Analysis

  • max time kernel
    5s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-03-2021 06:22

General

  • Target

    e_win.exe

  • Size

    75KB

  • MD5

    a73d9dc904349b9c967dc6a724806b2d

  • SHA1

    e3e6dfd5e0c29acefe90471e46142c120278e9f0

  • SHA256

    9a089790e04683ebf37d9746e0284322f59c46eef2a86cc231839482f323e871

  • SHA512

    39f2fd0d8f7b63b78a33f44f89d5c01a6ec6c5c194d91d1a8280708e76a13aae0507893779d1e6545fbbdde74b224043e2dfa8b73b5cb4a3265978fdb7625f6d

Score
10/10

Malware Config

Extracted

Path

C:\How To Restore Your Files.txt

Ransom Note
############## [ babuk ransomware ] ############## * What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data without us. But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network. Follow our instructions below and you will recover all your data. If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web. * What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. * What information compromised? ---------------------------------------------- We copied many data from your internal network, here are some proofs (private link): http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/a4c7531a5c7287d8b77d240e0ee1755d5b257fb1f9fabbf89989d96304ddff2b/ Screenshots: https://i.imgur.com/66Yz8gK.png https://i.imgur.com/udaME7G.png https://i.imgur.com/ExpwRFZ.png https://i.imgur.com/TmotQHx.png https://i.imgur.com/TmotQHx.png https://i.imgur.com/KyDqrjO.png https://i.imgur.com/ISCG6BB.png https://i.imgur.com/CKVnYd4.png https://i.imgur.com/Ga17uEy.png https://i.imgur.com/CFzkdY5.png https://i.imgur.com/aeArm5h.png https://i.imgur.com/sYkAv3o.png https://i.imgur.com/NbWcEBt.png https://i.imgur.com/Yo72lP5.png https://i.imgur.com/N1UTyCk.png https://i.imgur.com/0cDog0s.png For additional confirmations, please chat with us/ In cases of ignoring us, the information will be released to the public in blog http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/ * How to contact us? ---------------------------------------------- 1) Download for browser: https://www.torproject.org/download/ 2) Open it 3) Follow this link in tor browser: http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/f57e6bc503b702905293ce18001127863b953b9cf1194a0eca02f6c8aec6dae5 1. If you see small fella malicious .exe file never load it to virustotal.com or any other virus researching website. Otherwise the info about the hack is not a secret anymore. The fact that your company is under ransomware attack is already known by filthy predators data security agents who will post in their pity twitters the fresh known news “OMG ANOTHER RANSOMWARE NOW IT’S “Your company name LLC!!!!! We are all gonna die aaaaaa halp” 2. No any public announcements about the hack or data leakage. And do not applicate to law enforcement. If you commit this actions, more serious consequences can occur and you pay much more than a ransom amount. Law structures like GDPR in this case can oblige you to pay huge fine. 3. If you decide to hire the data recovery company, obligate them to do not inform anyone and any third party about details of the attack. We strongly do not recommend to cooperate with data recovery company, because they do absolutely nothing that you can do by yourself and take money for it. all communications with hackers could be conducted by your it department indipendently without any extra payments.
URLs

http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/a4c7531a5c7287d8b77d240e0ee1755d5b257fb1f9fabbf89989d96304ddff2b/

https://i.imgur.com/66Yz8gK.png

https://i.imgur.com/udaME7G.png

https://i.imgur.com/ExpwRFZ.png

https://i.imgur.com/TmotQHx.png

https://i.imgur.com/KyDqrjO.png

https://i.imgur.com/ISCG6BB.png

https://i.imgur.com/CKVnYd4.png

https://i.imgur.com/Ga17uEy.png

https://i.imgur.com/CFzkdY5.png

https://i.imgur.com/aeArm5h.png

https://i.imgur.com/sYkAv3o.png

https://i.imgur.com/NbWcEBt.png

https://i.imgur.com/Yo72lP5.png

https://i.imgur.com/N1UTyCk.png

https://i.imgur.com/0cDog0s.png

http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/

http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/f57e6bc503b702905293ce18001127863b953b9cf1194a0eca02f6c8aec6dae5

Signatures

  • Babuk Locker

    RaaS first seen in 2021 initially called Vasa Locker.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e_win.exe
    "C:\Users\Admin\AppData\Local\Temp\e_win.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:516
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/516-8-0x0000000000000000-mapping.dmp

  • memory/776-2-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB

  • memory/776-4-0x00000000023E0000-0x00000000023F1000-memory.dmp

    Filesize

    68KB

  • memory/776-3-0x0000000001FD0000-0x0000000001FE1000-memory.dmp

    Filesize

    68KB

  • memory/1144-7-0x0000000000000000-mapping.dmp

  • memory/2012-5-0x0000000000000000-mapping.dmp

  • memory/2044-6-0x0000000000000000-mapping.dmp