Analysis

  • max time kernel
    24s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 16:58

General

  • Target

    file.exe

  • Size

    2.7MB

  • MD5

    80d8379fc7093ec9e24be089ea6fa448

  • SHA1

    7c2da0be48cdf30db35105d5c4fc7759a0c10bf9

  • SHA256

    0c964ac2f65f270eb19982b04ae346e72976bdf19b88ffd2308700dcce2b5ec0

  • SHA512

    abb391bb1c0e909b98fd4eff90360a6490be2b8906190a58a653769d51bdd929d4dc2f5705149bc2782c0843632aa0f55cff652e91293e831c436d0928523f1f

  • SSDEEP

    12288:oyTgj6xwzXu9qvuRrzC2qWx8EsFeZ5I34lMKODiU56:2hu9qGFzC2qWx0eZ5ClbiUE

Malware Config

Extracted

Path

C:\Recovery\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/ Your company id for log in: eeded09d-2ac0-4e69-bf25-875cd524e744
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/

Signatures

  • Black Basta

    A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

  • Blackbasta family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (987) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3448
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3636
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\readme.txt

    Filesize

    394B

    MD5

    48ed743eb5006456d1398ebcd0cf7242

    SHA1

    9a22bf236c17904be8fa08c3434bfad81fd112e2

    SHA256

    05890bd6d236d0ceaf64e43bedbdd4bbe17c620e9241d940a0c9430656f1f17e

    SHA512

    560759ee35bd1f49cc2dd1bb843a5a690a812e24fa28ba38008e1ee31e8fb53684ca23314d80bea74fc1a437c035d3f65d7827f7fec19fa2b562a908cc271d10