Analysis
-
max time kernel
104s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe
-
Size
533KB
-
MD5
21798cca59362fe9a8e8e372c3c9a364
-
SHA1
0149cac86d324e69ce96de65b96427501062381a
-
SHA256
20a0c14423a568108c1490f4ddfcdb55453de54c36f141224ed1062b660278ba
-
SHA512
7efaf4a00a91de65f18bb0bb607ab0720f2d9d640287f0a8649c6b09427e935ecb2b6fbdd25b2a7fa85d96d2f58772864abe63f88b81ca78670e35cb5d731188
-
SSDEEP
12288:HdoutuQxK5fWYgeWYg955/155/8F9F7UooSUm98uhMmv:9tbxK5FvjU87
Malware Config
Extracted
C:\PerfLogs\How to decrypt my data.txt
lockbit
https://github.com/qTox/qTox/releases/download/v1.17.6/setup-qtox-x86_64-release.exe
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Renames multiple (169) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\U: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\A: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\S: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\J: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\L: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\X: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\Y: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\I: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\H: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\V: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\N: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\Q: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\T: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\O: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\G: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\Z: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\B: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\M: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\W: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\E: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\R: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\P: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe File opened (read-only) \??\K: 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe 2760 2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3308 vssvc.exe Token: SeRestorePrivilege 3308 vssvc.exe Token: SeAuditPrivilege 3308 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_21798cca59362fe9a8e8e372c3c9a364_black-basta_cobalt-strike_satacom.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b34e19ffaa698afff3a49f29617ae1bc
SHA109fd9428e3bcfbdbcef4069d5693b96e2687a996
SHA256083f3863a27f1f773f2b55485d6f3ecd6aa9c80916de865a268a0115b07df922
SHA512cad3e6399e3d4a3990670ae7cd7bc0f9084bb4a27f70742c8efaea908f047048699771110d9adfeaa7dea36dde9bd90d5118df8e025dddc11505e9e30b38b955