Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2025, 07:04

General

  • Target

    2025-04-17_0786b3ad59868a1b0ee4473c0ba9cf86_black-basta.exe

  • Size

    1.6MB

  • MD5

    0786b3ad59868a1b0ee4473c0ba9cf86

  • SHA1

    6f20b197f037abdedf33e81845c09d0091ffd439

  • SHA256

    cbd083551f8dc04363c802ae11dc1d8c6280ad90f9438d14ce2cbbff949a306f

  • SHA512

    1af04092b6713667bd9abb1718e65e9d51f8946d9b609375112db1c21d6856afb69b65b6728a300077844378d27c7f26ba3db53f89a97b9f7fda864b03cea238

  • SSDEEP

    24576:IZ52nQMF3fHOnVnmpXAJnSGDHP5Shf5H62bPb7Lg:IZ52nt3funVnKXAJPDv5ShhH

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Luminosity family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-17_0786b3ad59868a1b0ee4473c0ba9cf86_black-basta.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-17_0786b3ad59868a1b0ee4473c0ba9cf86_black-basta.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysTskEdit.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\SysTskEdit.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /create /TN "Updates\Security Update Checker" /XML "C:\Users\Admin\AppData\Local\Temp\x"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4688
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysHex.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\SysHex.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5052

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\x

    Filesize

    1KB

    MD5

    103ac309fa69ae16ac3551b7f2891b24

    SHA1

    de1f34fac1408d239ab8cd86555febd60ebf845e

    SHA256

    488c154336f61e7a93fe2be822dc4a7bc304b723eaa6d19d7106556311d9f2e1

    SHA512

    346a6aa6bf8928513dbb9af1cbb13eb7bd455b986ed534201fcefa17a31ff8c584bcd274b25f06b3a61505a778a57981b2a878d9f9cf19ec1d97c2003f5a861d

  • C:\Users\Admin\AppData\Roaming\Microsoft\HexSys.dll

    Filesize

    5KB

    MD5

    d4f0ead3d57b99e4107b433116f67761

    SHA1

    def85833259fe3cfaf8e331e4f6539328f216256

    SHA256

    1d7d49d55413846037730b5e387195826254f601356e6b1998ee5bee75810621

    SHA512

    ca67fee920a57e060a039f0b0969355ac2ff8d10d96704c8955be9d877b4f7cbc7ac4c0ea04f13852933a886c9fe35c2e61929af53bde3b2a381cd573d427209

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysHex.exe

    Filesize

    15KB

    MD5

    acdde8409816de00e5ad3caa0c408281

    SHA1

    da6be139069d366a683a045d2934b8f2fa251ecb

    SHA256

    fca0ce253124352237c762862723fac05c5525e50194afc0ea55c88e449be76b

    SHA512

    c947edf42d76bd93d38124747693b2fc75f620dbdffc3d39283f12d3b0857c47496e3352d170c8c27aac9afb2ac4f6f169b0cefe12efda45e6e64b091a43a8bf

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysHex.exe.config

    Filesize

    942B

    MD5

    f883f377ce6eff0e46aedaf9ed496e3a

    SHA1

    fffe1141ab9d9fae36d0f74aa46095adb546fa78

    SHA256

    fafdb4554fd9d9c36b1d0f8911c670db71719907c2124c5d039b58fbd4e31186

    SHA512

    ea776fb0b6eb1cd4c7a7f90e1bf4a78850e8a0f26cb1c45b3cb30f294c38335d35b70ec6b9bf5b5bafc2ae0e09c4eecf5ad17e200d139b2e66cc756398d11b31

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysTskEdit.exe

    Filesize

    23KB

    MD5

    a5a9b9dcc78191820ff7655f6ebc6741

    SHA1

    c59ad66fc06c52281c8ab90541d45ddfa84dfad7

    SHA256

    4ae4b2103bd542a1b65a0a06227ec1f02c3c4ffb79a4f893901410dcba1c2e66

    SHA512

    09e79a3e6803157f54b68e07915a6f729c5357ee14262f6755faab343f7015fb93e50e973872f54ffddab80d6e06fb3d1f41da207771dfa522315c986c530b4e

  • C:\Users\Admin\AppData\Roaming\Microsoft\youtube.txt

    Filesize

    567KB

    MD5

    e41143c7b43e11f82f52cee2ef5026da

    SHA1

    e2c572b73e24f9389a984ad1fe5127714e876bc6

    SHA256

    4655f9583cf0058c009a3c40dec93a980237d08acc55ef353f1b98fd8df08075

    SHA512

    6d875b9e5464cefd3af80cbdab2064821326627b12ce4e504347bfc95871f6e111a535175a1affd5e54515250c8604b0acf43080db4176681ed298d36c83e87a

  • memory/3684-32-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/3684-16-0x0000000074802000-0x0000000074803000-memory.dmp

    Filesize

    4KB

  • memory/3684-17-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/3684-18-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/3684-31-0x0000000074802000-0x0000000074803000-memory.dmp

    Filesize

    4KB

  • memory/5052-15-0x0000000001530000-0x0000000001538000-memory.dmp

    Filesize

    32KB

  • memory/5052-13-0x0000000000D90000-0x0000000000D98000-memory.dmp

    Filesize

    32KB

  • memory/5052-11-0x00007FF8252A3000-0x00007FF8252A5000-memory.dmp

    Filesize

    8KB

  • memory/5052-34-0x00000000013F0000-0x000000000143E000-memory.dmp

    Filesize

    312KB

  • memory/5052-38-0x0000000001540000-0x0000000001550000-memory.dmp

    Filesize

    64KB