Analysis
-
max time kernel
88s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe
Resource
win10v2004-20220812-en
General
-
Target
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe
-
Size
79KB
-
MD5
42f5327e3e5a4b238ec51ce0fa5f2e33
-
SHA1
64a39bd9b347a99d9d9bfc54c145ffb076082c26
-
SHA256
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68
-
SHA512
528d652bd1900b9e979352f7e4707c0f82fea3260147d3d67cad6bb03b1afa5c95a8b83b820ccacd20c4c93481b0afd4fc73d9dafb6c1beaa7f0ef653e818589
-
SSDEEP
1536:96UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:ZhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Malware Config
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 17 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RepairWatch.tiff 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\RepairWatch.tiff => C:\Users\Admin\Pictures\RepairWatch.tiff.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\ResizeConnect.crw.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\StopConnect.tif.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\WaitClose.raw => C:\Users\Admin\Pictures\WaitClose.raw.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\GroupCopy.tiff 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\ImportEnter.tiff 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\GroupCopy.tiff => C:\Users\Admin\Pictures\GroupCopy.tiff.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\GroupCopy.tiff.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\ExpandSuspend.raw => C:\Users\Admin\Pictures\ExpandSuspend.raw.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\ImportEnter.tiff => C:\Users\Admin\Pictures\ImportEnter.tiff.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\ImportEnter.tiff.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\ExpandSuspend.raw.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\RepairWatch.tiff.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\ResizeConnect.crw => C:\Users\Admin\Pictures\ResizeConnect.crw.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File renamed C:\Users\Admin\Pictures\StopConnect.tif => C:\Users\Admin\Pictures\StopConnect.tif.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened for modification C:\Users\Admin\Pictures\WaitClose.raw.babyk 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exedescription ioc process File opened (read-only) \??\A: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\J: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\V: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\M: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\W: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\E: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\I: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\U: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\S: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\F: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\G: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\H: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\R: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\T: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\Y: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\N: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\L: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\Z: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\B: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\K: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\X: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\Q: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\O: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe File opened (read-only) \??\P: 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 5012 vssadmin.exe 4584 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exepid process 868 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe 868 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1736 vssvc.exe Token: SeRestorePrivilege 1736 vssvc.exe Token: SeAuditPrivilege 1736 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.execmd.execmd.exedescription pid process target process PID 868 wrote to memory of 3388 868 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe cmd.exe PID 868 wrote to memory of 3388 868 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe cmd.exe PID 3388 wrote to memory of 5012 3388 cmd.exe vssadmin.exe PID 3388 wrote to memory of 5012 3388 cmd.exe vssadmin.exe PID 868 wrote to memory of 432 868 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe cmd.exe PID 868 wrote to memory of 432 868 315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe cmd.exe PID 432 wrote to memory of 4584 432 cmd.exe vssadmin.exe PID 432 wrote to memory of 4584 432 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe"C:\Users\Admin\AppData\Local\Temp\315d992d260498b9757bfedf95e8dec79f934c5e0139c696d5ba581508921a68.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4584
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1736