symantec-enterprise-blogs.security.com Open in urlscan Pro
2606:4700:10::6816:30d7  Public Scan

Submitted URL: http://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day
Effective URL: https://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day
Submission: On June 18 via api from DE — Scanned from DE

Form analysis 1 forms found in the DOM

<form _ngcontent-ng-c690681020="" novalidate="" class="subscribe-form ng-untouched ng-pristine ng-invalid"><!---->
  <div _ngcontent-ng-c690681020="" class="form-fields">
    <div _ngcontent-ng-c690681020="" class="form-item subscribe-form-tos"><input _ngcontent-ng-c690681020="" type="checkbox" name="termsAccept"> I accept the
      <a _ngcontent-ng-c690681020="" target="_self" href="https://www.broadcom.com/company/legal/terms-of-use/">Terms of Use</a>. Your privacy is important to us. Please see our
      <a _ngcontent-ng-c690681020="" target="_self" href="https://www.broadcom.com/company/legal/privacy-policy">Privacy Policy</a> for more information. </div>
    <div _ngcontent-ng-c690681020="" class="form-item"><input _ngcontent-ng-c690681020="" formcontrolname="subscriberEmail" type="email" maxlength="255" name="subscribe" size="20" value="" title="Enter your email address"
        placeholder="Enter your email address" class="subscribe-form__email ng-untouched ng-pristine ng-valid"></div>
    <div _ngcontent-ng-c690681020="" class="form-item"><re-captcha _ngcontent-ng-c690681020="" formcontrolname="recaptcha" id="ngrecaptcha-0" class="ng-untouched ng-pristine ng-invalid">
        <div style="width: 304px; height: 78px;">
          <div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-6aprlg420c02" frameborder="0" scrolling="no"
              sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
              src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Lfqk1EUAAAAALmZHlI0mPZOiPIdZ6gu_91-A49j&amp;co=aHR0cHM6Ly9zeW1hbnRlYy1lbnRlcnByaXNlLWJsb2dzLnNlY3VyaXR5LmNvbTo0NDM.&amp;hl=de&amp;v=KXX4ARWFlYTftefkdODAYWZh&amp;size=normal&amp;cb=9l7k81u7i1im"></iframe>
          </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
            style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
        </div><iframe style="display: none;"></iframe>
      </re-captcha></div><!----><button _ngcontent-ng-c690681020="" class="form-submit" disabled=""><app-svg-icon _ngcontent-ng-c690681020="" class="'page-unsubscribed__icon'"><svg width="25px" height="25px" fill="white"
          class="'page-unsubscribed__icon'">
          <use xlink:href="/assets/icomoon/envelope.svg#envelope"></use>
        </svg></app-svg-icon> Subscribe</button><button _ngcontent-ng-c690681020="" class="form-submit form-submit__submitted hidden"><app-svg-icon _ngcontent-ng-c690681020=""><svg width="25px" height="25px" fill="white">
          <use xlink:href="/assets/icomoon/check.svg#check"></use>
        </svg></app-svg-icon> Submitted</button><!----><!---->
  </div>
</form>

Text Content

Symantec Enterprise Blogs
 * Threat Intelligence
   

Menu


MAIN MENU

 * Blogs Home
   
 * Threat Intelligence - All Divisions
 * Feature Stories - Symantec Enterprise
 * Expert Perspectives - Symantec Enterprise
 * Product Insights
   
 * 日本語
 * Search
 * Broadcom Home

Threat Hunter TeamSymantec
TwitterLinkedIn
SHARE
Posted: 12 Jun, 20243 Min ReadThreat Intelligence
Subscribe
Follow
twitterlinkedin


RANSOMWARE ATTACKERS MAY HAVE USED PRIVILEGE ESCALATION VULNERABILITY AS
ZERO-DAY


SOME EVIDENCE TO SUGGEST THAT ATTACKERS LINKED TO BLACK BASTA COMPILED
CVE-2024-26169 EXPLOIT PRIOR TO PATCHING.

The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the
Black Basta ransomware, may have been exploiting a recently patched Windows
privilege escalation vulnerability as a zero-day. 

The vulnerability (CVE-2024-26169) occurs in the Windows Error Reporting
Service. If exploited on affected systems, it can permit an attacker to elevate
their privileges. The vulnerability was patched on March 12, 2024, and, at the
time, Microsoft said there was no evidence of its exploitation in the wild.
However, analysis of an exploit tool deployed in recent attacks revealed
evidence that it could have been compiled prior to patching, meaning at least
one group may have been exploiting the vulnerability as a zero-day. 


