Analysis
-
max time kernel
94s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-08-2021 04:19
Behavioral task
behavioral1
Sample
5665f108965c55a2d3ebcbbb50b03786.exe
Resource
win7v20210408
General
-
Target
5665f108965c55a2d3ebcbbb50b03786.exe
-
Size
107KB
-
MD5
5665f108965c55a2d3ebcbbb50b03786
-
SHA1
5f3500c5d5f646383e06033fb0650d9b83da98a8
-
SHA256
a32770d46ee2ee5b91cc36e5159868ec3ff7f847e7516d7bcb952f7a94e347a2
-
SHA512
cb6e052712ace47f371efdc93309ecc3bc7e85d897dc64e85c8fac3e436a3a714ffd140d465daf87a3f911f89bfbf4db90fe1bd7f579f5d108de51ace342b0fb
Malware Config
Extracted
C:\How To Restore Your Files.txt
bc1qd53hpk76zutapw8tsgnnkeuuuhuk4ecr2wrd93
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1360 AudioB.exe 748 AudioB.exe -
Modifies extensions of user files 21 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\EnableRemove.raw.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\SkipAdd.tiff.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\DenyCheckpoint.raw => C:\Users\Admin\Pictures\DenyCheckpoint.raw.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\EnableRemove.raw => C:\Users\Admin\Pictures\EnableRemove.raw.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\EditConvertTo.tiff => C:\Users\Admin\Pictures\EditConvertTo.tiff.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\ConvertFromFind.tif.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\DenyCheckpoint.raw.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\EditConvertTo.tiff.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\ReadMount.png.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\SkipAdd.tiff AudioB.exe File opened for modification C:\Users\Admin\Pictures\ApproveUse.tiff.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\EditConvertTo.tiff AudioB.exe File renamed C:\Users\Admin\Pictures\ConvertFromFind.tif => C:\Users\Admin\Pictures\ConvertFromFind.tif.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\ReadSuspend.png => C:\Users\Admin\Pictures\ReadSuspend.png.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\SkipAdd.tiff => C:\Users\Admin\Pictures\SkipAdd.tiff.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\SubmitConnect.crw => C:\Users\Admin\Pictures\SubmitConnect.crw.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\SubmitConnect.crw.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\ApproveUse.tiff AudioB.exe File renamed C:\Users\Admin\Pictures\ApproveUse.tiff => C:\Users\Admin\Pictures\ApproveUse.tiff.babyk AudioB.exe File renamed C:\Users\Admin\Pictures\ReadMount.png => C:\Users\Admin\Pictures\ReadMount.png.babyk AudioB.exe File opened for modification C:\Users\Admin\Pictures\ReadSuspend.png.babyk AudioB.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 5665f108965c55a2d3ebcbbb50b03786.exe 1360 AudioB.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: AudioB.exe File opened (read-only) \??\R: AudioB.exe File opened (read-only) \??\Y: AudioB.exe File opened (read-only) \??\P: AudioB.exe File opened (read-only) \??\A: AudioB.exe File opened (read-only) \??\V: AudioB.exe File opened (read-only) \??\M: AudioB.exe File opened (read-only) \??\U: AudioB.exe File opened (read-only) \??\I: AudioB.exe File opened (read-only) \??\E: AudioB.exe File opened (read-only) \??\T: AudioB.exe File opened (read-only) \??\F: AudioB.exe File opened (read-only) \??\G: AudioB.exe File opened (read-only) \??\H: AudioB.exe File opened (read-only) \??\K: AudioB.exe File opened (read-only) \??\Q: AudioB.exe File opened (read-only) \??\W: AudioB.exe File opened (read-only) \??\B: AudioB.exe File opened (read-only) \??\L: AudioB.exe File opened (read-only) \??\X: AudioB.exe File opened (read-only) \??\J: AudioB.exe File opened (read-only) \??\Z: AudioB.exe File opened (read-only) \??\O: AudioB.exe File opened (read-only) \??\S: AudioB.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1360 set thread context of 748 1360 AudioB.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2028 vssadmin.exe 524 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 5665f108965c55a2d3ebcbbb50b03786.exe 748 AudioB.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1832 5665f108965c55a2d3ebcbbb50b03786.exe Token: SeDebugPrivilege 1360 AudioB.exe Token: SeBackupPrivilege 1928 vssvc.exe Token: SeRestorePrivilege 1928 vssvc.exe Token: SeAuditPrivilege 1928 vssvc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1360 1832 5665f108965c55a2d3ebcbbb50b03786.exe 31 PID 1832 wrote to memory of 1360 1832 5665f108965c55a2d3ebcbbb50b03786.exe 31 PID 1832 wrote to memory of 1360 1832 5665f108965c55a2d3ebcbbb50b03786.exe 31 PID 1832 wrote to memory of 1360 1832 5665f108965c55a2d3ebcbbb50b03786.exe 31 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 1360 wrote to memory of 748 1360 AudioB.exe 32 PID 748 wrote to memory of 828 748 AudioB.exe 33 PID 748 wrote to memory of 828 748 AudioB.exe 33 PID 748 wrote to memory of 828 748 AudioB.exe 33 PID 748 wrote to memory of 828 748 AudioB.exe 33 PID 828 wrote to memory of 2028 828 cmd.exe 35 PID 828 wrote to memory of 2028 828 cmd.exe 35 PID 828 wrote to memory of 2028 828 cmd.exe 35 PID 748 wrote to memory of 1060 748 AudioB.exe 39 PID 748 wrote to memory of 1060 748 AudioB.exe 39 PID 748 wrote to memory of 1060 748 AudioB.exe 39 PID 748 wrote to memory of 1060 748 AudioB.exe 39 PID 1060 wrote to memory of 524 1060 cmd.exe 41 PID 1060 wrote to memory of 524 1060 cmd.exe 41 PID 1060 wrote to memory of 524 1060 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\5665f108965c55a2d3ebcbbb50b03786.exe"C:\Users\Admin\AppData\Local\Temp\5665f108965c55a2d3ebcbbb50b03786.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\AudioB.exe"C:\Users\Admin\AppData\Local\Temp\AudioB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\AudioB.exe"C:\Users\Admin\AppData\Local\Temp\AudioB.exe"3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:524
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928