Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-06-2022 10:25
Static task
static1
Behavioral task
behavioral1
Sample
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe
Resource
win10v2004-20220414-en
General
-
Target
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe
-
Size
410KB
-
MD5
4dc689389054b8aae01c162fb7fec051
-
SHA1
fd4356fd980f837a813515321fe5f54d5625258b
-
SHA256
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82
-
SHA512
e924f802421f24447ace77bce1ff7f24f11ea852ae00cc624d17bec6f6e675eb258923cd7897f5307c3346b1f08d9cea978dd980344c8905b14b1b88631895c1
Malware Config
Extracted
C:\How To Restore Your Files.txt
https://bisq.network/
https://www.getmonero.org/
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
AddInProcess32.exepid process 1780 AddInProcess32.exe -
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
AddInProcess32.exedescription ioc process File renamed C:\Users\Admin\Pictures\FormatGet.tif => C:\Users\Admin\Pictures\FormatGet.tif.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\RenameExit.tif.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\RestoreUndo.crw => C:\Users\Admin\Pictures\RestoreUndo.crw.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\WriteSkip.raw.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\PublishWait.raw.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\ProtectMeasure.png => C:\Users\Admin\Pictures\ProtectMeasure.png.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\FindUndo.tif => C:\Users\Admin\Pictures\FindUndo.tif.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\FindUndo.tif.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\RestoreLimit.crw => C:\Users\Admin\Pictures\RestoreLimit.crw.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\RestoreLimit.crw.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\ProtectMeasure.png.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\WriteSkip.raw => C:\Users\Admin\Pictures\WriteSkip.raw.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\FormatGet.tif.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\RenameExit.tif => C:\Users\Admin\Pictures\RenameExit.tif.babyk AddInProcess32.exe File renamed C:\Users\Admin\Pictures\PublishWait.raw => C:\Users\Admin\Pictures\PublishWait.raw.babyk AddInProcess32.exe File opened for modification C:\Users\Admin\Pictures\RestoreUndo.crw.babyk AddInProcess32.exe -
Loads dropped DLL 1 IoCs
Processes:
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exepid process 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AddInProcess32.exedescription ioc process File opened (read-only) \??\Z: AddInProcess32.exe File opened (read-only) \??\Q: AddInProcess32.exe File opened (read-only) \??\Y: AddInProcess32.exe File opened (read-only) \??\I: AddInProcess32.exe File opened (read-only) \??\S: AddInProcess32.exe File opened (read-only) \??\K: AddInProcess32.exe File opened (read-only) \??\F: AddInProcess32.exe File opened (read-only) \??\G: AddInProcess32.exe File opened (read-only) \??\V: AddInProcess32.exe File opened (read-only) \??\M: AddInProcess32.exe File opened (read-only) \??\W: AddInProcess32.exe File opened (read-only) \??\T: AddInProcess32.exe File opened (read-only) \??\O: AddInProcess32.exe File opened (read-only) \??\L: AddInProcess32.exe File opened (read-only) \??\X: AddInProcess32.exe File opened (read-only) \??\H: AddInProcess32.exe File opened (read-only) \??\J: AddInProcess32.exe File opened (read-only) \??\B: AddInProcess32.exe File opened (read-only) \??\E: AddInProcess32.exe File opened (read-only) \??\R: AddInProcess32.exe File opened (read-only) \??\U: AddInProcess32.exe File opened (read-only) \??\P: AddInProcess32.exe File opened (read-only) \??\A: AddInProcess32.exe File opened (read-only) \??\N: AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exedescription pid process target process PID 1624 set thread context of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1340 vssadmin.exe 1096 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exeAddInProcess32.exepid process 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe 1780 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exevssvc.exedescription pid process Token: SeDebugPrivilege 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe Token: SeBackupPrivilege 2020 vssvc.exe Token: SeRestorePrivilege 2020 vssvc.exe Token: SeAuditPrivilege 2020 vssvc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exeAddInProcess32.execmd.execmd.exedescription pid process target process PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1624 wrote to memory of 1780 1624 e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe AddInProcess32.exe PID 1780 wrote to memory of 1628 1780 AddInProcess32.exe cmd.exe PID 1780 wrote to memory of 1628 1780 AddInProcess32.exe cmd.exe PID 1780 wrote to memory of 1628 1780 AddInProcess32.exe cmd.exe PID 1780 wrote to memory of 1628 1780 AddInProcess32.exe cmd.exe PID 1628 wrote to memory of 1340 1628 cmd.exe vssadmin.exe PID 1628 wrote to memory of 1340 1628 cmd.exe vssadmin.exe PID 1628 wrote to memory of 1340 1628 cmd.exe vssadmin.exe PID 1780 wrote to memory of 1788 1780 AddInProcess32.exe cmd.exe PID 1780 wrote to memory of 1788 1780 AddInProcess32.exe cmd.exe PID 1780 wrote to memory of 1788 1780 AddInProcess32.exe cmd.exe PID 1780 wrote to memory of 1788 1780 AddInProcess32.exe cmd.exe PID 1788 wrote to memory of 1096 1788 cmd.exe vssadmin.exe PID 1788 wrote to memory of 1096 1788 cmd.exe vssadmin.exe PID 1788 wrote to memory of 1096 1788 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe"C:\Users\Admin\AppData\Local\Temp\e69149c02a0f24731559d5bec3c1bdbe916cd2829751025845fe48ea01966b82.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1096
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
Filesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39