Analysis
-
max time kernel
76s -
max time network
35s -
platform
windows7_x64 -
resource
win7-en-20210916 -
submitted
17-09-2021 13:47
Static task
static1
Behavioral task
behavioral1
Sample
2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe
Resource
win10v20210408
General
-
Target
2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe
-
Size
189KB
-
MD5
3abc424623ccc9beb2521af2cf398bcc
-
SHA1
8411b13100ce1128a0d7672d18b7eb4f605ed20f
-
SHA256
2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce
-
SHA512
273c21f0ef47228ac0db7fc317a5b6916627461c29d503d68d28670d86a5fda6a39f55124218380a60002da520bf7ad1c4cd9f63dd1e74e628459184f45ce33a
Malware Config
Extracted
C:\How To Restore Your Files.txt
bc1qel4nlvycjftvvnw32e05mhhxfzy7hjqkjh82ez
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/babuk-ransomware/
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
E_WIN.EXEpid process 568 E_WIN.EXE -
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
E_WIN.EXEdescription ioc process File opened for modification C:\Users\Admin\Pictures\SkipBlock.tiff E_WIN.EXE File renamed C:\Users\Admin\Pictures\ReadOpen.png => C:\Users\Admin\Pictures\ReadOpen.png.babyk E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\ReadOpen.png.babyk E_WIN.EXE File renamed C:\Users\Admin\Pictures\RepairEdit.tif => C:\Users\Admin\Pictures\RepairEdit.tif.babyk E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\RepairEdit.tif.babyk E_WIN.EXE File renamed C:\Users\Admin\Pictures\SkipBlock.tiff => C:\Users\Admin\Pictures\SkipBlock.tiff.babyk E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\SkipBlock.tiff.babyk E_WIN.EXE -
Loads dropped DLL 2 IoCs
Processes:
2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exepid process 1868 2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe 1868 2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
E_WIN.EXEdescription ioc process File opened (read-only) \??\G: E_WIN.EXE File opened (read-only) \??\J: E_WIN.EXE File opened (read-only) \??\Q: E_WIN.EXE File opened (read-only) \??\A: E_WIN.EXE File opened (read-only) \??\S: E_WIN.EXE File opened (read-only) \??\H: E_WIN.EXE File opened (read-only) \??\K: E_WIN.EXE File opened (read-only) \??\L: E_WIN.EXE File opened (read-only) \??\X: E_WIN.EXE File opened (read-only) \??\B: E_WIN.EXE File opened (read-only) \??\Y: E_WIN.EXE File opened (read-only) \??\P: E_WIN.EXE File opened (read-only) \??\I: E_WIN.EXE File opened (read-only) \??\V: E_WIN.EXE File opened (read-only) \??\M: E_WIN.EXE File opened (read-only) \??\W: E_WIN.EXE File opened (read-only) \??\R: E_WIN.EXE File opened (read-only) \??\U: E_WIN.EXE File opened (read-only) \??\O: E_WIN.EXE File opened (read-only) \??\F: E_WIN.EXE File opened (read-only) \??\Z: E_WIN.EXE File opened (read-only) \??\N: E_WIN.EXE File opened (read-only) \??\E: E_WIN.EXE File opened (read-only) \??\T: E_WIN.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1512 vssadmin.exe 692 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
E_WIN.EXEpid process 568 E_WIN.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1880 vssvc.exe Token: SeRestorePrivilege 1880 vssvc.exe Token: SeAuditPrivilege 1880 vssvc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exeE_WIN.EXEcmd.execmd.exedescription pid process target process PID 1868 wrote to memory of 568 1868 2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe E_WIN.EXE PID 1868 wrote to memory of 568 1868 2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe E_WIN.EXE PID 1868 wrote to memory of 568 1868 2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe E_WIN.EXE PID 1868 wrote to memory of 568 1868 2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe E_WIN.EXE PID 568 wrote to memory of 1324 568 E_WIN.EXE cmd.exe PID 568 wrote to memory of 1324 568 E_WIN.EXE cmd.exe PID 568 wrote to memory of 1324 568 E_WIN.EXE cmd.exe PID 568 wrote to memory of 1324 568 E_WIN.EXE cmd.exe PID 1324 wrote to memory of 1512 1324 cmd.exe vssadmin.exe PID 1324 wrote to memory of 1512 1324 cmd.exe vssadmin.exe PID 1324 wrote to memory of 1512 1324 cmd.exe vssadmin.exe PID 568 wrote to memory of 2044 568 E_WIN.EXE cmd.exe PID 568 wrote to memory of 2044 568 E_WIN.EXE cmd.exe PID 568 wrote to memory of 2044 568 E_WIN.EXE cmd.exe PID 568 wrote to memory of 2044 568 E_WIN.EXE cmd.exe PID 2044 wrote to memory of 692 2044 cmd.exe vssadmin.exe PID 2044 wrote to memory of 692 2044 cmd.exe vssadmin.exe PID 2044 wrote to memory of 692 2044 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe"C:\Users\Admin\AppData\Local\Temp\2f5f29192f5139d83f93361ca855d385fd54adf8a40ee959efa72e6e00b2a0ce.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\E_WIN.EXE"C:\Users\Admin\AppData\Local\Temp\E_WIN.EXE"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1512
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:692
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\How To Restore Your Files.txt1⤵PID:468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8d622a6f37a1fb60dec715e05516b508
SHA12a002f331c7356fccc2bf42c2ed2f3d3efd7767f
SHA256e9f18a0183e31653d43ef1124eba7710d9d6d0675b48a715896001fd88526ef9
SHA51221e5782df789be73861e2c0687a2e01b2a41dfd2c39f56039eda739635ad307a1c3caa06310c5878dc48e6b53ed0714e1130cca70983bbd13c84f306a66254fa
-
MD5
00a5956169037088a772613dba6f8c79
SHA166e27513dd1d87ba64002e834c1cf296198656bb
SHA256f5d91ab8838d0ad26e364940281e55d2d7be7551671c47cf653b4df80539f3a1
SHA51247bdd65a129ee40c5f7dd9ef48ccddcc5a1cc6059018de32e4beb6bffe66e5934e42aa33743387cd7d9e95f41310a29cd5d1b113aecbb3c9b8f42531f1cf1bbf
-
MD5
8d622a6f37a1fb60dec715e05516b508
SHA12a002f331c7356fccc2bf42c2ed2f3d3efd7767f
SHA256e9f18a0183e31653d43ef1124eba7710d9d6d0675b48a715896001fd88526ef9
SHA51221e5782df789be73861e2c0687a2e01b2a41dfd2c39f56039eda739635ad307a1c3caa06310c5878dc48e6b53ed0714e1130cca70983bbd13c84f306a66254fa
-
MD5
8d622a6f37a1fb60dec715e05516b508
SHA12a002f331c7356fccc2bf42c2ed2f3d3efd7767f
SHA256e9f18a0183e31653d43ef1124eba7710d9d6d0675b48a715896001fd88526ef9
SHA51221e5782df789be73861e2c0687a2e01b2a41dfd2c39f56039eda739635ad307a1c3caa06310c5878dc48e6b53ed0714e1130cca70983bbd13c84f306a66254fa