Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-04-2023 01:55
Static task
static1
Behavioral task
behavioral1
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win10v2004-20230221-en
General
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
-
Size
79KB
-
MD5
f9afb31bc17811e5ab4fa406f105b1fe
-
SHA1
d1a9449dcc8a3aa0c887bce71f128866175f679a
-
SHA256
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f
-
SHA512
6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55
-
SSDEEP
1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Malware Config
Extracted
C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\How To Restore Your Files.txt
darkside
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exedescription ioc process File renamed C:\Users\Admin\Pictures\RequestRead.raw => C:\Users\Admin\Pictures\RequestRead.raw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File renamed C:\Users\Admin\Pictures\RestoreRequest.png => C:\Users\Admin\Pictures\RestoreRequest.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened for modification C:\Users\Admin\Pictures\RestoreRequest.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened for modification C:\Users\Admin\Pictures\RegisterSend.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened for modification C:\Users\Admin\Pictures\RequestRead.raw.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File renamed C:\Users\Admin\Pictures\CompressCheckpoint.tif => C:\Users\Admin\Pictures\CompressCheckpoint.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened for modification C:\Users\Admin\Pictures\CompressCheckpoint.tif.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File renamed C:\Users\Admin\Pictures\JoinSet.png => C:\Users\Admin\Pictures\JoinSet.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened for modification C:\Users\Admin\Pictures\JoinSet.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File renamed C:\Users\Admin\Pictures\RegisterSend.png => C:\Users\Admin\Pictures\RegisterSend.png.babyk 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exedescription ioc process File opened (read-only) \??\H: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\Z: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\X: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\V: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\B: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\E: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\T: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\G: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\M: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\W: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\R: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\J: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\P: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\A: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\S: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\Q: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\U: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\O: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\K: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\L: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\N: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\Y: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\I: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\F: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1340 vssadmin.exe 1848 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exepid process 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1640 vssvc.exe Token: SeRestorePrivilege 1640 vssvc.exe Token: SeAuditPrivilege 1640 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.execmd.execmd.exedescription pid process target process PID 1724 wrote to memory of 1064 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1724 wrote to memory of 1064 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1724 wrote to memory of 1064 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1724 wrote to memory of 1064 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1064 wrote to memory of 1340 1064 cmd.exe vssadmin.exe PID 1064 wrote to memory of 1340 1064 cmd.exe vssadmin.exe PID 1064 wrote to memory of 1340 1064 cmd.exe vssadmin.exe PID 1724 wrote to memory of 592 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1724 wrote to memory of 592 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1724 wrote to memory of 592 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 1724 wrote to memory of 592 1724 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe cmd.exe PID 592 wrote to memory of 1848 592 cmd.exe vssadmin.exe PID 592 wrote to memory of 1848 592 cmd.exe vssadmin.exe PID 592 wrote to memory of 1848 592 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe"C:\Users\Admin\AppData\Local\Temp\01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1848
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b57be4df98eb3b740a28da699734499
SHA1abee599dc58c21a7cacf4bc6a727fee782df8b23
SHA256d7c3edc0231627dccb4c8fc5477ef3bb556f73b5f44d26d7b979c86e856731d6
SHA51296299b107c3623bda24845a732147b988b153664355a6748c5085e443b626377c8b5cc4c5a83347cc00093dffa7233d6a9665f2b812a2f6e7244b9a9c8f3a389