Analysis
-
max time kernel
49s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-07-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe
Resource
win10v20210408
General
-
Target
84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe
-
Size
40KB
-
MD5
de7c8dfe5e8050571ef394f0202edc82
-
SHA1
a03468953575a4730689d6d05558792150125ac8
-
SHA256
84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120
-
SHA512
874643de409b9c4e7fcb5c8727db3ab060a195b2411625e66c7e2fe5e03eecc5c21fd07e82f7edc38792a614f57e1a7e195d535057bec09cf256aafae9892bd4
Malware Config
Extracted
C:\Boot\How To Restore Your Files.txt
http://gtmx56k4hutn3ikv.onion/?JJ2Sdd8mtObS8tBQv5mM
http://gtmx56k4hutn3ikv.onion/
http://babukq4e2p4wu4iq.onion/login.php?id=UDFfRZirMNY2ENxMGJ9xczl3CTcie3
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ImportInvoke.tif.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File renamed C:\Users\Admin\Pictures\LimitReceive.raw => C:\Users\Admin\Pictures\LimitReceive.raw.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened for modification C:\Users\Admin\Pictures\LimitReceive.raw.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened for modification C:\Users\Admin\Pictures\DismountMount.tif.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File renamed C:\Users\Admin\Pictures\ImportInvoke.tif => C:\Users\Admin\Pictures\ImportInvoke.tif.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File renamed C:\Users\Admin\Pictures\SearchUnpublish.raw => C:\Users\Admin\Pictures\SearchUnpublish.raw.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened for modification C:\Users\Admin\Pictures\SearchUnpublish.raw.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File renamed C:\Users\Admin\Pictures\WritePush.crw => C:\Users\Admin\Pictures\WritePush.crw.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened for modification C:\Users\Admin\Pictures\WritePush.crw.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File renamed C:\Users\Admin\Pictures\DismountMount.tif => C:\Users\Admin\Pictures\DismountMount.tif.babyk 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\How To Restore Your Files.txt 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\Y: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\A: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\Z: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\X: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\W: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\E: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\O: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\H: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\N: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\Q: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\I: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\F: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\G: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\L: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\V: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\B: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\M: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\U: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\S: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\J: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\K: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\R: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe File opened (read-only) \??\P: 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1072 vssadmin.exe 1040 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 200 vssvc.exe Token: SeRestorePrivilege 200 vssvc.exe Token: SeAuditPrivilege 200 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3868 ShellExperienceHost.exe 3868 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 856 wrote to memory of 852 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 75 PID 856 wrote to memory of 852 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 75 PID 852 wrote to memory of 1072 852 cmd.exe 77 PID 852 wrote to memory of 1072 852 cmd.exe 77 PID 856 wrote to memory of 3232 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 85 PID 856 wrote to memory of 3232 856 84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe 85 PID 3232 wrote to memory of 1040 3232 cmd.exe 87 PID 3232 wrote to memory of 1040 3232 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe"C:\Users\Admin\AppData\Local\Temp\84895601f472240234162ba7ac9a7b0952df8268c93f6ab385eeccb5aea7d120.sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1040
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:200
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3868