BLACK BASTA LINK

The exploit tool was deployed in a recent attempted ransomware attack
investigated by Symantec’s Threat Hunter Team. Although the attackers did not
succeed in deploying a ransomware payload in this attack, the tactics,
techniques, and procedures (TTPs) used were highly similar to those described in
a recent Microsoft report detailing Black Basta activity. These included the use
of batch scripts masquerading as software updates.

Although no payload was deployed, the similarities in TTPs makes it highly
likely it was a failed Black Basta attack. 


EXPLOIT TOOL

Analysis of the exploit tool revealed that it takes advantage of the fact that
the Windows file werkernel.sys uses a null security descriptor when creating
registry keys. Because the parent key has a “Creator Owner” access control entry
(ACE) for subkeys, all subkeys will be owned by users of the current process.
The exploit takes advantage of this to create a "HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Image File Execution Options\WerFault.exe" registry key where
it sets the "Debugger" value as its own executable pathname. This allows the
exploit to start a shell with administrative privileges. 

The variant of the tool used in this attack
(SHA256: 4aae231fb5357c0647483181aeae47956ac66e42b6b134f5b90da76d8ec0ac63) had a
compilation time stamp of February 27, 2024, several weeks before the
vulnerability was patched. 

A second variant of the tool discovered on Virus Total
(SHA256: b73a7e25d224778172e394426c98b86215087d815296c71a3f76f738c720c1b0) had
an earlier compilation time stamp of December 18, 2023. 

Time stamp values in portable executables are modifiable, which means that a
time stamp is not conclusive evidence that the attackers were using the exploit
as a zero-day. However, in this case there appears to be little motivation for
the attackers to change the time stamp to an earlier date.


REVIVED THREAT

Cardinal introduced Black Basta in April 2022 and from its inception, the
ransomware was closely associated with the Qakbot botnet, which appeared to be
its primary infection vector. 

Qakbot was one of the world’s most prolific malware distribution botnets until
it was taken down following law enforcement action in August 2023. However,
while the takedown led to a dip in Black Basta activity, Cardinal has since
resumed attacks and now appears to have switched to working with the operators
of the DarkGate loader to obtain access to potential victims.


PROTECTION/MITIGATION

For the latest protection updates, please visit the Symantec Protection
Bulletin.


INDICATORS OF COMPROMISE

If an IOC is malicious and the file is available to us, Symantec Endpoint
products will detect and block that file.

4aae231fb5357c0647483181aeae47956ac66e42b6b134f5b90da76d8ec0ac63 – Exploit tool

b73a7e25d224778172e394426c98b86215087d815296c71a3f76f738c720c1b0 – Exploit tool

a31e075bd5a2652917f91714fea4d272816c028d7734b36c84899cd583181b3d – Batch script

3b3bd81232f517ba6d65c7838c205b301b0f27572fcfef9e5b86dd30a1d55a0d – Batch script

2408be22f6184cdccec7a34e2e79711ff4957e42f1ed7b7ad63f914d37dba625 – Batch script

b0903921e666ca3ffd45100a38c11d7e5c53ab38646715eafc6d1851ad41b92e – ScreenConnect


ABOUT THE AUTHOR


THREAT HUNTER TEAM

SYMANTEC

The Threat Hunter Team is a group of security experts within Symantec whose
mission is to investigate targeted attacks, drive enhanced protection in
Symantec products, and offer analysis that helps customers respond to attacks.


WANT TO COMMENT ON THIS POST?

We encourage you to share your thoughts on your favorite social platform.

TwitterLinkedIn


RELATED BLOG POSTS

Posted: 5 Jun, 20243 Min Read


RANSOMHUB: NEW RANSOMWARE HAS ORIGINS IN OLDER KNIGHT

Posted: 16 May, 20248 Min Read


SPRINGTAIL: NEW LINUX BACKDOOR ADDED TO TOOLKIT

Posted: 2 May, 20245 Min Read


GRAPH: GROWING NUMBER OF THREATS LEVERAGING MICROSOFT API

Posted: 12 Mar, 20244 Min Read


RANSOMWARE: ATTACKS CONTINUE TO RISE AS OPERATORS ADAPT TO DISRUPTION

Subscribe
Follow
twitterlinkedin
 * Privacy Policy
 * Cookie Policy
 * Data Processing and Data Transfers
 * Supplier Responsibility
 * Terms of Use
 * Sitemap

Copyright © 2005-2024 Broadcom. All Rights Reserved. The term "Broadcom" refers
to Broadcom Inc. and/or its subsidiaries.


GET BROADCOM SOFTWARE AND SYMANTEC ENTERPRISE LATEST BLOG POSTS IN YOUR INBOX

I accept the Terms of Use. Your privacy is important to us. Please see our
Privacy Policy for more information.


Subscribe Submitted
Close








By clicking accept, you understand that we use cookies to improve your
experience on our website. For more details, please see our Cookie Policy.

Accept Cookies

Cookies Settings