Analysis
-
max time kernel
103s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe
-
Size
11.3MB
-
MD5
b3aec7f34d8dfa48354aab1253d4b440
-
SHA1
a0d1a10c7347e3b697cb9294a300003fb6f07a9d
-
SHA256
ea8b9ef278bce20f5d589cbf1e7b75e0ca599db0a9f5e9fc82896720a0b520ee
-
SHA512
e39ba13f17c103484aeb5bccdb7342001af4256c5c3c277db2fb59b0c88de0094811af9aa9604155924ff3951ae1a297cd53fa598194c670acfd39fd7a335977
-
SSDEEP
98304:Eb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz95:O+kIGv3y/x+KTbfjJ+kdnAlej5
Malware Config
Signatures
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 624 2348 WerFault.exe 85 5840 2348 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe 2348 2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 4722⤵
- Program crash
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 4722⤵
- Program crash
PID:5840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2348 -ip 23481⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2348 -ip 23481⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD5b3aec7f34d8dfa48354aab1253d4b440
SHA1a0d1a10c7347e3b697cb9294a300003fb6f07a9d
SHA256ea8b9ef278bce20f5d589cbf1e7b75e0ca599db0a9f5e9fc82896720a0b520ee
SHA512e39ba13f17c103484aeb5bccdb7342001af4256c5c3c277db2fb59b0c88de0094811af9aa9604155924ff3951ae1a297cd53fa598194c670acfd39fd7a335977
-
Filesize
929KB
MD525ce2b2f89510d16c288227e63a68e4a
SHA1e0ed543cc356fbbbb6790941c91a0923f99111b3
SHA25697191ed351a9b5120c333b8eb2321e1793fa8ff3e83d916ccac600463778b2d2
SHA5127cfb574321c44a933d9a0afd646b5bb88b516e660544561681f102273c3ff03626c10bfaeaee3a97e0543b48ba20279a9bb364ec4994ce557e057aef75f2762f
-
Filesize
286KB
MD5c0783b3a9b8ec59ae3af2f8dac955f1f
SHA1689f63536d8c8caf1e0e084a07d35e42a139ae88
SHA25698bdb3de81b96a7240a95cfd3a74d510ec9a1eacc5d2048bc612fdaf6190a45e
SHA512247ac3722822c0bf64a742b1a0cb017d6bde64e92a495acf72ccefa94a74cce1c7df72c86dd8d870e2c5fb3daf1a50dd2275a21b965f1921c996e95e823aa8ea
-
Filesize
11.3MB
MD5cb4121c7627c030e497d492115905d84
SHA1b4f3106165db8639c458a66909f3ca42adf4bbce
SHA256dc9c25a43100b8ca4a1de68f78c6e94f6f8ed1dccde107975e3ca35a421b7929
SHA5125afda46a6f27907f4b7a213ba3077272d2155f838cb826ec044f4a31873a2540f1ab9552ed340f2d3cbb11aa4b0a54f2b59fdc1bedce75e26aacc53ca98f49f4
-
Filesize
23.8MB
MD5b604acd4b2f53dc45fd52651a1746ba2
SHA1153d32c682fee78999b9d0f07c4e37f383fbdb8d
SHA25695878f15a24c42e68d8765f2d419c81dd8111e4f24c180d6ce43ebebb7c67002
SHA5122d81fcbf6a458b19a9d2019244d90466d2698f2eb90523e40296e5bcea4c7a785eec2990c6f750a8147f636e6b2aa26b50080a821314086f9d277ce910ffb57a