8Base Ransomware

Introduction

8Base ransomware are an English and Russian-speaking threat actor group based in Russia. The group emerged in 2022 but rose to in prominence in May 2023. 8Base operates as a ransomware-as-a-service (RaaS), providing tools and infrastructure to affiliates who infect organisations’ networks in exchange for a cut of the payment. The 8Base ransomware binary is based on the ransomware variant Phobos due to the similarity in code and 8Base have been known to exploit vulnerable VPN appliances without Multi-factor Authentication (MFA).

Tools Used

The analysis used the following tools:

  • Windows 11
  • IDA Free
  • X32dbg
  • PEStudio 9.30
  • CFF Explorer VIII
  • Detect It Easy v3.09
  • Strings.exe (Sysinternals)

Static Analysis

Malware Details

NameFast.exe (8base ransomware binary)
Size68096 bytes
TypePE32 executable for MS Windows
MD587D6D2488B1260E70F4042BF1F292529
SHA1161F9A79F8197C9B5DE1BEB7BD4D425D5C23B45B
SHA25645DE59851D68929632346D6F894DC8C1B6A5C4197DB83C2E33C60631EFC0B39F
ssdeep1536:/NeRBl5PT/rx1mzwRMSTdLpJy/jIlkugRGVy/SR1qo+tEgfNni:/QRrmzwR5JysFV12i
Entropy7.303
Compile Time31/03/2020 14:17:25 UTC
Signed?No
Packer InfoN/A
Table 1: Fast.exe Metadata

Sections

NameVirtual AddressVirtual SizeRaw SizeEntropyMD5
.text0x004010000x000085980x000086006.588A491C4D91A4B5889442E891DA7AAD09F
.rdata0x0040A0000x00000E7C0x000010005.278A73FADB324BBEEC4E8315214D839BD02
.data0x0040B0000x000026B90x000006006.216CE2FE50C2F13EB409131F3EE88EF086B
.cdata0x0040F0000x000062B80x000064005.696F919AED86A9B6CD7CB79BFA453DC462E
.reloc0x0040E0000x000005EE0x000006007.92163531957A01468434C794B6B08C13046
Table 2: Fast.exe Section

File Properties

This executable is a 32-bit executable for the Windows Operating System. The first two bytes of the header are MZ which confirms that this file is an executable file. The ransomware binaries developers wrote the program in C\C++, compiled using Microsoft Visual, and linked using Microsoft Linker. An interesting item to note is that the compilation timestamp is 31 March 2020 which is 2 years before 8base formed.

Figure 1: ransomware Binary Properties

Strings and Imported/Exported Functions

The ransomware binary contained strings and referenced imported functions and libraries. While execution may reveal additional strings, these are the ones present when using the programs Strings and PeStudio. A full list of Strings are in Appendix A.

8Base utilised the following Microsoft Windows system libraries.

Figure 2: Imported Libraries

Code Analysis

Drive Enumeration

The 8Base ransomware binary starts by querying the available drives on the system using the Win32 API function GetLogicalDrives. By knowing which volumes are on a system, this allows the ransomware binary to encrypt data on, not only the C drive, but also other drives on the system.

Figure 3: Enumerating Volumes

Process Termination

After executing, the ransomware binary, it terminates a specific set of programs before continuing to maximise damage against an organisation. The function CreateToolhelp32Snapshot enumerate all running processes and then terminates them using TerminateProcess. The figure below illustrates this behaviour.

Figure 4: Process Termination

The figure and table below shows programs terminated by the ransomware binary. X32dbg retrieved this information and presented it in an easy-to-understand way.

Figure 5: Specified Programs to Terminate
msftesql.exesqlagent.exesqlbrowser.exesqlservr.exesqlwriter.exe
ocssd.exedbsnmp.exesynctime.exeagntsvc.exemydesktopqos.exe
xfssvccon.exemydesktopservice.exeocautoupds.exeagntsvc.exeagntsvc.exe
encsvc.exefirefoxconfig.exetbirdconfig.exeocomm.exemysqld.exe
mysqld-opt.exedbeng50.exesqbcoreservice.exeexcel.exeinfopath.exe
mspub.exeonenote.exeoutlook.exepowerpnt.exesteam.exe
thebat64.exeThunderbird.exeoracle.exeisqlplussvc.exeagntsvc.exe
thebat.exemysqld-nt.exemsaccess.exe
Table 3: Full List of Programs to Terminate

Encryption Method

This binary contains no cryptographic libraries imported from the Windows API which means the ransomware binary itself implements any cryptographic functions. The developers likely did this because some environments limit programs’ access to the Windows crypto API. The ransomware binary encrypts all data on the system, with the exception of C:\Windows, using 256-bit Advanced Encryption Standard (AES256) in Cipher Block Chaining (CBC) mode and RSA.

When the ransomware binary comes across a file, it creates a copy, encrypts it, and then deletes the original file from the system. The ransomware binary deleting the original copy is to prevent organisations from recovering the files through volume shadow copies.

Figure 6: Creating a New File
Figure 7: Deletion of Original File

The ransomware binary analyzes the file size to determine if it exceeds 1,572,864 bytes. If the file is smaller than this threshold, the ransomware binary encrypts it entirely. Otherwise, the ransomware binary partially encrypts the file. It is worth mentioning that each ransomware group handles encryption differently.

