Analysis
-
max time kernel
19s -
max time network
47s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe
Resource
win10v20210408
General
-
Target
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe
-
Size
75KB
-
MD5
03f524377f461bfa70859fb5805b5a03
-
SHA1
e8ead4332cded71755e478922d09d01975f9119f
-
SHA256
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847
-
SHA512
ed45d0605829c76e05895e1f4aa72c6f15d20a2cea97533323cffe1b89e640bc703314a4c3d510dec8a7c183c78c30c9c9d2a2a1fe064018c5017eb6cc990da0
Malware Config
Extracted
C:\How To Restore Your Files.txt
http://babukq4e2p4wu4iq.onion/login.php?id=qrkurJuYkvPsMF4sX5avnaBrUHldGe
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RepairRemove.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\SubmitClose.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\SaveDebug.raw.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\WriteStop.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\GetTrace.png => C:\Users\Admin\Pictures\GetTrace.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\MoveUnpublish.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\MoveUnpublish.png => C:\Users\Admin\Pictures\MoveUnpublish.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\SubmitClose.tif => C:\Users\Admin\Pictures\SubmitClose.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\WriteStop.tif => C:\Users\Admin\Pictures\WriteStop.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\GetTrace.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\SaveDebug.raw => C:\Users\Admin\Pictures\SaveDebug.raw.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\UninstallCompress.crw => C:\Users\Admin\Pictures\UninstallCompress.crw.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\UninstallCompress.crw.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\RepairRemove.tif => C:\Users\Admin\Pictures\RepairRemove.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exedescription ioc process File opened (read-only) \??\J: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\L: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\N: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\M: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\Q: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\S: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\H: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\A: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\U: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\I: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\P: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\F: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\G: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\W: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\E: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\T: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\Z: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\X: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\V: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\K: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\B: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\R: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\Y: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\O: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1972 vssadmin.exe 752 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exepid process 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1516 vssvc.exe Token: SeRestorePrivilege 1516 vssvc.exe Token: SeAuditPrivilege 1516 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.execmd.execmd.exedescription pid process target process PID 640 wrote to memory of 1128 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 640 wrote to memory of 1128 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 640 wrote to memory of 1128 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 640 wrote to memory of 1128 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 1128 wrote to memory of 1972 1128 cmd.exe vssadmin.exe PID 1128 wrote to memory of 1972 1128 cmd.exe vssadmin.exe PID 1128 wrote to memory of 1972 1128 cmd.exe vssadmin.exe PID 640 wrote to memory of 544 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 640 wrote to memory of 544 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 640 wrote to memory of 544 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 640 wrote to memory of 544 640 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 544 wrote to memory of 752 544 cmd.exe vssadmin.exe PID 544 wrote to memory of 752 544 cmd.exe vssadmin.exe PID 544 wrote to memory of 752 544 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe"C:\Users\Admin\AppData\Local\Temp\ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1516