Analysis
-
max time kernel
25s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-04-2023 17:44
Static task
static1
Behavioral task
behavioral1
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe
-
Size
79KB
-
MD5
f9afb31bc17811e5ab4fa406f105b1fe
-
SHA1
d1a9449dcc8a3aa0c887bce71f128866175f679a
-
SHA256
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f
-
SHA512
6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55
-
SSDEEP
1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Malware Config
Extracted
C:\Users\Admin\Contacts\How To Restore Your Files.txt
darkside
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\NewCheckpoint.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\AssertGrant.raw => C:\Users\Admin\Pictures\AssertGrant.raw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened for modification C:\Users\Admin\Pictures\AssertGrant.raw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened for modification C:\Users\Admin\Pictures\ConnectUnlock.crw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened for modification C:\Users\Admin\Pictures\EnterResume.crw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\EnterResume.crw => C:\Users\Admin\Pictures\EnterResume.crw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\InitializeExpand.tif => C:\Users\Admin\Pictures\InitializeExpand.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\MergeUnlock.png => C:\Users\Admin\Pictures\MergeUnlock.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened for modification C:\Users\Admin\Pictures\SwitchRead.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened for modification C:\Users\Admin\Pictures\InitializeExpand.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\SwitchRead.tif => C:\Users\Admin\Pictures\SwitchRead.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\ConnectUnlock.crw => C:\Users\Admin\Pictures\ConnectUnlock.crw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File renamed C:\Users\Admin\Pictures\NewCheckpoint.tif => C:\Users\Admin\Pictures\NewCheckpoint.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened for modification C:\Users\Admin\Pictures\MergeUnlock.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exedescription ioc process File opened (read-only) \??\E: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\F: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\Z: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\N: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\M: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\Q: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\W: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\O: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\P: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\H: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\J: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\X: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\B: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\R: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\T: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\I: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\A: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\S: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\G: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\K: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\L: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\V: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\Y: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe File opened (read-only) \??\U: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1452 vssadmin.exe 908 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exepid process 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 576 vssvc.exe Token: SeRestorePrivilege 576 vssvc.exe Token: SeAuditPrivilege 576 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.execmd.execmd.exedescription pid process target process PID 1624 wrote to memory of 904 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1624 wrote to memory of 904 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1624 wrote to memory of 904 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1624 wrote to memory of 904 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 904 wrote to memory of 1452 904 cmd.exe vssadmin.exe PID 904 wrote to memory of 1452 904 cmd.exe vssadmin.exe PID 904 wrote to memory of 1452 904 cmd.exe vssadmin.exe PID 1624 wrote to memory of 1244 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1624 wrote to memory of 1244 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1624 wrote to memory of 1244 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1624 wrote to memory of 1244 1624 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe cmd.exe PID 1244 wrote to memory of 908 1244 cmd.exe vssadmin.exe PID 1244 wrote to memory of 908 1244 cmd.exe vssadmin.exe PID 1244 wrote to memory of 908 1244 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe"C:\Users\Admin\AppData\Local\Temp\01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:908
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b57be4df98eb3b740a28da699734499
SHA1abee599dc58c21a7cacf4bc6a727fee782df8b23
SHA256d7c3edc0231627dccb4c8fc5477ef3bb556f73b5f44d26d7b979c86e856731d6
SHA51296299b107c3623bda24845a732147b988b153664355a6748c5085e443b626377c8b5cc4c5a83347cc00093dffa7233d6a9665f2b812a2f6e7244b9a9c8f3a389