Analysis
-
max time kernel
66s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 16:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20250129-en
General
-
Target
file.exe
-
Size
2.7MB
-
MD5
80d8379fc7093ec9e24be089ea6fa448
-
SHA1
7c2da0be48cdf30db35105d5c4fc7759a0c10bf9
-
SHA256
0c964ac2f65f270eb19982b04ae346e72976bdf19b88ffd2308700dcce2b5ec0
-
SHA512
abb391bb1c0e909b98fd4eff90360a6490be2b8906190a58a653769d51bdd929d4dc2f5705149bc2782c0843632aa0f55cff652e91293e831c436d0928523f1f
-
SSDEEP
12288:oyTgj6xwzXu9qvuRrzC2qWx8EsFeZ5I34lMKODiU56:2hu9qGFzC2qWx0eZ5ClbiUE
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1545) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" file.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\RECOVR32.CNV file.exe File created C:\Program Files\Google\readme.txt file.exe File created C:\Program Files (x86)\Common Files\System\msadc\readme.txt file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Newsprint.thmx file.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\readme.txt file.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\sqlxmlx.dll file.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWLAY32.DLL file.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll file.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\SoftBlue.jpg file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Hardcover.thmx file.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\readme.txt file.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\METCONV.DLL file.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msxactps.dll file.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg file.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp file.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\readme.txt file.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe file.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\readme.txt file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19582_.GIF file.exe File opened for modification C:\Program Files\VideoLAN\VLC\VideoLAN Website.url file.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\readme.txt file.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msader15.dll file.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_bg.dll file.exe File opened for modification C:\Program Files (x86)\Internet Explorer\D3DCompiler_47.dll file.exe File created C:\Program Files\VideoLAN\VLC\locale\co\readme.txt file.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEREP.DLL file.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] file.exe File opened for modification C:\Program Files\VideoLAN\VLC\libvlccore.dll file.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml file.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe file.exe File opened for modification C:\Program Files\Java\jre7\lib\plugin.jar file.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.lnk file.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll file.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\readme.txt file.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EMABLT32.DLL file.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm file.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\Hearts.exe.mui file.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\readme.txt file.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt file.exe File opened for modification C:\Program Files\Java\jre7\COPYRIGHT file.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\readme.txt file.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\readme.txt file.exe File opened for modification C:\Program Files\FormatGet.rle file.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_es.dub file.