Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:37

General

  • Target

    2025-03-31_3241a65212bb067c6c6e819e868d5791_black-basta_hawkeye_luca-stealer.exe

  • Size

    17.9MB

  • MD5

    3241a65212bb067c6c6e819e868d5791

  • SHA1

    7812f4c17ad4ae0782c38bf4aa43b19c5f806f26

  • SHA256

    99780d1dd0432e633b8782c99932d5ad079e06b94f430ce0fcc9e8de420ee746

  • SHA512

    e58d0a7407ea1bdc11b5fdeb53a07c691c01ef9944b071294fd28b36de0c67f9a135a2e8fe4a54d86ba28122fc48d2bea12c101183d505a6b5a88dad3855099a

  • SSDEEP

    393216:ak/VC6t0vOKtIca6AhP9av6hPWeO9MrnhlPpPXnhssoAn:N/t+Q5XmOKSHp/nhsyn

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 61 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-31_3241a65212bb067c6c6e819e868d5791_black-basta_hawkeye_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-31_3241a65212bb067c6c6e819e868d5791_black-basta_hawkeye_luca-stealer.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RevoUninProSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\RevoUninProSetup.exe" /silent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Users\Admin\AppData\Local\Temp\is-5O424.tmp\RevoUninProSetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5O424.tmp\RevoUninProSetup.tmp" /SL5="$602C6,17134221,196608,C:\Users\Admin\AppData\Local\Temp\RarSFX0\RevoUninProSetup.exe" /silent
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /f /im ruplp.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4232
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll"
          4⤵
          • Loads dropped DLL
          • Modifies system executable filetype association
          • Modifies registry class
          PID:4864
        • C:\Windows\system32\rundll32.exe
          "rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf
          4⤵
          • Drops file in Drivers directory
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3744
          • C:\Windows\system32\runonce.exe
            "C:\Windows\system32\runonce.exe" -r
            5⤵
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:780
            • C:\Windows\System32\grpconv.exe
              "C:\Windows\System32\grpconv.exe" -o
              6⤵
                PID:4440
          • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe
            "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:2100
          • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
            "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4740
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:680
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" add "HKCU\Software\VS Revo Group\Revo Uninstaller Pro\General" /v "RegUN" /t REG_SZ /d "Cumiche" /f /reg:64
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1240
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c grpconv -o
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3764
      • C:\Windows\system32\grpconv.exe
        grpconv -o
        2⤵
          PID:2808

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll

        Filesize

        187KB

        MD5

        8b9964e06195fd375d126b424e236f03

        SHA1

        6f1741cfeb9fb70c34857dbba3e063c88c3c32fa

        SHA256

        bda04b693bfdea86a7a3b47f2e4ceae9cd9475c4e81b0aa73b70fd244a65f70f

        SHA512

        741019523b4c5f4ef9a7952172309b2d304a84cbd98fff99a719105cc1938157edb1691554a21b9dcd2b523c0f1ab0d37879deefc3b2fa5579c0d8c76cade483

      • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe

        Filesize

        24.1MB

        MD5

        e5cbe37d1e7bc23c4cc473291f07a41a

        SHA1

        b13b079deb116b7ca0e76dae235668b0cb48346c

        SHA256

        3c305231c6c9469d99e18efeedb15aece1b98b7b7d3da2bdde626b36cd9b4118

        SHA512

        15c03644a5f1268ad5c64574f8831aebb6c445d38d4abb2d2abd33ba9ebe71f29f16d09bf292eb1ceb4307b8a0fefe9618bad0dc56ef92c7ee04af0afef3c608

      • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\english.ini

        Filesize

        122KB

        MD5

        60184157c8e45f4715bdb31b8bd687ff

        SHA1

        9219c2e72ed248e48fb8413d908aea38c62c11d9

        SHA256

        3ab682690fe4e7adb498e594d06f8093f003573b0ff4c8eaaa74ba1e2f8a21a5

        SHA512

        73bb0dfb0eec5f6b91b4bab6524fff6ad598b3e91bd3cabbf0d27d186956be10b1bc0a15d4f989ad8ed806926311670014a7c6a317a64c2fdd82848adb0048e7

      • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf

        Filesize

        2KB

        MD5

        edc78deb34de240c787b1011161e9a4e

        SHA1

        2d31275530dce33d3bc329991c8ad59e1b303577

        SHA256

        69569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b

        SHA512

        e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b

      • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe

        Filesize

        9.6MB

        MD5

        216b49b7eb7be44d7ed7367f3725285f

        SHA1

        cf0776ecbc163c738fd43767bedcc2a67acef423

        SHA256

        c6d97857b3b9f26c8e93d7b6e6481f93a16db75cbf9d1756cb29fba0fd9e240e

        SHA512

        060fb76d91bee1b421f133cae17726a68adc97ddce76a67196d10e735e216d032bee939c905b847c50f29e859dca43cdf1b19e4ae349e00efe88147224d665cb

      • C:\ProgramData\VS Revo Group\Revo Uninstaller Pro\revouninstallerpro5.lic

        Filesize

        64KB

        MD5

        8462a9b69c76a9603a4143d51fbc201e

        SHA1

        4473590f93f94f22c340a354516191c3c0ba6532

        SHA256

        fe4bcb4251f77375119a936c80fb36221af0c5105e840e2e115d47f96cb437c8

        SHA512

        2f02ecdb06760a093f4d8e6f04c97138695b064db8cb2dcc4af9b47c829852f38b77be9425eb2f3e3e36f85da181c116c829921fa35ae68afc57c728d5393570

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe

        Filesize

        534KB

        MD5

        e0de118335dee8e37f7ed1230b560d8f

        SHA1

        3517f83306095873de23bb01ee958d56b34886dd

        SHA256

        79ee72bdb556bf7ac32302c438b5958dc5bc5bfc9a12a0ec823317377c6cd644

        SHA512

        0e8858c62fd2d8974475292fbe1d0e5617a1ba3c4f0325eb5d15b18b8702ff491481e3d4c19af96b5a8e3274311a42fd96f471e263be8debbe696af4cc8cdac0

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RevoUninProSetup.exe

        Filesize

        16.9MB

        MD5

        c02e72a632d4818ded4e710f94bd4051

        SHA1

        b3daaae3b78f6b06eb81a467e2b0373c93dffb9d

        SHA256

        4ebf20180c177a01de8ab4894005949900a9dc67877dc44ed029fcfe1c67860b

        SHA512

        be2d4186fc09b43288e0fa56418be75b0c8e9d1fb47a14116f9876d1d533ea1bb66a7fe067a3d089d77700b7a6c763027ee2ba291ca53887718663ca70ee6533

      • C:\Users\Admin\AppData\Local\Temp\is-5O424.tmp\RevoUninProSetup.tmp

        Filesize

        1.2MB

        MD5

        6c3251c1345c9187f9e2eaf6a5661d98

        SHA1

        36553b8fe5f08072e843197a09fa0a859063bce9

        SHA256

        4567388157595a9db586a2b361b42b1fddb16d924d0ead97c464ab051bc7f04d

        SHA512

        8d63505aaea1a99ba4f0e02a3a63be9031d33efe127b388d98f82443735ac589718ab46e489524b380f2582498b74e1d21a49766e3dac0190d643e15a83b0c28

      • C:\Windows\System32\drivers\revoflt.sys

        Filesize

        37KB

        MD5

        ec8e58e6b58b4fcde77431cda3a24c0e

        SHA1

        ebb474009b2a2fbce648adff4b8b797fcd00c997

        SHA256

        25667717bf4691957f07a6363585e2c7eaf22e5fd7229bf32c91ea59ef4a2edd

        SHA512

        e2c667ebe97973ff27c1edf3e45ebf7950bc8d7aad1126da25290a2f590b21808654694cbe6a0ad1d3649566ec7645eb6b3379c7d7c0a650d5381a69e9cdade4

      • memory/2100-168-0x0000000000400000-0x0000000000E32000-memory.dmp

        Filesize

        10.2MB

      • memory/2748-22-0x0000000000400000-0x0000000000540000-memory.dmp

        Filesize

        1.2MB

      • memory/2748-176-0x0000000000400000-0x0000000000540000-memory.dmp

        Filesize

        1.2MB

      • memory/2748-180-0x0000000000400000-0x0000000000540000-memory.dmp

        Filesize

        1.2MB

      • memory/4508-174-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/4508-181-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/4508-18-0x0000000000401000-0x0000000000412000-memory.dmp

        Filesize

        68KB

      • memory/4508-15-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB