Analysis
-
max time kernel
12s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2025, 00:39
Behavioral task
behavioral1
Sample
2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe
Resource
win11-20250410-en
General
-
Target
2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe
-
Size
10.6MB
-
MD5
0cc2edd1e91b0809faa0b307b605f67d
-
SHA1
f668413bbfdedc77f887796c765213bed476c528
-
SHA256
7302e1d836855c882f725727d8a519c7680ced1b960e845022057345b2255ecc
-
SHA512
eba85534acb12c87f128a9dfd426a928edffcf53a18731557a7fdf1cc0889d845b3b71a1c5e03abc1161e1ec3df9ef01cdd6ff3ab1d85e5bd6d5746bc9778238
-
SSDEEP
196608:da9+6Y7SOEibgRrwoFWyZ/K0ttYVAATsKmd0L:dFgRrwowyZ/K0ttYZT7qw
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2536-0-0x0000000000400000-0x0000000000613000-memory.dmp family_blackmoon behavioral1/files/0x0001000000021647-68.dat family_blackmoon -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Xmrig family
-
XMRig Miner payload 17 IoCs
resource yara_rule behavioral1/memory/2536-0-0x0000000000400000-0x0000000000613000-memory.dmp xmrig behavioral1/files/0x0007000000024202-9.dat xmrig behavioral1/files/0x0001000000021647-68.dat xmrig behavioral1/memory/4832-284-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-455-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-456-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-458-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-460-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-463-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-481-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-490-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-527-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-605-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-606-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-607-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-608-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral1/memory/4832-609-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Executes dropped EXE 1 IoCs
pid Process 4832 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\os_update_handler.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\Windows Media Player\wmpnscfg.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\grv_icons.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\config.json 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File created C:\Windows\svchost.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Windows\config.json 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe File opened for modification C:\Windows\svchost.exe 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2536 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Token: 33 2536 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Token: SeIncBasePriorityPrivilege 2536 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Token: SeIncBasePriorityPrivilege 4832 svchost.exe Token: SeLockMemoryPrivilege 4832 svchost.exe Token: SeLockMemoryPrivilege 4832 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe 6044 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1608 wrote to memory of 6044 1608 cmd.exe 87 PID 1608 wrote to memory of 6044 1608 cmd.exe 87 PID 1608 wrote to memory of 6044 1608 cmd.exe 87 PID 2536 wrote to memory of 4832 2536 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe 89 PID 2536 wrote to memory of 4832 2536 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe 89 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2536 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exeC:\Users\Admin\AppData\Local\Temp\2025-04-22_0cc2edd1e91b0809faa0b307b605f67d_black-basta_elex_hijackloader_icedid_rhadamanthys_xmrig.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6044
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.7MB
MD50eb614643ab093ba962c0fab18885788
SHA10e7a7a4972f98cbefcca8f91a64983df0afb3295
SHA256ebb75b25f064ed4535449ed0106450c1c6c2f02138e728b5a4fd861702384cdb
SHA51209d7acfce3d51862a37fc4098a776523f7e40a59a8476f3f4c8ee98df5d6b235b2543907932f898969f5a394ae8ec27aa38e1bde25a3699f8197f5045fabb7c9
-
Filesize
1KB
MD588c5c5706d2e237422eda18490dc6a59
SHA1bb8d12375f6b995301e756de2ef4fa3a3f6efd39
SHA2564756a234ed3d61fe187d9b6140792e54e7b757545edff82df594a507e528ed8e
SHA512a417270a0d46de5bb06a621c0383c893042a506524713f89ba55567df6e5c3ac8b198bce5a0300ec6e716897bb53fd3e8289a51240157dc743004517673d4ab7
-
Filesize
833KB
MD54a87a4d6677558706db4afaeeeb58d20
SHA17738dc6a459f8415f0265d36c626b48202cd6764
SHA25608b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7
SHA512bedd8ed4975df3fcd4a0f575d6f38e3841e7a4b771baac4f72033102a070818b8539eb101c50563d89d4f3454899a1cedb33047b02e421256dedf9aaf258b594
-
Filesize
81KB
MD52d16415a5a7818d9447a7983dae16247
SHA180365dd19e89d6fac185700a0e1445cf76d827b0
SHA256b56e742d9646acdc6ea1ae9eeb2425e725cb9ae5849db179109572acc6adabda
SHA512417933b179687529b61bb052455111bb39e5f8dbe093b590898645126455506db6bcf345f9e493ca33f1591a7d2c5ec750d5b6dc2dafa93cd357d233a9d11c62