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceoledb35.dll file.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEERR.DLL file.exe File opened for modification C:\Program Files\SetEnter.MOD file.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\readme.txt file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTIRMV.XML file.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circle_glass_Thumbnail.bmp file.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf file.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe file.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\readme.txt file.exe File created C:\Program Files (x86)\Common Files\System\msadc\it-IT\readme.txt file.exe File opened for modification C:\Program Files\Internet Explorer\D3DCompiler_47.dll file.exe File created C:\Program Files (x86)\Microsoft Office\Office14\readme.txt file.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt file.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\REVERSE.DLL file.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FDATE.DLL file.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\readme.txt file.exe File created C:\Program Files\DVD Maker\fr-FR\readme.txt file.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Installer\f77479b.mst msiexec.exe File opened for modification C:\Windows\Installer\f77479b.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI6E5D.tmp msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2532 vssadmin.exe 2852 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" file.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeBackupPrivilege 2396 vssvc.exe Token: SeRestorePrivilege 2396 vssvc.exe Token: SeAuditPrivilege 2396 vssvc.exe Token: SeRestorePrivilege 3504 msiexec.exe Token: SeTakeOwnershipPrivilege 3504 msiexec.exe Token: SeSecurityPrivilege 3504 msiexec.exe Token: SeRestorePrivilege 3504 msiexec.exe Token: SeTakeOwnershipPrivilege 3504 msiexec.exe Token: SeRestorePrivilege 3504 msiexec.exe Token: SeTakeOwnershipPrivilege 3504 msiexec.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2152 2684 file.exe 31 PID 2684 wrote to memory of 2152 2684 file.exe 31 PID 2684 wrote to memory of 2152 2684 file.exe 31 PID 2684 wrote to memory of 2152 2684 file.exe 31 PID 2152 wrote to memory of 2532 2152 cmd.exe 33 PID 2152 wrote to memory of 2532 2152 cmd.exe 33 PID 2152 wrote to memory of 2532 2152 cmd.exe 33 PID 2152 wrote to memory of 2532 2152 cmd.exe 33 PID 2684 wrote to memory of 2732 2684 file.exe 36 PID 2684 wrote to memory of 2732 2684 file.exe 36 PID 2684 wrote to memory of 2732 2684 file.exe 36 PID 2684 wrote to memory of 2732 2684 file.exe 36 PID 2732 wrote to memory of 2852 2732 cmd.exe 38 PID 2732 wrote to memory of 2852 2732 cmd.exe 38 PID 2732 wrote to memory of 2852 2732 cmd.exe 38 PID 2732 wrote to memory of 2852 2732 cmd.exe 38 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 PID 3504 wrote to memory of 3132 3504 msiexec.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2852
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7A4A05EC185F50EDC86DC15037217992⤵
- System Location Discovery: System Language Discovery
PID:3132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394B
MD548ed743eb5006456d1398ebcd0cf7242
SHA19a22bf236c17904be8fa08c3434bfad81fd112e2
SHA25605890bd6d236d0ceaf64e43bedbdd4bbe17c620e9241d940a0c9430656f1f17e
SHA512560759ee35bd1f49cc2dd1bb843a5a690a812e24fa28ba38008e1ee31e8fb53684ca23314d80bea74fc1a437c035d3f65d7827f7fec19fa2b562a908cc271d10
-
Filesize
8.0MB
MD5e6b8a881811c1e95c350df57193a025f
SHA1350ac4917aace8292ffc8b2f3a088fd8f02dd167
SHA256a36fa1dc0516ac45312b1ec8cfe6bc258eb9b600f018aceafc67a7b82e583bf1
