Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 04:31
General
-
Target
2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe
-
Size
2.4MB
-
MD5
487903861a4dc2c9e0649f52508bf7d7
-
SHA1
2b9bc9d98fb1bc76e0f23b4b1ab9db62c8518f6f
-
SHA256
e800748200482e5f07c3a95ec2207a913a328b296354d2844ce6db4bdae13c22
-
SHA512
56c98153cc1e99d33547de73a2a6944606b8f31c4a7b1a0e1a8f136d73dc7e04181ce4667c967d860b8cc2bed046384698ef2e2fbe1e6da6c2b14b8bf9d18260
-
SSDEEP
49152:hWftyQyTqd0YWO4r7KcPxyv2H+edzkzLBvpNaYzp1IJY4YhEB92tz2G2:hIyngl+7KcPnQzLBvA7Bm
Malware Config
Signatures
-
Cryptbot family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5028 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 244 wrote to memory of 4952 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 105 PID 244 wrote to memory of 4952 244 2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe 105 PID 4952 wrote to memory of 5028 4952 cmd.exe 107 PID 4952 wrote to memory of 5028 4952 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\bJZTgokIQSmZ & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2025-04-07_487903861a4dc2c9e0649f52508bf7d7_black-basta_cryptbot.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD5045a04805f1e840c73f59f0efee79343
SHA1eddef47ccafb5050b8a90baf22c2ec224ede54ac
SHA2566a141fa26b10450cb6b654a496463ebb7e7cf337dbbbef9ac4bc0c98ed7524e2
SHA512943e435c8a8719d43d2d47df8bc08a0c1c78f8051008fd47e871ef70036c5c48e403363fd36a5de96073cc011e2396aac75ae8c79cb9ce1f3fa6c3fb29a3fbf9
-
Filesize
430KB
MD587f68c6043c37fb3413dc32acbf9272f
SHA123a3103e54685b682be1d123f15172f9c7e8d440
SHA256ee85a69e429615a43eea79f6dfb24eab672a5311a3c9d23eb1527fc5ed19d719
SHA512782b11798980197a949029fa2ba035c53f008fb07229bdde67cd8889d908e4bfe8f929a5f91755d95ccfbe43f511767a02afe957af419c9a7fa6cc05e06a8326
-
Filesize
10KB
MD511fa671a1ac63a397a44267cbb8a7fc0
SHA163675df51b1be2d8b31466ea50aed598225598c4
SHA25625fa3311c33523af8388391c169d2c14fb1d15a4b2455577d497f1b5bbc40052
SHA5127e1a2445685ffdb46d958352317bf44d445974e5618720a38e4aa5b52635e2b5801cac8bcddca44a912741ab17f9e1c35abf6ff0a8842ccd9d46aa7da3badb21
-
Filesize
57KB
MD5eddbe2e2c0a0427f353a0b4c01509298
SHA10fbbc53ac94ed19012835fe76b4ae34730337925
SHA2563a05febb3217532c21b9980c633d42580ccd9ca06b189cdd6c8f179b606135a4
SHA512aba4717b6b33e9f9c931ed074d819fa244d798fd7e87e5b10e726e18d05f7e16a2965627e885183ad6d64849cd82d002ba9ed66669bd99d76f70cf6e66e8f1e1
-
Filesize
484KB
MD575edaead37ec7080d99d6d62694f3645
SHA13b82cd96482acc45cb1a23c44e2141af3116fbc0
SHA256e3fa45095ac32191bffd261d05accd1d7c8c81ac33b07ffe4cfc17f34cde9bde
SHA512f7292357bb7f7b1e8a27c1775aa11a02d18fd2e254222449d20d66bcf4c5f7c25c0ffef27e650b54903c72a52ba66de003a6c510c26ff06e8953bc487da5a23c
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7