Analysis
-
max time kernel
103s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe
-
Size
10.0MB
-
MD5
848ac202b7452558d4b1ae14a77fbb8c
-
SHA1
3fdf2e6e38ade48a8944e99bdacf22aec6a7a73e
-
SHA256
5ea9b15b646c6304171c9d34449073332c6a22f780f6946588c4f266260b65c7
-
SHA512
f9b9aed63f0c3c5833d00b3ddd5bda1f172cae98e9c7361d7d35043d88f3ec44503549cb620b08cd5a7de819537fe26e236491086edb7b4fc998410baadbdf27
-
SSDEEP
49152:L/LuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuP:L
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4288 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 tvqwpcm.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 820 sc.exe 3136 sc.exe 4120 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2400 6108 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 6108 wrote to memory of 4532 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 97 PID 6108 wrote to memory of 4532 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 97 PID 6108 wrote to memory of 4532 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 97 PID 6108 wrote to memory of 1560 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 99 PID 6108 wrote to memory of 1560 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 99 PID 6108 wrote to memory of 1560 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 99 PID 6108 wrote to memory of 820 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 101 PID 6108 wrote to memory of 820 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 101 PID 6108 wrote to memory of 820 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 101 PID 6108 wrote to memory of 3136 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 103 PID 6108 wrote to memory of 3136 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 103 PID 6108 wrote to memory of 3136 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 103 PID 6108 wrote to memory of 4120 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 105 PID 6108 wrote to memory of 4120 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 105 PID 6108 wrote to memory of 4120 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 105 PID 6108 wrote to memory of 4288 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 108 PID 6108 wrote to memory of 4288 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 108 PID 6108 wrote to memory of 4288 6108 2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\duhkpvqw\2⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tvqwpcm.exe" C:\Windows\SysWOW64\duhkpvqw\2⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create duhkpvqw binPath= "C:\Windows\SysWOW64\duhkpvqw\tvqwpcm.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:820
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description duhkpvqw "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start duhkpvqw2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4120
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 10402⤵
- Program crash
PID:2400
-
-
C:\Windows\SysWOW64\duhkpvqw\tvqwpcm.exeC:\Windows\SysWOW64\duhkpvqw\tvqwpcm.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-04-04_848ac202b7452558d4b1ae14a77fbb8c_black-basta_luca-stealer.exe"1⤵
- Executes dropped EXE
PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6108 -ip 61081⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD57b1583343c2711cbb9576821d64a2c68
SHA187e3c270f149918c39fa0e3354295e1ef63160f5
SHA2567b6ef32ce522ea56558bdb216aaef66e44fc6a40cf3c2d7b253ada98c5b81d52
SHA512dbc10fa428df0d8fb3f6c0d855561f319b4fc8546f16d69202ad38d4c8d6726253cb9f9b21c26bbe497c0ffe30de1d2d5a0019f1006f7448722fbfbcf0386d85