaurl.dll ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01849_.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javafx.policy ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows NT\Accessories\fr-FR\wordpad.exe.mui ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153273.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-new.png ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS01634_.WMF ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR50B.GIF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\service.js ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Majuro ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00790_.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsmf_plugin.dll ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files\Windows Journal\de-DE\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files\Microsoft Games\Solitaire\fr-FR\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.jpg ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Lord_Howe ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSAutogen.dll ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\es-ES\msdaprsr.dll.mui ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_zh_CN.jar ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationRight_ButtonGraphic.png ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\StatusAway.ico ENCRYPT_C_VISIBLEENTRY.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\instructions_read_me.txt ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\picturePuzzle.css ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_winxp.css ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONMAIN.DLL ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed.xrm-ms ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0103262.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198377.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01130_.WMF ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santarem ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectToolsetIconImagesMask.bmp ENCRYPT_C_VISIBLEENTRY.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt ENCRYPT_C_VISIBLEENTRY.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ENCRYPT_C_VISIBLEENTRY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dnvp3n30n\DefaultIcon ENCRYPT_C_VISIBLEENTRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dnvp3n30n ENCRYPT_C_VISIBLEENTRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dnvp3n30n\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" ENCRYPT_C_VISIBLEENTRY.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 264 notepad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1088 wrote to memory of 552 1088 ENCRYPT_C_VISIBLEENTRY.exe 34 PID 1088 wrote to memory of 552 1088 ENCRYPT_C_VISIBLEENTRY.exe 34 PID 1088 wrote to memory of 552 1088 ENCRYPT_C_VISIBLEENTRY.exe 34 PID 1088 wrote to memory of 552 1088 ENCRYPT_C_VISIBLEENTRY.exe 34 PID 552 wrote to memory of 264 552 cmd.exe 36 PID 552 wrote to memory of 264 552 cmd.exe 36 PID 552 wrote to memory of 264 552 cmd.exe 36 PID 552 wrote to memory of 264 552 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ENCRYPT_C_VISIBLEENTRY.exe"C:\Users\Admin\AppData\Local\Temp\ENCRYPT_C_VISIBLEENTRY.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start /MAX notepad.exe c:\instructions_read_me.txt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\notepad.exenotepad.exe c:\instructions_read_me.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD583d5be091b05aaa39eee00429dbb0c8b
SHA1c31ebdaf3d8522e9053ca12e04cc4af783c450ca
SHA25672317b27324006c389c928d2575beb77c18b3f0a61343040dddc6f3c7edfa195
SHA512c411d4266951553f9bbb9803b0e13334381eca18381ec5412e23ffed2c3a1b8c73f3fed6ca43e580b3cb9da94c6eeb6ec76cc12cfff546062fa490f0bd712285