Analysis

  • max time kernel
    104s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 03:20

General

  • Target

    2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe

  • Size

    6.3MB

  • MD5

    fe49dbc5b45b0870a0c4e6ecf5edb2c9

  • SHA1

    0e2fc8505f8f031453760b5a13ed008bda616279

  • SHA256

    79866400faef209c9ba595eb4759ad737176304c7ba1c8c711dc86b0ba7e4043

  • SHA512

    a5b7a35d86b2635710a3ed05980ae86f25246f5cd91df4557a2131215baec292c458e6d7d733760418e44c8dea0dcb2091d70c54d58d01729abc6834bc5f11fb

  • SSDEEP

    196608:+x+f6jEnoDPvbUpFZ6pCPK6YYzaOFvcVLa7hwIFP:xf6EoDPgFNRLvga1w8P

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ABUsbTips.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ABUsbTips.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 444
        3⤵
        • Program crash
        PID:4624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 452
        3⤵
        • Program crash
        PID:3812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 488
        3⤵
        • Program crash
        PID:3252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1076 -ip 1076
    1⤵
      PID:2124
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1076 -ip 1076
      1⤵
        PID:2828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1076 -ip 1076
        1⤵
          PID:324

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ABUsbTips.exe

          Filesize

          527KB

          MD5

          1ca8ed406d7a61b803bb7d81f3b76a0c

          SHA1

          5a44ef253ec3c1e384ebd414258ce24bcd5233e7

          SHA256

          2a60e8ec6263352b42e8a0229cb872c07d1ebaf76015a206a98c9cfc98e0fd2f

          SHA512

          ba654d7fbafa61e877d018cfe33248995ae964c85a042ce3402a404471b4df2827f737964cf044f70e01fd28329d8214417b010c64e5905e3aa7d5274b24ce46

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\QtCore4.dll

          Filesize

          2.3MB

          MD5

          d08b08d8258bab78d2bdc82855114509

          SHA1

          eaf31b2dce92dafec252af5775ab2de369d4ae86

          SHA256

          b643c98761a114c1a9346387911e73696aec65baafaf3e9e26f5fdaee7440e18

          SHA512

          baf0fe2dc1eaaf4dfcc55fef9e0c3b9f8e79aa94b71767d89910d7e9f6ecefdbe0deded529ead81e471cad4753d937ab4293af4cddd2b5a07f00e923c3aebccc

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\QtGui4.dll

          Filesize

          8.2MB

          MD5

          9c8147773d84f4960aac909f324cb236

          SHA1

          813f71ce6004b9e124890413601b808e42b4e72c

          SHA256

          fd288b6cc0e7fabb7eb5e4d38e4f768c68b3067ef7f193185dcc7eaea6604853

          SHA512

          230701e1a8d4103d22e421f76c7259a87e6f76a24792dab1eed4762529cc70f7e9c49d411b13fac083ec169a296fd14eadc685227a94875c8720b44046e3d32d

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\oophyte.vhd

          Filesize

          53KB

          MD5

          860675194c9e54fff2425f5835bb09f3

          SHA1

          14b299898ac46da8dba6134a4ae3099f74f5e929

          SHA256

          a898265b6003eb91a3c40fc4691696e3a36869e11608490c4e2fcbc545a9c33a

          SHA512

          cde53f71ee540cecf3d8e974438ed206809e739d467a01d9468d1d57d2927b13fefc97ed287b3c38cdb63cf1a1b9240d6d1100c52d38abeae467e4e7cfbb2765