Overview
overview
10Static
static
3Baso Netwo...up.exe
windows7-x64
10Baso Netwo...up.exe
windows10-2004-x64
10$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3basonw.exe
windows7-x64
1basonw.exe
windows10-2004-x64
7uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3General
-
Target
Baso Network_2.1.0_x64-setup.exe
-
Size
23.3MB
-
Sample
250218-k8psqsyqfw
-
MD5
540d44f9f7ccc140cb504778b044ea63
-
SHA1
a212d4b8d9a325741053a17ff8a25443f6801430
-
SHA256
10155e8a3d0746109004fff991656a0e8a80b4e2867fc7bcd8d74ac8f12af011
-
SHA512
ffda2e75e440be3aae37c0087e42191adcf67f108de9c4de566f7f67aa29a5dfbfbc33ba6083bfa876f1ea51f86e9ff5617ee5d04bc22824c5fd8936c8a250c1
-
SSDEEP
393216:wpys0GZx3fLJBT/RBnbUCGC6F+wrGj49/2IlNWCl0/vq/5Az6nzLNtVMEay8Hdkk:wdP3fLJaTp0ElNncvqienjVMtdjUVhAn
Static task
static1
Behavioral task
behavioral1
Sample
Baso Network_2.1.0_x64-setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Baso Network_2.1.0_x64-setup.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
basonw.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
basonw.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
uninstall.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Baso Network_2.1.0_x64-setup.exe
-
Size
23.3MB
-
MD5
540d44f9f7ccc140cb504778b044ea63
-
SHA1
a212d4b8d9a325741053a17ff8a25443f6801430
-
SHA256
10155e8a3d0746109004fff991656a0e8a80b4e2867fc7bcd8d74ac8f12af011
-
SHA512
ffda2e75e440be3aae37c0087e42191adcf67f108de9c4de566f7f67aa29a5dfbfbc33ba6083bfa876f1ea51f86e9ff5617ee5d04bc22824c5fd8936c8a250c1
-
SSDEEP
393216:wpys0GZx3fLJBT/RBnbUCGC6F+wrGj49/2IlNWCl0/vq/5Az6nzLNtVMEay8Hdkk:wdP3fLJaTp0ElNncvqienjVMtdjUVhAn
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
-
-
Target
$PLUGINSDIR/NSISdl.dll
-
Size
15KB
-
MD5
ee68463fed225c5c98d800bdbd205598
-
SHA1
306364af624de3028e2078c4d8c234fa497bd723
-
SHA256
419485a096bc7d95f872ed1b9b7b5c537231183d710363beee4d235bb79dbe04
-
SHA512
b14fb74cb76b8f4e80fdd75b44adac3605883e2dcdb06b870811759d82fa2ec732cd63301f20a2168d7ad74510f62572818f90038f5116fe19c899eba68a5107
-
SSDEEP
384:7py18oahashajPmIYInUJggBOZgAHhUKijb:7py18oafmeggBOCAHpij
Score3/10 -
-
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
7KB
-
MD5
d070f3275df715bf3708beff2c6c307d
-
SHA1
93d3725801e07303e9727c4369e19fd139e69023
-
SHA256
42dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7
-
SHA512
fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d
-
SSDEEP
96:h8dPIKJhMuhik+CfoEwknt6io8zv+qy5/utta/H3lkCTcaqHCI:yZIKXgk+cx6QYFkAXlncviI
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
6c3f8c94d0727894d706940a8a980543
-
SHA1
0d1bcad901be377f38d579aafc0c41c0ef8dcefd
-
SHA256
56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
-
SHA512
2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
SSDEEP
96:o0svUu3Uy+sytcS8176b+XR8pCHFcMcxSgB5PKtAtgt+Nt+rnt3DVEB3YcNqkzfS:o0svWyNO81b8pCHFcM0PuAgkOyuIFc
Score3/10 -
-
-
Target
$PLUGINSDIR/nsis_tauri_utils.dll
-
Size
29KB
-
MD5
c5bd51b72a0de24a183585da36a160c7
-
SHA1
f99a50209a345185a84d34d0e5f66d04c75ff52f
-
SHA256
5ef1f010f9a8be4ffe0913616f6c54acf403ee0b83d994821ae4b6716ec1d266
-
SHA512
1349027b08c7f82e17f572e035f224a46f33f0a410526cf471b22a74b7904b54d1befb5ea7f23c90079605d4663f1207b8c81a45e218801533d48b6602a93dbc
-
SSDEEP
768:jnvg/4R1C7063G5I1CabuqcFKpnq0jdhK7W+q:jvu4RM2WCqYMX/
Score3/10 -
-
-
Target
basonw.exe
-
Size
37.7MB
-
MD5
65882b333fdc6a16f7014786aee96626
-
SHA1
efc036d6ec98eb9c7840c08055f2546e72a76e53
-
SHA256
506103409670ba91e0574d96517e913ad6a0edac9ffb55e32297589ad101475b
-
SHA512
b699eece4466d243bf112eb532dea2ffe84aee26d81b5da6bebab80bde5a46e2687076d384e912007f0ea1de722d6d3c5e95c369dfff3055c10054eaa01d83a4
-
SSDEEP
786432:mDKiEY2Pjas9ewAr6fNzqi+jCEKpO6Aa+0:hN/jaRHOfNmvjgpr
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks whether UAC is enabled
-
-
-
Target
uninstall.exe
-
Size
239KB
-
MD5
cd323c811df6ee2a0c2c95ad717a530c
-
SHA1
44f1ed43203126d9cff1f4cfceba563dd288c901
-
SHA256
6f4adc7adcccbf6bf639bf9752ee4f2a9cb1b0d9c8af46677ceac692db14fed1
-
SHA512
3fc648ac6f4b111c030d8d482780ce02894c68205cb5fb66d8925ba3b5daa7fddf6279537c94cf3e58086092e9830f6f4c156b311820bc08cc38b5d08ee13678
-
SSDEEP
6144:PYa6dLgdfz1a3xqscou7e8hYvhTVnjftAYiNvxmT:PYbgZpa3QsvH3vhTJqYiNvgT
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
68b287f4067ba013e34a1339afdb1ea8
-
SHA1
45ad585b3cc8e5a6af7b68f5d8269c97992130b3
-
SHA256
18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
-
SHA512
06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
SSDEEP
48:S46+/nTKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mFofjLl:zFuPbOBtWZBV8jAWiAJCdv2Cm0L
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
-
-
Target
$PLUGINSDIR/nsis_tauri_utils.dll
-
Size
29KB
-
MD5
c5bd51b72a0de24a183585da36a160c7
-
SHA1
f99a50209a345185a84d34d0e5f66d04c75ff52f
-
SHA256
5ef1f010f9a8be4ffe0913616f6c54acf403ee0b83d994821ae4b6716ec1d266
-
SHA512
1349027b08c7f82e17f572e035f224a46f33f0a410526cf471b22a74b7904b54d1befb5ea7f23c90079605d4663f1207b8c81a45e218801533d48b6602a93dbc
-
SSDEEP
768:jnvg/4R1C7063G5I1CabuqcFKpnq0jdhK7W+q:jvu4RM2WCqYMX/
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1