Analysis
-
max time kernel
42s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-07-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe
Resource
win10v20210408
General
-
Target
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe
-
Size
75KB
-
MD5
03f524377f461bfa70859fb5805b5a03
-
SHA1
e8ead4332cded71755e478922d09d01975f9119f
-
SHA256
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847
-
SHA512
ed45d0605829c76e05895e1f4aa72c6f15d20a2cea97533323cffe1b89e640bc703314a4c3d510dec8a7c183c78c30c9c9d2a2a1fe064018c5017eb6cc990da0
Malware Config
Extracted
C:\How To Restore Your Files.txt
http://babukq4e2p4wu4iq.onion/login.php?id=qrkurJuYkvPsMF4sX5avnaBrUHldGe
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ClearMeasure.tiff ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\CompressCheckpoint.tiff => C:\Users\Admin\Pictures\CompressCheckpoint.tiff.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\EnterRead.png => C:\Users\Admin\Pictures\EnterRead.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\ClearMeasure.tiff => C:\Users\Admin\Pictures\ClearMeasure.tiff.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\ClearMeasure.tiff.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\EnterRead.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\PublishPush.png => C:\Users\Admin\Pictures\PublishPush.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\PublishPush.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\SaveUnblock.tif => C:\Users\Admin\Pictures\SaveUnblock.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\SaveUnblock.tif.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\CompressCheckpoint.tiff ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\CompressCheckpoint.tiff.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\SkipGet.crw => C:\Users\Admin\Pictures\SkipGet.crw.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\ReceiveConvert.png => C:\Users\Admin\Pictures\ReceiveConvert.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\ReceiveConvert.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File renamed C:\Users\Admin\Pictures\ShowLimit.png => C:\Users\Admin\Pictures\ShowLimit.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\ShowLimit.png.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened for modification C:\Users\Admin\Pictures\SkipGet.crw.babyk ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exedescription ioc process File opened (read-only) \??\W: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\T: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\Y: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\U: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\J: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\S: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\K: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\Z: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\V: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\E: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\R: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\O: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\F: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\X: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\N: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\L: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\B: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\Q: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\I: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\P: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\A: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\G: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\H: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe File opened (read-only) \??\M: ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 4164 vssadmin.exe 1100 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exepid process 4796 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe 4796 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4160 vssvc.exe Token: SeRestorePrivilege 4160 vssvc.exe Token: SeAuditPrivilege 4160 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.execmd.execmd.exedescription pid process target process PID 4796 wrote to memory of 3892 4796 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 4796 wrote to memory of 3892 4796 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 3892 wrote to memory of 4164 3892 cmd.exe vssadmin.exe PID 3892 wrote to memory of 4164 3892 cmd.exe vssadmin.exe PID 4796 wrote to memory of 1524 4796 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 4796 wrote to memory of 1524 4796 ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe cmd.exe PID 1524 wrote to memory of 1100 1524 cmd.exe vssadmin.exe PID 1524 wrote to memory of 1100 1524 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe"C:\Users\Admin\AppData\Local\Temp\ab4eae618bb05b4fb4a8d3790a0d18a3e1566ab477519991cb161398803a8847.sample.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1100
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4160