Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows11-21h2_x64 -
resource
win11-20250502-en -
resource tags
arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/07/2025, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe
Resource
win10v2004-20250610-en
Behavioral task
behavioral2
Sample
2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe
Resource
win11-20250502-en
General
-
Target
2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe
-
Size
1.3MB
-
MD5
e6da5b9585c712da81f9e1e0deea43c7
-
SHA1
1a9af9635d8620d4147ed5fb11c4bb2725ad634c
-
SHA256
596fef4197fa1900b3de0094fa649da8ff19c78c1c382f2dc1bd8db550ce6ab3
-
SHA512
a1dfb1dc2d7f77d8f63b91ea9e9c0d2367b233fa47bf4f1c669c66f51d5a1f24fedcb56ce367a1e07328104f815be92479318e7c00dc9feeb0b6086ca9817798
-
SSDEEP
24576:dNiCgn1fZTlhtctmeP2kdKaZy4o8g4VEl9JL79v:dNcnRZphtcgePXKey4W4W/79v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 648 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1088 2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe"C:\Users\Admin\AppData\Local\Temp\2025-07-02_e6da5b9585c712da81f9e1e0deea43c7_black-basta_vidar.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:648
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5fe9078ee3c0f7c47f6fb59b027cb4421
SHA1fd2c7c6f2b131cb7b61e24382af45f69d4d62cb0
SHA2568061647059fce38460d2a6f5633812df1762e6b57a92ea721299d5408db5c496
SHA5121c7fb8df288a9fbdcbc2d42b617dab0c1c7af91741b8f83c5a1a02a51b00501ff992c45dce209f506b78869a98e8bc4a32640afc05b1696c58593ef6db01e440