Analysis

  • max time kernel
    103s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 21:01

General

  • Target

    2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe

  • Size

    11.3MB

  • MD5

    b3aec7f34d8dfa48354aab1253d4b440

  • SHA1

    a0d1a10c7347e3b697cb9294a300003fb6f07a9d

  • SHA256

    ea8b9ef278bce20f5d589cbf1e7b75e0ca599db0a9f5e9fc82896720a0b520ee

  • SHA512

    e39ba13f17c103484aeb5bccdb7342001af4256c5c3c277db2fb59b0c88de0094811af9aa9604155924ff3951ae1a297cd53fa598194c670acfd39fd7a335977

  • SSDEEP

    98304:Eb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz95:O+kIGv3y/x+KTbfjJ+kdnAlej5

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 11 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_b3aec7f34d8dfa48354aab1253d4b440_black-basta_coinminer_hijackloader.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 472
      2⤵
      • Program crash
      PID:624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 472
      2⤵
      • Program crash
      PID:5840
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2348 -ip 2348
    1⤵
      PID:2508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2348 -ip 2348
      1⤵
        PID:2760

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\pUc7B79.tmp

        Filesize

        11.3MB

        MD5

        b3aec7f34d8dfa48354aab1253d4b440

        SHA1

        a0d1a10c7347e3b697cb9294a300003fb6f07a9d

        SHA256

        ea8b9ef278bce20f5d589cbf1e7b75e0ca599db0a9f5e9fc82896720a0b520ee

        SHA512

        e39ba13f17c103484aeb5bccdb7342001af4256c5c3c277db2fb59b0c88de0094811af9aa9604155924ff3951ae1a297cd53fa598194c670acfd39fd7a335977

      • C:\Users\Admin\AppData\Local\Temp\pUc8217.tmp

        Filesize

        929KB

        MD5

        25ce2b2f89510d16c288227e63a68e4a

        SHA1

        e0ed543cc356fbbbb6790941c91a0923f99111b3

        SHA256

        97191ed351a9b5120c333b8eb2321e1793fa8ff3e83d916ccac600463778b2d2

        SHA512

        7cfb574321c44a933d9a0afd646b5bb88b516e660544561681f102273c3ff03626c10bfaeaee3a97e0543b48ba20279a9bb364ec4994ce557e057aef75f2762f

      • C:\Users\Admin\AppData\Local\Temp\pUc97ED.tmp

        Filesize

        286KB

        MD5

        c0783b3a9b8ec59ae3af2f8dac955f1f

        SHA1

        689f63536d8c8caf1e0e084a07d35e42a139ae88

        SHA256

        98bdb3de81b96a7240a95cfd3a74d510ec9a1eacc5d2048bc612fdaf6190a45e

        SHA512

        247ac3722822c0bf64a742b1a0cb017d6bde64e92a495acf72ccefa94a74cce1c7df72c86dd8d870e2c5fb3daf1a50dd2275a21b965f1921c996e95e823aa8ea

      • C:\Users\Admin\AppData\Local\Temp\pUc980F.tmp

        Filesize

        11.3MB

        MD5

        cb4121c7627c030e497d492115905d84

        SHA1

        b4f3106165db8639c458a66909f3ca42adf4bbce

        SHA256

        dc9c25a43100b8ca4a1de68f78c6e94f6f8ed1dccde107975e3ca35a421b7929

        SHA512

        5afda46a6f27907f4b7a213ba3077272d2155f838cb826ec044f4a31873a2540f1ab9552ed340f2d3cbb11aa4b0a54f2b59fdc1bedce75e26aacc53ca98f49f4

      • C:\Users\Admin\AppData\Local\Temp\pUcA340.tmp

        Filesize

        23.8MB

        MD5

        b604acd4b2f53dc45fd52651a1746ba2

        SHA1

        153d32c682fee78999b9d0f07c4e37f383fbdb8d

        SHA256

        95878f15a24c42e68d8765f2d419c81dd8111e4f24c180d6ce43ebebb7c67002

        SHA512

        2d81fcbf6a458b19a9d2019244d90466d2698f2eb90523e40296e5bcea4c7a785eec2990c6f750a8147f636e6b2aa26b50080a821314086f9d277ce910ffb57a

      • memory/2348-140-0x0000000000400000-0x0000000000F4B000-memory.dmp

        Filesize

        11.3MB

      • memory/2348-181-0x0000000000400000-0x0000000000F4B000-memory.dmp

        Filesize

        11.3MB