Figure 8: File Size Comparison

During the encryption process, the ransomware binary injects 0x40000 null byte blocks into the encrypted file.

Figure 9: Adding Null Bytes

Here the ransomware binary generates the Initialization Vector values randomly. It encrypts the AES key using RSA.

Figure 10: Encryption Key Generation Snippet
Figure 11: Writing the AES Key to the Specified File

As the ransomware binary overwrites part of the file with null bytes, the program must store metadata related to the original values. The metadata is stored at the end of the file, where it encrypts the last 0xC0000 bytes, containing encryption details required for decryption if a decryption key is obtained.

Figure 12: Encrypted Metadata
Figure 13: Encryption of Last 0xC0000 Bytes

The files that become encrypted have the file extension “id[UniqueID].[recovery8files@onionmail.org].8base” appended.

Behavioural Analysis

The ransomware binary was detonated on an air gapped Windows 10 system with Microsoft Word and Steam opened. The encryption process took approximately 10 minutes to encrypt a Windows 10 system.

The ransomware binary terminated both Word and Steam, the encryption process begins as described earlier. During the encryption process, affected files were appended with the extension “id[UniqueID].[recovery8files@onionmail.org].8base”. The ransomware binary creates two files called info.hta and info.txt. The ransomware binary generates these files in the following locations.:

  • C:\, and;
  • C:\Users\<User>\Desktop

This file contains the ransom note and explains to the victim organisation how to decrypt their data and how to contact 8base.

Figure 14: info.hta
Figure 15: Info.txt

Persistence

The 8base ransomware binary remains persistent within a client environment through the use of Startup Items and Autoruns. The StartUp items created were:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fast: “C:\Users\%USERPROFILE%\AppData\Local\Fast.exe”
  • HKCU\<User SID>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fast: “C:\Users\%USERPROFILE%\AppData\Local\Fast.exe”
  • C:\programdata\microsoft\windows\start menu\programs\startup\Fast.exe
  • C:\Users\%USERPROFILE%\AppData\Local\Fast.exe
  • %USERPROFILE%\appdata\roaming\microsoft\windows\start menu\programs\startup\Fast.exe
  • %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup

One example of the ransomware binary dropping into a StartUp directory is shown below.

Figure 16: Persistence of the Ransomware Binary

Defence Evasion

Volume Shadow Copy Removal

As part of the ransomware binary, it performs several actions to prevent system administrators from using Volume Shadow Copies and backup catalogs to assist in the recovery process. Additionally, the ransomware binary will ignore all boot failures when starting. The commands executed were:

  • Vssadmin.exe delete shadows /all /quiet
  • Wmic shadowcopy delete
  • Wbadmin.exe delete catalog -quiet
  • Bcdedit /set {default} bootstatuspolicy ignoreallfailures
  • Bcdedit.exe /set {default} recoveryenabled no

Host-Based Firewall

The ransomware binary disables the host-based firewall on the system to allow inbound and outbound traffic.

  • Netsh advfirewall set currentprofile state off
  • Netsh firewall set opmode mode=disable

Recommendations

There are several recommendations which will assist in preventing the encryption of endpoints. However, it is important to note that this is not an exhaustive list.

  • Implement an Endpoint Detection and Response (EDR) and SIEM tool.
  • Audit accounts that require remote access on a frequent basis.
  • Audit domain administrators and other high privileged accounts.
  • Backup organisational data using the 3-2-1 method.
    • You must have three (3) copies of your data,
    • Two (2) stored on different types of media, and;
    • One of those stored off-site.
  • Update infrastructure as soon as possible in line with your patch management cycle.
  • Use strong passwords and a password manager.
    • Password length with a minimum of 15 characters.
    • Use a combination of uppercase letters, lowercase letters, numbers, and special characters.
    • Use passphrases.
  • Use multifactor authentication for every account that supports it.
  • Understand your attack surface. Look at different methods a Threat Actor could gain access to your network such as:
    • Phishing
    • Software vulnerabilities
    • Exposed services

Appendix A: Referenced Functions

Strings found with PeStudio

  • WNetEnumResourceW
  • WNetUseConnectionW
  • WNetOpenEnumW
  • WNetCloseEnum
  • WSAAddressToStringW
  • GetIpAddrTable
  • WinHttpReceiveResponse
  • WinHttpOpenRequest
  • WinHttpConnect
  • WinHttpCloseHandle
  • WinHttpOpen
  • WinHttpSendRequest
  • FindNextFileW
  • OpenProcess
  • FindFirstFileW
  • MoveFileW
  • GetCurrentThreadId
  • SetFileAttributesW
  • WriteFile
  • CreateProcessW
  • ReadProcessMemory
  • TerminateProcess
  • Process32FirstW
  • Process32NextW
  • CreateToolhelp32Snapshot
  • DeleteFileW
  • GetCurrentProcessId
  • GetVolumeInformationW
  • GetWindowThreadProcessId
  • GetShellWindow
  • FreeSid
  • LookupPrivilegeValueW
  • OpenProcessToken
  • EqualSid
  • RegSetValueExW
  • AdjustTokenPrivileges
  • LookupAccountSidW
  • AllocateAndInitializeSid
  • DuplicateTokenEx
  • ShellExecuteExW

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *