Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-08-2021 08:49
Static task
static1
Behavioral task
behavioral1
Sample
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe
Resource
win10v20210410
General
-
Target
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe
-
Size
174KB
-
MD5
badcc5eeb093cfa468ac2433ca3ec639
-
SHA1
1e9b7c068262b69803f40088d7c296ec1cad777c
-
SHA256
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd
-
SHA512
9710efb850d7109bbb51a769ecf610e1c79732d331c140392b68448f3fca49249b1458cbf7e4e931056bc4987a605616052197f1003c68d0490f66ab6e25c611
Malware Config
Extracted
C:\How To Restore Your Files.txt
bc1qd53hpk76zutapw8tsgnnkeuuuhuk4ecr2wrd93
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
BA8B.exeAudioB.exeAudioB.exepid process 2696 BA8B.exe 2692 AudioB.exe 3152 AudioB.exe -
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
AudioB.exedescription ioc process File renamed C:\Users\Admin\Pictures\MeasureWait.raw => C:\Users\Admin\Pictures\MeasureWait.raw.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\SearchInstall.tiff AudioB.exe File opened for modification C:\Users\Admin\Pictures\BlockComplete.tiff AudioB.exe File renamed C:\Users\Admin\Pictures\DebugUpdate.png => C:\Users\Admin\Pictures\DebugUpdate.png.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\MeasureWait.raw.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\PushRequest.png.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\SkipConfirm.png => C:\Users\Admin\Pictures\SkipConfirm.png.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\DebugUpdate.png.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\MoveUnregister.png.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\PushRequest.png => C:\Users\Admin\Pictures\PushRequest.png.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\SearchInstall.tiff => C:\Users\Admin\Pictures\SearchInstall.tiff.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\BlockComplete.tiff => C:\Users\Admin\Pictures\BlockComplete.tiff.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\BlockComplete.tiff.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\MoveUnregister.png => C:\Users\Admin\Pictures\MoveUnregister.png.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\SearchInstall.tiff.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\SkipConfirm.png.babyk AudioB.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BA8B.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BA8B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BA8B.exe -
Deletes itself 1 IoCs
Processes:
pid process 3040 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\BA8B.exe themida C:\Users\Admin\AppData\Local\Temp\BA8B.exe themida behavioral1/memory/2696-122-0x0000000000AB0000-0x0000000000AB1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
BA8B.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BA8B.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AudioB.exedescription ioc process File opened (read-only) \??\Q: AudioB.exe File opened (read-only) \??\E: AudioB.exe File opened (read-only) \??\R: AudioB.exe File opened (read-only) \??\O: AudioB.exe File opened (read-only) \??\H: AudioB.exe File opened (read-only) \??\N: AudioB.exe File opened (read-only) \??\W: AudioB.exe File opened (read-only) \??\I: AudioB.exe File opened (read-only) \??\P: AudioB.exe File opened (read-only) \??\S: AudioB.exe File opened (read-only) \??\L: AudioB.exe File opened (read-only) \??\Z: AudioB.exe File opened (read-only) \??\X: AudioB.exe File opened (read-only) \??\V: AudioB.exe File opened (read-only) \??\T: AudioB.exe File opened (read-only) \??\F: AudioB.exe File opened (read-only) \??\J: AudioB.exe File opened (read-only) \??\K: AudioB.exe File opened (read-only) \??\M: File opened (read-only) \??\B: AudioB.exe File opened (read-only) \??\M: AudioB.exe File opened (read-only) \??\Y: AudioB.exe File opened (read-only) \??\U: AudioB.exe File opened (read-only) \??\A: AudioB.exe File opened (read-only) \??\G: AudioB.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
