Analysis
-
max time kernel
104s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 03:20
Behavioral task
behavioral1
Sample
2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe
-
Size
6.3MB
-
MD5
fe49dbc5b45b0870a0c4e6ecf5edb2c9
-
SHA1
0e2fc8505f8f031453760b5a13ed008bda616279
-
SHA256
79866400faef209c9ba595eb4759ad737176304c7ba1c8c711dc86b0ba7e4043
-
SHA512
a5b7a35d86b2635710a3ed05980ae86f25246f5cd91df4557a2131215baec292c458e6d7d733760418e44c8dea0dcb2091d70c54d58d01729abc6834bc5f11fb
-
SSDEEP
196608:+x+f6jEnoDPvbUpFZ6pCPK6YYzaOFvcVLa7hwIFP:xf6EoDPgFNRLvga1w8P
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation 2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 ABUsbTips.exe -
Loads dropped DLL 2 IoCs
pid Process 1076 ABUsbTips.exe 1076 ABUsbTips.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4624 1076 WerFault.exe 86 3812 1076 WerFault.exe 86 3252 1076 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ABUsbTips.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1076 ABUsbTips.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 1076 3684 2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe 86 PID 3684 wrote to memory of 1076 3684 2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe 86 PID 3684 wrote to memory of 1076 3684 2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ABUsbTips.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ABUsbTips.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 4443⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 4523⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 4883⤵
- Program crash
PID:3252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1076 -ip 10761⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1076 -ip 10761⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1076 -ip 10761⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
527KB
MD51ca8ed406d7a61b803bb7d81f3b76a0c
SHA15a44ef253ec3c1e384ebd414258ce24bcd5233e7
SHA2562a60e8ec6263352b42e8a0229cb872c07d1ebaf76015a206a98c9cfc98e0fd2f
SHA512ba654d7fbafa61e877d018cfe33248995ae964c85a042ce3402a404471b4df2827f737964cf044f70e01fd28329d8214417b010c64e5905e3aa7d5274b24ce46
-
Filesize
2.3MB
MD5d08b08d8258bab78d2bdc82855114509
SHA1eaf31b2dce92dafec252af5775ab2de369d4ae86
SHA256b643c98761a114c1a9346387911e73696aec65baafaf3e9e26f5fdaee7440e18
SHA512baf0fe2dc1eaaf4dfcc55fef9e0c3b9f8e79aa94b71767d89910d7e9f6ecefdbe0deded529ead81e471cad4753d937ab4293af4cddd2b5a07f00e923c3aebccc
-
Filesize
8.2MB
MD59c8147773d84f4960aac909f324cb236
SHA1813f71ce6004b9e124890413601b808e42b4e72c
SHA256fd288b6cc0e7fabb7eb5e4d38e4f768c68b3067ef7f193185dcc7eaea6604853
SHA512230701e1a8d4103d22e421f76c7259a87e6f76a24792dab1eed4762529cc70f7e9c49d411b13fac083ec169a296fd14eadc685227a94875c8720b44046e3d32d
-
Filesize
53KB
MD5860675194c9e54fff2425f5835bb09f3
SHA114b299898ac46da8dba6134a4ae3099f74f5e929
SHA256a898265b6003eb91a3c40fc4691696e3a36869e11608490c4e2fcbc545a9c33a
SHA512cde53f71ee540cecf3d8e974438ed206809e739d467a01d9468d1d57d2927b13fefc97ed287b3c38cdb63cf1a1b9240d6d1100c52d38abeae467e4e7cfbb2765