Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2023 10:00
Static task
static1
Behavioral task
behavioral1
Sample
4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe
-
Size
79KB
-
MD5
4e7f6c2b49e0754a98832560bbba9cd9
-
SHA1
47083e35d2abc557e5d95717df7dd022698ecc5a
-
SHA256
92b26a77b619f66aefcf2aab33152ff0dd826252283025fd25eec9ac936306bf
-
SHA512
db9f9ab8cdba03eabd5ed723d2415772bc8c48813b98bfcd3e9c9ef2137e3f4ff2de2ecc99b46281acc62923af2fbad15ef3989c23d558b1e893bc3227260af3
-
SSDEEP
1536:9k6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:QhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Malware Config
Extracted
C:\Recovery\How To Restore Your Files.txt
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (185) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exedescription ioc process File opened (read-only) \??\Y: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\O: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\G: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\K: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\M: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\W: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\T: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\B: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\Q: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\A: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\V: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\H: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\Z: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\U: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\I: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\P: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\S: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\J: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\L: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\E: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\R: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\X: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe File opened (read-only) \??\N: 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3144 vssadmin.exe 488 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exepid process 892 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe 892 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 5092 vssvc.exe Token: SeRestorePrivilege 5092 vssvc.exe Token: SeAuditPrivilege 5092 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.execmd.execmd.exedescription pid process target process PID 892 wrote to memory of 4924 892 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe cmd.exe PID 892 wrote to memory of 4924 892 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe cmd.exe PID 4924 wrote to memory of 3144 4924 cmd.exe vssadmin.exe PID 4924 wrote to memory of 3144 4924 cmd.exe vssadmin.exe PID 892 wrote to memory of 4252 892 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe cmd.exe PID 892 wrote to memory of 4252 892 4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe cmd.exe PID 4252 wrote to memory of 488 4252 cmd.exe vssadmin.exe PID 4252 wrote to memory of 488 4252 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe"C:\Users\Admin\AppData\Local\Temp\4e7f6c2b49e0754a98832560bbba9cd9_babuk_destroyer_JC.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:488
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0611c32100542de4fd6f77f2a2f701b
SHA1924bd0ab0c5a68dd27c9978805a1a97c5b3088ff
SHA256c37cbb2245e2e33357aa382e07b3eb7868cb7b6832b114e49889c071fc39c6e9
SHA512d9bdf63358f3ce5bbac0f9305e3785e592742a6c47a76da95c73f17a6b719843687ca6b283c9e0f31d16d12bfee8f7a5659c4ef38e3492fd023c4e2bfdeb2b79