Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 16:58
Static task
static1
Behavioral task
behavioral1
Sample
file.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.dll
Resource
win10v2004-20250129-en
General
-
Target
file.dll
-
Size
524KB
-
MD5
20d03f8272648fa3fd31e222b8e2220f
-
SHA1
ac20624e8aff3d4f9c42a8e2ddd493250e631f47
-
SHA256
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80
-
SHA512
3bcfde35141671b4de022ae2423d020e53de35075c9a2c0a2dde45dc993364543af443dc97e6d3cc96c9a1d34533d6adb50c2495a23b5c4de97f64b3176ebd70
-
SSDEEP
12288:SwCt9ZABL6wADs7yjyYTW3nMxIg/NmGta1WeGcvc4OulNI:AHUADs+jVW3nMxIKMOa1Wpecule
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9699) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" rundll32.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Qyzylorda rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\vstoee100.tlb rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00103_.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00224_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE01797_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02270_.WMF rundll32.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationLeft_ButtonGraphic.png rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\Office64MUI.XML rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.RSD rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\HEADER.GIF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\security\cacerts rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Grand_Turk rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html rundll32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\plugins.dat rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341534.JPG rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_zh_4.4.0.v20140623020002.jar rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santarem rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zy______.pfm rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303 rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341738.JPG rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01357_.WMF rundll32.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\readme.txt rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_super.gif rundll32.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\Microsoft.Build.Conversion.v3.5.resources.dll rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TipRes.dll rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD_COL.HXC rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14515_.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.Printing.resources.dll rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-math-l1-1-0.dll rundll32.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\readme.txt rundll32.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Opulent.eftx rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt_0.11.101.v20140818-1343.jar rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Glace_Bay rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185790.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0188669.WMF rundll32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libftp_plugin.dll rundll32.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libfluidsynth_plugin.dll rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\it-IT\msadcer.dll.mui rundll32.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\install.ins rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174315.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXPTOOWS.DLL rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CATALOG.XML rundll32.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-highlight.png rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\TAB_OFF.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\TAB_OFF.GIF rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-localization-l1-2-0.dll rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR17F.GIF rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-6 rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\TYPE.WAV rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCHDREQ.CFG rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf_1.1.0.v20140408-1354.jar rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Brisbane rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-cli.xml rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\readme.txt rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\readme.txt rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2188 vssadmin.exe 2472 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2688 vssvc.exe Token: SeRestorePrivilege 2688 vssvc.exe Token: SeAuditPrivilege 2688 vssvc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2132 wrote to memory of 2640 2132 rundll32.exe 28 PID 2640 wrote to memory of 3040 2640 rundll32.exe 29 PID 2640 wrote to memory of 3040 2640 rundll32.exe 29 PID 2640 wrote to memory of 3040 2640 rundll32.exe 29 PID 2640 wrote to memory of 3040 2640 rundll32.exe 29 PID 3040 wrote to memory of 2188 3040 cmd.exe 31 PID 3040 wrote to memory of 2188 3040 cmd.exe 31 PID 3040 wrote to memory of 2188 3040 cmd.exe 31 PID 3040 wrote to memory of 2188 3040 cmd.exe 31 PID 2640 wrote to memory of 2652 2640 rundll32.exe 34 PID 2640 wrote to memory of 2652 2640 rundll32.exe 34 PID 2640 wrote to memory of 2652 2640 rundll32.exe 34 PID 2640 wrote to memory of 2652 2640 rundll32.exe 34 PID 2652 wrote to memory of 2472 2652 cmd.exe 36 PID 2652 wrote to memory of 2472 2652 cmd.exe 36 PID 2652 wrote to memory of 2472 2652 cmd.exe 36 PID 2652 wrote to memory of 2472 2652 cmd.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#12⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2472
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394B
MD5b17425a4db71b2ef8b7decd01038e502
SHA17e761bce96cc3033dec3a1c61d2672c6fbae3718
SHA25636c359b9db03e7a6df3c37a25b16c53a71d6a866e6332faf203f19ddbfc1ed68
SHA512fbe107f9275231e2e2dbbd80475d51e641a38fd24241366c3af0ed14d0f383bd9de731f2ed8b355c40a68008a6d80dbfb4008e06fd2538483bb8388c7085f636
-
Filesize
8.0MB
MD55764e3c7ba402d6f44243ac0def47b09
SHA1777ca77a03f3240ac601b5b1e19e96ebf4ef1f05
SHA2569a1f48248d5fa07c02660a9040dbc11a5d92e8d0c5351b6401f4f8a4374a57b2
SHA512546d9ac6fb18f72e2deb4ca24d0e742d95e2bdfc97877d9ea5c6a06f8b60d220a40d9079ff818a3d03956d6ebdfbc947031fcd2b76fe78dabcd26150cad953fc
-
Filesize
3.9MB
MD5392887151458042842709216c4aa391c
SHA11fee8fd668610cc025d1fe952013983566eaf229
SHA2561fcaf99e53d59351b3d7cbf2fddf9a99c3e314db8483a7a8b2ef2a684d5acda0
SHA51221ec0d3e757e99813c37f10d9dc3fecefdcd7954d5f823872374cd541ceca254e8c1c8e6c56bf5cbf70ef03a4578ef8f8fb75c22ff25d9cd20b6207f518e56cd
-
Filesize
4.6MB
MD5c5e32dfe3056608545fe76561e2d069e
SHA181f7df1705b2304466cfc7d3ebb7a25ec08899e1
SHA256193f3d43963d887d9eba3bd7fab14cf60fb7ea2200b8e2f67c861f74a8e027e9
SHA51226db8a96022e541f2415028f38716141df6517d7d58e77211cf5fb0e42d5f4ca6e52800952b59cd2c0105b0a149f56e2a471ce9612d831871a83290305607857
-
Filesize
859KB
MD5be62bebf065677a4146659613e3f8fce
SHA1746487715131b8f58d312c287f24a16c57931277
SHA2569f028d702a2e37613d918bd033c6e34641983d00e034ad105d4fce4bef09d46c
SHA5124cd3e7e2e23ae4938b566a53fc7190fa08b65f8674d108691a489fec0d30452d6cf7a8725bea45b55be6c00e2e489364958942bd094a3a226c2fe52e4a9904c7
-
Filesize
826KB
MD5ba62778aa6e38a952a67e0646627c000
SHA162fadc2d5b30b6503ecf6e7bc3687763a4133294
SHA25682d14b5079fc87e3a47b5a8f630bfe8d5d7616bc82fef2dc735a90bed1363362
SHA5124ee5cfe09cd8a8e390bc75062225bde2908f601a7e695ceedaeadee0974053980c321e6ab5a9460031854d4aa953fbdf6e0692d392e040651107d0bc97e467dd
-
Filesize
581KB
MD527d5d66a38fe2a3b6614222cfdad3142
SHA123e11194ccf163e9843e50b81c64926323a3842e
SHA2569c9bb1f197ff862abebc5b25a22eb2394697e34cd618f431a26d5e3b4e138161
SHA51226c9df579d4f5c5c4b6fa9133f4af98f22bc6be2fb15e1335589e7f99e7404c7ccd9fc6699dd295996136ad2ea22c8eda02548eb5b1ce0882648880a71dbbb4e
-
Filesize
758KB
MD5538cfd5736c0dc6327bbcfc29374ac35
SHA154114dee1f6e1098d837ad9f69f8158227aac5d1
SHA256efb5bd47a3d2fb4377effa1ea07cf7c9ba6c13dd977043940f040ede8536a3c2
SHA5126ead5e25f0be4ce63a1df0ac3b837721faa3a20c4a607a92579a110736e31fb90f7125201459da53780ec279a6ec919cdb72ad653c74ba5e6467564aba7e69e3
-
Filesize
763KB
MD5feb2aee59668cd7e2acf9b94a87dfa14
SHA11b8b5386e4b56ea154a32a8797ec8ec751bcac20
SHA2566482a8d88c06ecce257b2605ba97e1304ffc7485a4285bb406d00bd755a96c7f
SHA51298fb5909d655e68c4da7a380dff0c777fcdc7543f7c33f9016aefb265c011df4137798663b8215e1cabcb1a29b81f910e821fcad55dc97df93f8a437001f4950
-
Filesize
548KB
MD5f056b50c0eb3ff23e402b704a5d6846c
SHA16c7db91e86c35710660c8ec89dda1d9706d94da5
SHA2569c02961633f27853b924fa42ca371fc060b9df7c9ceace7cc8f1492bed49c3b1
SHA51202e70f010373494305568163c5b1361744541b2559e9320cd209802d22ce9ae5ac7a5827557b38393125e3fcb0342970aa547a07b962ecd066bc36d5d8f659d4
-
Filesize
760KB
MD502e0603c6a57bc9125a124015506d4e2
SHA12994ffe13d794e9545fa7fb70d5b0bfdfb0d6800
SHA2562bf1f96ca498c0dd84fd533c2cf3153f15c6ddbace1c9cc87ef7e4cd88806487
SHA512769bb3e03d56bcbc8765f0e889cb725fd79b170bcdef9b258c8c722e63b88bb7dd8897118f7ba785e9c93ace5ed8a73c0e3de6e14944e2d89d2767cdd0889969
-
Filesize
606KB
MD53f14b1887efd673cac451729a182eca9
SHA1441eaba48674c374b58bfc199c43fbc9ef222515
SHA256d768e447751800cb8fd8a77618faffe8fea1f63d09d9efcf9a6fad7d0a4e0ae5
SHA512d92abed9f60d5b78bc304447cf35b317626a58221ea9c6aec56ab87453776802e054565f2b4471c17407409c0e2af990e92ba2df9b2add551d589992477ac1c1
-
Filesize
25.0MB
MD5b8e73da87cd49f48d0ff905a82aca219
SHA1c1a24e4ce6d132abebfb9bfeab991d6432a9fb54
SHA25694e09e74f3ffbbed6cca86763020dbddfbe6a368f2e08ee2bae4347d52dffb3d
SHA512cd9b49072d217856694bf80224e3302f9e4db038e7bcc4975c551bc63b108a4e504dc0736154c5cf1b87df632a494d50a33588b91201020a58ac07ca92ecc6c4