SHA512a7b35bb1a7660bfc4050fb4cbabac2af29dea18710ec38c164032aad427b77cec492e3ad06499fd7f91d71d14689f20274c2acfe4286c793560d984f49f126f6
-
Filesize
3.9MB
MD572b2cae2d522da1ba23c10cc7ac60eca
SHA11afb77c120e2ecc6aa84c7141d585f2c7f2f5f08
SHA256015c3c4fefd995b29738e0c8ba76536babf5b20ed1fd0988fabab130e5e602ce
SHA5126b0c064f1c3913faebacedbd3649ba30b83d5d4a0e0d72623d390e9f4da29081fd8cf705cdc26d2cd4416bbf94f0e95b6ce36a8085b6e1b5a81ebb1594d54040
-
Filesize
4.6MB
MD5053107b95194d9e389255f77b1a4db9f
SHA1722fdc3b9fed9786b681caf09e6912f5bfc9fabb
SHA256e9c850391342aed4fa819e79b7047c3fb8400e1ff448d2fbe9c87c8c2030627f
SHA512950b2942f91e96fab9224c573ff38bc504d4f584bc4de29164bd0c14ccc74f4c02a41c1e13e2a05047935e1e2217933f5f0a8e49b5c4eb355ac10af19daf44d6
-
Filesize
859KB
MD518e0f12200e7f676a8b353f6ada57ff7
SHA167c57e590ebffab4bb56c8d646c4595490b16520
SHA25677ee41ce2409e5ef81fdec8e610d00e0703228dbe70e4e02382a7655c630d884
SHA512cb9ac85ed5a1d7b126438055dd629922dec0eb444e3b1c925aebe0f9f11879d2830d244c8a857a54f3314c5ad7258cbb3111b499a2c6316dbc10eab5132e3b5f
-
Filesize
826KB
MD55debe37a9c16fa741f36d22b59035cfa
SHA1a9afdeb1a80d09ad82c223d40a9dccef290e9926
SHA256706064eed0c585ab103ca89476416ac10aba8de3e0bac4c25d534cbf7c9b4e4e
SHA51252a97e3eea6dd8a9dc8ce10535bad1db45c43a581c7e0d0ef5819edb2d537713ef146e7caa757af062d275d428b951a481e425a7de383b816cc70959f911b84c
-
Filesize
581KB
MD50a142298f69c79b0156bddddee9fc1ec
SHA19590bba8118bb145e0f62857b7532b9965e4b4d5
SHA256d16cad1d8ed4c94597c794c07cfe786cd7d6077ee38294692a6c897cee938d2e
SHA5128142ff9c0e08e1edad0721650209498b8d4271e8523d95077a191605a4e5cba7f1e45d238b8d038d8b55d3d24ae8faf8287fbd3995ec58b4458c089c1b71040c
-
Filesize
758KB
MD56c2f8cddd882722861acb558aeffd358
SHA17f633f16cd52579a3c273572ba894edac896e58c
SHA256e769698ee2101f5295caa9cea98de70c115e337659aec691289ba18cb5037e7e
SHA512a350a23e689f07190fa5d4887544b8289c75534e1a58111da22f1e8e6eaa265174270a1b75a6b84ed0c8ddd42baac4a2e1c4ad6087d6ea1de703839b113ecf74
-
Filesize
763KB
MD588e80d48c3918d9ed648b0cb3834e4c7
SHA1646046d7b12ad2cdc7308c989f6546cc8d9ff6ff
SHA256b43c10597ca498d06206e49b46c6dab771ca95a4252eb36ad720ca041df5fc79
SHA5124f0d623e67cc829788ffc9bc8df2692a9901afeb4426bcc6d4a91baba1f5b0db48e52f84f6440311d126efe311e74a0b081064ed1fae1918b204d324b3a6a668
-
Filesize
548KB
MD5fc2d2af0b5e79ddfc3c74cb9ceae6f4f
SHA1c64c1d627b592b2d7332208e97cb8c3c54823eff
SHA2565bae0597dc84a413919c08d1b861c764c80ec952919da983be6e9573e547a05f
SHA512b32921e378b2b9b77ec454621b8f5edfb4cc6bec594f677bcd61723add9f6d7e38e169b090976811822f53f2f530459034aaf8b48c9cc744e28bce4674bfff62
-
Filesize
760KB
MD579a70a62ac986d773ec82958917e89bf
SHA1f8037c13995ee0e631eb20691a816a3b0023426f
SHA2560d77d3e14d688a0693b3cb3fc75e0ce65671cee2a0e63e178b16db3ebc62ed2b
SHA512e7b97641938e17a23bae767f9726d39b1e327bb268ae2a72c8e20c61d5b205e73c7cdac8d39b5a42c0f93762f0a5a5c93fe41a9131a822b8472816632e2222e3
-
Filesize
606KB
MD5e51e20d54f808ff5f8abd10f23f23875
SHA1506ebd1996bdf1cefd836e46eb93fd84534a3cb8
SHA256f1b285e3bad2822ac414c2667ed34650328224c5ed80620f93457ac26f79e5e2
SHA5126ea556c680b574cb1a2fa312607eb2de39a7ab2bc043869d9f22e5df2e00f57e52cde0bd75a241d2d7d6510a74d762a0a02577f0467eed3eec9629bb7878ad91
-
Filesize
15.8MB
MD57a2ae7f4a0e59011482af149707747b2
SHA1f61e6bd319a25d8a9f207de29bb8f87d317c298d
SHA2566f53244c17757132a0ceb98889064f5c897eae98a10ab8b4b88730bed2b6f2c9
SHA5126b42b13fd9be107a49e14a3f71e3fad979abc9be6bd6fccc08c30829c7357832eaa513644e0c252d89de657d04c06301896750b1405eb11f3de5c8427199735b
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
28KB
MD585221b3bcba8dbe4b4a46581aa49f760
SHA1746645c92594bfc739f77812d67cfd85f4b92474
SHA256f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f
SHA512060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2