Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows11-21h2_x64 -
resource
win11-20250502-en -
resource tags
arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/07/2025, 18:50
Behavioral task
behavioral1
Sample
2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe
Resource
win10v2004-20250610-en
Behavioral task
behavioral2
Sample
2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe
Resource
win11-20250502-en
General
-
Target
2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe
-
Size
3.3MB
-
MD5
e4284d6aee336dbd08d4ca5531f4dd9d
-
SHA1
645df33986ffab9ac8e15445fb732b20cd46f237
-
SHA256
e04dc798c5d65cf6a57aae67e32fcc7cd8365e746d3238b8d4bba9cf75491bba
-
SHA512
4ffc204de7acae995bd5f93fe6b4555e8ed0597b5328624eee60ccaf3bdc0f94390b4c3209e398f05058f1ef7c0a3e2ebd105d034808318a7a945eb7fe077088
-
SSDEEP
49152:LX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe85QE:LlRsZ47/QXoHUOfAoj1x6E
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4800 wmic.exe Token: SeSecurityPrivilege 4800 wmic.exe Token: SeTakeOwnershipPrivilege 4800 wmic.exe Token: SeLoadDriverPrivilege 4800 wmic.exe Token: SeSystemProfilePrivilege 4800 wmic.exe Token: SeSystemtimePrivilege 4800 wmic.exe Token: SeProfSingleProcessPrivilege 4800 wmic.exe Token: SeIncBasePriorityPrivilege 4800 wmic.exe Token: SeCreatePagefilePrivilege 4800 wmic.exe Token: SeBackupPrivilege 4800 wmic.exe Token: SeRestorePrivilege 4800 wmic.exe Token: SeShutdownPrivilege 4800 wmic.exe Token: SeDebugPrivilege 4800 wmic.exe Token: SeSystemEnvironmentPrivilege 4800 wmic.exe Token: SeRemoteShutdownPrivilege 4800 wmic.exe Token: SeUndockPrivilege 4800 wmic.exe Token: SeManageVolumePrivilege 4800 wmic.exe Token: 33 4800 wmic.exe Token: 34 4800 wmic.exe Token: 35 4800 wmic.exe Token: 36 4800 wmic.exe Token: SeIncreaseQuotaPrivilege 4800 wmic.exe Token: SeSecurityPrivilege 4800 wmic.exe Token: SeTakeOwnershipPrivilege 4800 wmic.exe Token: SeLoadDriverPrivilege 4800 wmic.exe Token: SeSystemProfilePrivilege 4800 wmic.exe Token: SeSystemtimePrivilege 4800 wmic.exe Token: SeProfSingleProcessPrivilege 4800 wmic.exe Token: SeIncBasePriorityPrivilege 4800 wmic.exe Token: SeCreatePagefilePrivilege 4800 wmic.exe Token: SeBackupPrivilege 4800 wmic.exe Token: SeRestorePrivilege 4800 wmic.exe Token: SeShutdownPrivilege 4800 wmic.exe Token: SeDebugPrivilege 4800 wmic.exe Token: SeSystemEnvironmentPrivilege 4800 wmic.exe Token: SeRemoteShutdownPrivilege 4800 wmic.exe Token: SeUndockPrivilege 4800 wmic.exe Token: SeManageVolumePrivilege 4800 wmic.exe Token: 33 4800 wmic.exe Token: 34 4800 wmic.exe Token: 35 4800 wmic.exe Token: 36 4800 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3232 wrote to memory of 4800 3232 2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe 79 PID 3232 wrote to memory of 4800 3232 2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-07-02_e4284d6aee336dbd08d4ca5531f4dd9d_black-basta_coinminer_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4800
-