Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe
-
Size
9.8MB
-
MD5
d6377909699a6a022d422028c9f4f3e2
-
SHA1
86f72055b86de2a61b51779f75ac2c30a88416a7
-
SHA256
6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89
-
SHA512
8d3e071e4259bfd48d7f5b2157b1d0c57ab93ad9749e42845938a4e27e9e07dd1c85c8e31b73c00ea79f0c8d1a599300b7c56a3be2045673fd7c421f27d2bbbc
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral2/files/0x000500000001ab64-134.dat family_babadeda -
Executes dropped EXE 3 IoCs
pid Process 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 2832 mspdbcmf.exe 4048 link.exe -
Loads dropped DLL 6 IoCs
pid Process 4048 link.exe 4048 link.exe 4048 link.exe 4048 link.exe 4048 link.exe 4048 link.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Detects BABADEDA Crypter 1 IoCs
Detects BABADEDA Crypter.
resource yara_rule behavioral2/files/0x000500000001ab64-134.dat BABADEDA_Crypter -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4048 link.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3672 3500 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe 68 PID 3500 wrote to memory of 3672 3500 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe 68 PID 3500 wrote to memory of 3672 3500 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe 68 PID 3672 wrote to memory of 2832 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 69 PID 3672 wrote to memory of 2832 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 69 PID 3672 wrote to memory of 2832 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 69 PID 3672 wrote to memory of 4048 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 71 PID 3672 wrote to memory of 4048 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 71 PID 3672 wrote to memory of 4048 3672 6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe"C:\Users\Admin\AppData\Local\Temp\6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\is-K1GR3.tmp\6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp"C:\Users\Admin\AppData\Local\Temp\is-K1GR3.tmp\6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.tmp" /SL5="$3005E,9445066,826880,C:\Users\Admin\AppData\Local\Temp\6c649004f8b888d4c72ce40cc8e0b722c545093d949b36507fd4a77ebfcbab89.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Roaming\Auslogics File Recovery\mspdbcmf.exe"C:\Users\Admin\AppData\Roaming\Auslogics File Recovery\mspdbcmf.exe"3⤵
- Executes dropped EXE
PID:2832
-
-
C:\Users\Admin\AppData\Roaming\Auslogics File Recovery\link.exe"C:\Users\Admin\AppData\Roaming\Auslogics File Recovery\link.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4048
-
-