Black Basta Ransomware

Jimmy Pham · July 15, 2022

Trend Micro analyzed recent Black Basta ransomware group campaigns and observed it using the banking trojan QakBot to gain initial access and exploiting PrintNightmare vulnerability (CVE-2021-34527) to perform privileged file operations.

Distribution and Initial Access

Black Basta has been observed using the banking trojan QakBot to gain initial access. QakBot is distributed using spear phishing emails attached with Excel files containing Excel 4.0 macros.

Once the recipient enables macros, QakBot DLL files are downloaded onto the host system, which is then executed via regsvr32.exe.

Installation and Maintaining Persistence

The QakBot DLL proceeds to perform process injection using explorer.exe, after which the injected process creates a scheduled task to maintain persistence.

Qakbot then installs a Cobeacon, a Cobalt Strike beacon backdoor variant, establishing a named pipe for communication.

Network Discovery and Defense Evasion

After QakBot has been installed, it proceeds to download and execute Cobeacon via a fileless PowerShell script containing several layers of obfuscation:

  • It’s first layer of obfuscation is a Base64-encoded PowerShell command, establishing a pipe for communication.
  • The second layer of obfuscation involves loading and reading of an archive file in memory
  • The third layer of obfuscation contains the decoded script for running the Base64-encoded shellcode

Privilege Escalation

In addition to OakBot and Cobeacon, Black Basta has also been observed exploiting the PrintNightmare vulnerability which targets the Windows Print Spooler Service (spoolsv.exe) to deliver its payload (spider.dll) and perform escalated

Lateral Movement

Black Basta threat actors were observed using the Coroxy backdoor alongside the network utility tool Netcat to move laterally across the network.

Data Exfiltration

The Cobeacon backdoor establishes a pipe for communication which may be possibly used for data exfiltration purposes once information has been collected from a targeted system. The Coroxy backdoor in conjunction with netcat is also another possible communication channel.

Operational Details

Once the attackers gained a wide foothold in the target network, they executed the Black Basta ransomware to encrypt files while the infected system is in safe mode, appending the encrypted files with the .basta extension. Black Basta ransomware injects into an existing Windows service and launches its decryptor executable.

The ransomware then utilizes the ChaCha20 algorithm to encrypt files. Each folder on the encrypted drive contains a readme.txt file containing information about the attack and links along with a unique ID to enter a negotiation chat session with the threat actors. The wallpaper is changed to display: “Your network is encrypted by the Black Basta group.”

Threat Actor Objectives

Black Basta ransomware group employs a double extortion scheme that involves stealing confidential data before encrypting it so they can threaten victims with the public release of the stolen data if payment is not made within seven days of the attack. To fulfil their extortion objectives, they release this information on their Tor website, Basta News, if the victim does not pay the ransom.

Indicators of Compromise

Hashes

Sha256 TrendMicro Detection Signature
01fafd51bb42f032b08b1c30130b963843fea0493500e871d6a6a87e555c7bac Ransom.Win32.BLACKBASTA.YXCEP
72a48f8592d89eb53a18821a54fd791298fcc0b3fc6bf9397fd71498527e7c0e Trojan.X97M.QAKBOT.YXCFH
580ce8b7f5a373d5d7fbfbfef5204d18b8f9407b0c2cbf3bcae808f4d642076a Backdoor.Win32.COROXY.YACEKT
130af6a91aa9ecbf70456a0bee87f947bf4ddc2d2775459e3feac563007e1aed Trojan.Win64.QUAKNIGHTMARE.YACEJT
c7eb0facf612dbf76f5e3fe665fe0c4bfed48d94edc872952a065139720e3166 TrojanSpy.Win32.QAKBOT.YXCEEZ
ffa7f0e7a2bb0edf4b7785b99aa39c96d1fe891eb6f89a65d76a57ff04ef17ab TrojanSpy.Win32.QAKBOT.YACEJT
2083e4c80ade0ac39365365d55b243dbac2a1b5c3a700aad383c110db073f2d9 TrojanSpy.Win32.QAKBOT.YACEJT
1e7174f3d815c12562c5c1978af6abbf2d81df16a8724d2a1cf596065f3f15a2 TrojanSpy.Win32.QAKBOT.YACEJT
2d906ed670b24ebc3f6c54e7be5a32096058388886737b1541d793ff5d134ccb TrojanSpy.Win32.QAKBOT.YACEJT
72fde47d3895b134784b19d664897b36ea6b9b8e19a602a0aaff5183c4ec7d24 TrojanSpy.Win32.QAKBOT.YACEJT
2e890fd02c3e0d85d69c698853494c1bab381c38d5272baa2a3c2bc0387684c1 TrojanSpy.Win32.QAKBOT.YACEJT
c9df12fbfcae3ac0894c1234e376945bc8268acdc20de72c8dd16bf1fab6bb70 Ransom.Win32.BLACKBASTA.YACEJ
8882186bace198be59147bcabae6643d2a7a490ad08298a4428a8e64e24907ad Ransom.Win32.BLACKBASTA.YACEJ
0e2b951ae07183c44416ff6fa8d7b8924348701efa75dd3cb14c708537471d27 Ransom.Win32.BLACKBASTA.YACEJ
0d3af630c03350935a902d0cce4dc64c5cfff8012b2ffc2f4ce5040fdec524ed Ransom.Win32.BLACKBASTA.YACEJ
df35b45ed34eaca32cda6089acbfe638d2d1a3593d74019b6717afed90dbd5f8 Ransom.Win32.BLACKBASTA.YACEJ
3fe73707c2042fefe56d0f277a3c91b5c943393cf42c2a4c683867d6866116fc Ransom.Win32.BLACKBASTA.YACEJ
433e572e880c40c7b73f9b4befbe81a5dca1185ba2b2c58b59a5a10a501d4236 Ransom.Win32.BLACKBASTA.A.note
c4683097a2615252eeddab06c54872efb14c2ee2da8997b1c73844e582081a79 PUA.Win32.Netcat.B

IPs

24[.]178[.]196[.]44:2222

37[.]186[.]54[.]185:995

39[.]44[.]144[.]182:995

45[.]63[.]1[.]88:443

46[.]176[.]222[.]241:995

47[.]23[.]89[.]126:995

72[.]12[.]115[.]15:22

72[.]76[.]94[.]52:443

72[.]252[.]157[.]37:995

72[.]252[.]157[.]212:990

73[.]67[.]152[.]122:2222

75[.]99[.]168[.]46:61201

103[.]246[.]242[.]230:443

113[.]89[.]5[.]177:995

148[.]0[.]57[.]82:443

167[.]86[.]165[.]191:443

173[.]174[.]216[.]185:443

180[.]129[.]20[.]53:995

190[.]252[.]242[.]214:443

217[.]128[.]122[.]16:2222

URLs

elblogdeloscachanillas[.]com[.]mx/S3sY8RQ10/Ophn[.]png

lalualex[.]com/ApUUBp1ccd/Ophn[.]png

lizety[.]com/mJYvpo2xhx/Ophn[.]png

MITRE ATT&CK® Techniques

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Defence Evasion T1112 T1027 T1562.001 Modify Registry Obfuscated Files or Information Impair Defences: Disable or Modify Tools
Discovery T1082 T1083 System Information Discovery File and Directory Discovery
Impact T1490 T1489 T1486 Inhibit System Recovery Service Stop,Data Encrypted for Impact

Twitter, Facebook