BA8B.exepid process 2696 BA8B.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
AudioB.exedescription pid process target process PID 2692 set thread context of 3152 2692 AudioB.exe AudioB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3148 vssadmin.exe 2192 vssadmin.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exepid process 2256 9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe 2256 9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exepid process 2256 9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
BA8B.exeAudioB.exevssvc.exedescription pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 2696 BA8B.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 2692 AudioB.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeBackupPrivilege 2496 vssvc.exe Token: SeRestorePrivilege 2496 vssvc.exe Token: SeAuditPrivilege 2496 vssvc.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
pid process 3040 3040 3040 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid process 3040 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3040 -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
BA8B.exeAudioB.exeAudioB.execmd.execmd.exedescription pid process target process PID 3040 wrote to memory of 2696 3040 BA8B.exe PID 3040 wrote to memory of 2696 3040 BA8B.exe PID 3040 wrote to memory of 2696 3040 BA8B.exe PID 2696 wrote to memory of 2692 2696 BA8B.exe AudioB.exe PID 2696 wrote to memory of 2692 2696 BA8B.exe AudioB.exe PID 2696 wrote to memory of 2692 2696 BA8B.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 2692 wrote to memory of 3152 2692 AudioB.exe AudioB.exe PID 3152 wrote to memory of 2380 3152 AudioB.exe cmd.exe PID 3152 wrote to memory of 2380 3152 AudioB.exe cmd.exe PID 2380 wrote to memory of 3148 2380 cmd.exe vssadmin.exe PID 2380 wrote to memory of 3148 2380 cmd.exe vssadmin.exe PID 3152 wrote to memory of 3628 3152 AudioB.exe cmd.exe PID 3152 wrote to memory of 3628 3152 AudioB.exe cmd.exe PID 3628 wrote to memory of 2192 3628 cmd.exe vssadmin.exe PID 3628 wrote to memory of 2192 3628 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe"C:\Users\Admin\AppData\Local\Temp\9528313d13ec6629a64434c36e11872cc12f35232908b2a2e6a89636a199d6cd.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2256
-
C:\Users\Admin\AppData\Local\Temp\BA8B.exeC:\Users\Admin\AppData\Local\Temp\BA8B.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\AudioB.exe"C:\Users\Admin\AppData\Local\Temp\AudioB.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\AudioB.exe"C:\Users\Admin\AppData\Local\Temp\AudioB.exe"3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2192
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cf88599048145e4911915215a91527f4
SHA1f4ba5c7117736388c4de3442b1d6e4f84628c15d
SHA2569f7d6949fd359dce79d3233eb80101ff706a35de5308543b0488450c19eba0f0
SHA512254f6e26ed075ff1fe46493e36e6ec7eb70db52d2219070b6a77cbf7202d231fc826bd3fb69bdcaee86e45c9ce4ee8bc7085d37d5627a0bc1d2ec86aa9f2c0f7
-
MD5
cf88599048145e4911915215a91527f4
SHA1f4ba5c7117736388c4de3442b1d6e4f84628c15d
SHA2569f7d6949fd359dce79d3233eb80101ff706a35de5308543b0488450c19eba0f0
SHA512254f6e26ed075ff1fe46493e36e6ec7eb70db52d2219070b6a77cbf7202d231fc826bd3fb69bdcaee86e45c9ce4ee8bc7085d37d5627a0bc1d2ec86aa9f2c0f7
-
MD5
cf88599048145e4911915215a91527f4
SHA1f4ba5c7117736388c4de3442b1d6e4f84628c15d
SHA2569f7d6949fd359dce79d3233eb80101ff706a35de5308543b0488450c19eba0f0
SHA512254f6e26ed075ff1fe46493e36e6ec7eb70db52d2219070b6a77cbf7202d231fc826bd3fb69bdcaee86e45c9ce4ee8bc7085d37d5627a0bc1d2ec86aa9f2c0f7
-
MD5
eeb0f28c077d4b7f9740232aa95d93b4
SHA161d50d4d4c1eee0c8fe9e17bcf78a4f43e482967
SHA2563662c3ba063379af8bca502364807bf88752a36b5ca83671c02ea48fbb0b06af
SHA5126034043269af32b2633e1c2b46dfb766d342dbd64337e868c703090c9b8aa9f4ab7a692d1e5e6eeecbef31b2a77d28183a8ec24b75caabb870219f27b5eae73c
-
MD5
eeb0f28c077d4b7f9740232aa95d93b4
SHA161d50d4d4c1eee0c8fe9e17bcf78a4f43e482967
SHA2563662c3ba063379af8bca502364807bf88752a36b5ca83671c02ea48fbb0b06af
SHA5126034043269af32b2633e1c2b46dfb766d342dbd64337e868c703090c9b8aa9f4ab7a692d1e5e6eeecbef31b2a77d28183a8ec24b75caabb870219f27b5eae73c