| File name: | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta |
| Full analysis: | https://app.any.run/tasks/94f447cd-8e37-4583-bdff-a5cdd791d116 |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | April 05, 2025, 05:06:17 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections |
| MD5: | 454BFA64548EB9973672CE3E3E5DD225 |
| SHA1: | 2AE971288F40EBB062990A19ED10916E1E302BEB |
| SHA256: | D9D7822E8484B533F9676D892FBB29CC4AF53D0D992E611938E451964427C6C7 |
| SSDEEP: | 24576:X5FFggkHLWqnivnuhHqaEVYS6IiXm7rxZgccJNqZLN92:XT+gkHLWqnivnuhHqvVYS/iXwrxZgccF |
| .exe | | | InstallShield setup (58.7) |
|---|---|---|
| .scr | | | Windows screen saver (17.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.9) |
| .exe | | | Win32 Executable (generic) (6.1) |
| .exe | | | Win16/32 Executable Delphi generic (2.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1992:06:19 22:22:17+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 29696 |
| InitializedDataSize: | 10752 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x80e4 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3888 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | SrTasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5720 | C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11 | C:\Windows\System32\SrTasks.exe | — | dllhost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Windows System Protection background tasks. Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6620 | "C:\Users\admin\AppData\Local\Temp\3582-490\FileCoAuth.exe" -Embedding | C:\Users\admin\AppData\Local\Temp\3582-490\FileCoAuth.exe | — | FileCoAuth.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft OneDriveFile Co-Authoring Executable Exit code: 0 Version: 19.043.0304.0013 Modules
| |||||||||||||||
| 7276 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7572 | "C:\Users\admin\Desktop\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe" | C:\Users\admin\Desktop\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 7620 | "C:\Users\admin\AppData\Local\Temp\3582-490\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe" | C:\Users\admin\AppData\Local\Temp\3582-490\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | ||||||||||||
User: admin Company: KINGSTON COMPONENTS INC. Integrity Level: MEDIUM Description: Kingston AURA DRAM Component Exit code: 1 Version: 1.1.36 Modules
| |||||||||||||||
| 7644 | "C:\Users\admin\AppData\Local\Temp\{3449E0B0-3EFA-474C-B810-E6904340227F}\.cr\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\3582-490\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe" -burn.filehandle.attached=580 -burn.filehandle.self=576 | C:\Users\admin\AppData\Local\Temp\{3449E0B0-3EFA-474C-B810-E6904340227F}\.cr\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | ||||||||||||
User: admin Company: KINGSTON COMPONENTS INC. Integrity Level: MEDIUM Description: Kingston AURA DRAM Component Exit code: 1 Version: 1.1.36 Modules
| |||||||||||||||
| 7848 | "C:\Users\admin\AppData\Local\Temp\{3C8EDDC1-223E-4173-A47D-068AF5DB6EA5}\.be\AacSetup.exe" -q -burn.elevated BurnPipe.{4BBC9D22-F8BC-4955-A39F-218AE0CB918A} {85EBFBEC-1678-442A-B8FE-F9B80CA56108} 7644 | C:\Users\admin\AppData\Local\Temp\{3C8EDDC1-223E-4173-A47D-068AF5DB6EA5}\.be\AacSetup.exe | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | ||||||||||||
User: admin Company: KINGSTON COMPONENTS INC. Integrity Level: HIGH Description: Kingston AURA DRAM Component Exit code: 1 Version: 1.1.36 Modules
| |||||||||||||||
| 7896 | C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7940 | C:\WINDOWS\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Enter) |
Value: 4800000000000000AA7D8081E8A5DB01D81E0000F01E0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7848) AacSetup.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 4000000000000000AA7D8081E8A5DB01A81E0000AC1E0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Leave) |
Value: 48000000000000003BFB0582E8A5DB01D81E0000F01E0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Enter) |
Value: 4800000000000000C05F0882E8A5DB01D81E0000F01E0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Leave) |
Value: 480000000000000081C30A82E8A5DB01D81E0000F01E0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP |
| Operation: | write | Name: | LastIndex |
Value: 11 | |||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppCreate (Enter) |
Value: 48000000000000002E8C0F82E8A5DB01D81E0000F01E0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7896) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 480000000000000055F58182E8A5DB01D81E00005C1F0000E80300000100000000000000000000003F569A28EFB8AB4D9393CF676A947AE600000000000000000000000000000000 | |||
| (PID) Process: | (7940) VSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer |
| Operation: | write | Name: | IDENTIFY (Leave) |
Value: 4800000000000000364C9082E8A5DB01041F0000201F0000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (7940) VSSVC.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001 |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7896 | dllhost.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
| 7572 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Temp\3582-490\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | executable | |
MD5:6D902770A1A701DFCB543950DEFF5EE7 | SHA256:EE8A15396E16DE2763AFB473675CFD157212DA10AE05CBF395BDD645C514DC8C | |||
| 7644 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Temp\{3C8EDDC1-223E-4173-A47D-068AF5DB6EA5}\.ba\wixstdba.dll | executable | |
MD5:FE7E0BD53F52E6630473C31299A49FDD | SHA256:2BEA14D70943A42D344E09B7C9DE5562FA7E109946E1C615DD584DA30D06CC80 | |||
| 7644 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Temp\{3C8EDDC1-223E-4173-A47D-068AF5DB6EA5}\.ba\thm.wxl | xml | |
MD5:FC0DB4142556D3F38B0744A12F5F9D3D | SHA256:8FBEB7F0B546D394D99B49D678D516402E8F54E5DEA590CC91733F502F288019 | |||
| 7572 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileSyncConfig.exe | executable | |
MD5:D026B9E26E841107E83D949D47FBCDAA | SHA256:BC57899EE48A674A87E03E5842B55AAE59A8BFEA5986C89FB41340C48D3F55BF | |||
| 7644 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Temp\{3C8EDDC1-223E-4173-A47D-068AF5DB6EA5}\.ba\logo.png | image | |
MD5:80DF19F22C1D266C06ACE7C8B9831762 | SHA256:E8E37845754F62B6426CE39CBDA1DB032856BD551E6D39BBACA06AA7C44625C4 | |||
| 7620 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Temp\{3449E0B0-3EFA-474C-B810-E6904340227F}\.cr\2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | executable | |
MD5:6D902770A1A701DFCB543950DEFF5EE7 | SHA256:EE8A15396E16DE2763AFB473675CFD157212DA10AE05CBF395BDD645C514DC8C | |||
| 7572 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe | executable | |
MD5:029161B0086AB656157D9679726C9034 | SHA256:B332CEDC5388345D7A5AA286C812886469807386889670CC619363857A869006 | |||
| 7572 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\ProgramData\Adobe\ARM\S\388\AdobeARMHelper.exe | executable | |
MD5:BED5120A499CD5999A33D90455A4797F | SHA256:17E0420B42CE3EC312BDAF1D77A2EDDF931C359272E41802E7009CD06D60B809 | |||
| 7572 | 2025-04-05_454bfa64548eb9973672ce3e3e5dd225_black-basta_coinminer_hijackloader_luca-stealer_neshta.exe | C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileSyncHelper.exe | executable | |
MD5:10E3FA799346836C2AA528107AC84830 | SHA256:18012C021928250314264F758F1356D968423439FD7A4FFAA8CDBA540ECF924E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
1348 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
1348 | SIHClient.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
1348 | SIHClient.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
1348 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
1348 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
1348 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 40.69.42.241:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6544 | svchost.exe | 20.190.159.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 20.198.162.78:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | SG | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1348 | SIHClient.exe | 4.245.163.56:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1348 | SIHClient.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |