Analysis
-
max time kernel
107s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe
-
Size
43.9MB
-
MD5
413c38e2d5fefaa876ea3be70366221f
-
SHA1
dcc8c3c35bc90f7206ecb070b5b86e7c0d63327e
-
SHA256
f32749f0ed8816cf25f2e5f83c245f12af6c4be67d1aa41e3aa47753e647905b
-
SHA512
baa2ac02b699931e6b85e1dcfa0be0e4e4f4922ec7e7210f42724d44d0a3665da53de11798b2a76781e28b2d58fe15c3c5877ded1886458ebdf2e98e6ffc9022
-
SSDEEP
393216:y76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nr:y0LoCOn+2ys4urYDNulLBiuP
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/232-25-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Executes dropped EXE 2 IoCs
pid Process 4788 MT GOLDEN SCHULTE.exe 1240 MT GOLDEN SCHULTE.exe -
Loads dropped DLL 6 IoCs
pid Process 4788 MT GOLDEN SCHULTE.exe 4788 MT GOLDEN SCHULTE.exe 4788 MT GOLDEN SCHULTE.exe 1240 MT GOLDEN SCHULTE.exe 1240 MT GOLDEN SCHULTE.exe 1240 MT GOLDEN SCHULTE.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MT GOLDEN SCHULTE = "cmd.exe /C start \"\" /D \"C:\\Users\\Admin\\SystemRootDoc\" \"C:\\Users\\Admin\\SystemRootDoc\\MT GOLDEN SCHULTE.exe\"" MT GOLDEN SCHULTE.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 checkip.dyndns.org 20 reallyfreegeoip.org 21 reallyfreegeoip.org 22 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4788 set thread context of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 1240 set thread context of 3596 1240 MT GOLDEN SCHULTE.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 232 regasm.exe 3596 regasm.exe 3596 regasm.exe 232 regasm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4788 MT GOLDEN SCHULTE.exe Token: SeDebugPrivilege 4788 MT GOLDEN SCHULTE.exe Token: SeDebugPrivilege 1240 MT GOLDEN SCHULTE.exe Token: SeDebugPrivilege 1240 MT GOLDEN SCHULTE.exe Token: SeDebugPrivilege 232 regasm.exe Token: SeDebugPrivilege 3596 regasm.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4788 2896 2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe 89 PID 2896 wrote to memory of 4788 2896 2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe 89 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 4788 wrote to memory of 232 4788 MT GOLDEN SCHULTE.exe 90 PID 1696 wrote to memory of 1136 1696 cmd.exe 93 PID 1696 wrote to memory of 1136 1696 cmd.exe 93 PID 1136 wrote to memory of 1240 1136 cmd.exe 94 PID 1136 wrote to memory of 1240 1136 cmd.exe 94 PID 1240 wrote to memory of 4276 1240 MT GOLDEN SCHULTE.exe 95 PID 1240 wrote to memory of 4276 1240 MT GOLDEN SCHULTE.exe 95 PID 1240 wrote to memory of 4276 1240 MT GOLDEN SCHULTE.exe 95 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 PID 1240 wrote to memory of 3596 1240 MT GOLDEN SCHULTE.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\53bec07df5672c7a4e4e82a8d8ac7f38\MT GOLDEN SCHULTE.exe"C:\Users\Admin\AppData\Local\Temp\53bec07df5672c7a4e4e82a8d8ac7f38\MT GOLDEN SCHULTE.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /C start "" /D "C:\Users\Admin\SystemRootDoc" "C:\Users\Admin\SystemRootDoc\MT GOLDEN SCHULTE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\cmd.execmd.exe /C start "" /D "C:\Users\Admin\SystemRootDoc" "C:\Users\Admin\SystemRootDoc\MT GOLDEN SCHULTE.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\SystemRootDoc\MT GOLDEN SCHULTE.exe"C:\Users\Admin\SystemRootDoc\MT GOLDEN SCHULTE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"4⤵PID:4276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633KB
MD5573c3aa20cab92c93663f0e475323557
SHA1647598a3a90b23787b83f0c23ba26a8b4b779592
SHA2569ebea5ecb5f86bccf0564f563a35665876e5bcb1b66285a19965af5f24534b4a
SHA51206fbf4dfea02ac62c81c9e47581d779891e2da9113ed45f349af2e4c52b86da9701a807872a5cfc059c5553de63bab3a24953a06a63d82cf8bf877c3dc538694
-
Filesize
130KB
MD51e0299f7758f15f216295ef15fa199ef
SHA12eeb332581001d64335676713f7e83e6c0ca709b
SHA256797b1889a661c23637567e0308c285caa7225e26df8c280665d8c092910d181f
SHA512243a1b891be485412745b49c6c278624aa748d69961b9e01ce9ec0e8e79e93477bd270176dbbcb82af3d1262e6f659e84c3615bfdcc01f7c1f85be464785279e
-
Filesize
412KB
MD5de738f87b7a558476d73d590ea20a3b9
SHA1ea2da2c8b5c811ea798805d3e77250f12cf6da76
SHA25687b2d5cd0f667d8f72468ffd146dcf2aebdf7e65db575c04ffe6a4df9c1f1850
SHA512934a24556d0a4dd7643c03f96cb057ff25bceecbc9795c4a30884aecc5afd441fa99bfe0d978c8879f3fb10260373f055731f51a18775c55de68fa716bccb81b
-
Filesize
3.1MB
MD54910cd0a971b542d8d298c0ec16954d9
SHA14617c8e9948f02b1a7ff64f7286398f2a27c27e1
SHA256485b37a6b5d745cfac4004e71ebbafc8d0297c9550d36781cb5ec068617b7473
SHA5129543901a10b875049eb9ddcc2cb490ce241b994f94346b341d1a3c52b5488f33cec773f021695300333310ff00595d28634b0472706b27fbbc0a40c042e532eb
-
Filesize
2KB
MD52ebe4c9f2a5d071c3c81c2e4d66643a6
SHA14edd8a61d81c38bf71355ce39873c6d618973bff
SHA256d469a3fd8e63e585395f36ee25590259d32f2520a7df1a2344143d267b3da04b
SHA5120120c6a34283fe789aad5b68f4053de4118c46f7f8306a4989ec07dd5e8373bf7b624bcc1bcb99e5b8a315808b2474f16e67d7f8b6fb43ab46f54d4627e76423
-
Filesize
3.7MB
MD5b282796d776824edebcff8ed888d39a3
SHA1577b3f53d6d992d3d6261d391816cb9b669f612a
SHA256ea1664f577fe05f89f2b3dd0cbed3667015ff5280e29f89035a1fc99c821ba7a
SHA51279c2a5832a4f8599c74b7b153634e1efa9085f640138c817eac9e767eeb0fabdfa58d97d037d54330fe14e683df1b0985e17135198945b14b5b568f99f509d7e