Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe
-
Size
79KB
-
MD5
239379865eecbe894b9dfa3623a11878
-
SHA1
bb834c9401ea34b8423530b84094a558e824a650
-
SHA256
65813aa45df5c32fbeafd976881ad119d1b9e3b7dfe4e632e236b2a4dcac9c47
-
SHA512
42b560f3391202c4dfc440d82805d452d71f3a5746bd58ffef01f15dc0fc7bd5637e564929de0baf4d867633b44b25944bc711ec49e987f4002125d6cc6732ed
-
SSDEEP
1536:k6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:2hZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Malware Config
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (165) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\E: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\I: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\G: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\X: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\W: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\Y: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\P: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\V: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\Z: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\N: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\Q: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\R: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\A: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\S: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\J: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\K: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\L: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\B: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\T: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\U: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\O: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe File opened (read-only) \??\H: 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2844 vssadmin.exe 3864 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe 3036 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1644 vssvc.exe Token: SeRestorePrivilege 1644 vssvc.exe Token: SeAuditPrivilege 1644 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3036 wrote to memory of 372 3036 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe 85 PID 3036 wrote to memory of 372 3036 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe 85 PID 372 wrote to memory of 2844 372 cmd.exe 89 PID 372 wrote to memory of 2844 372 cmd.exe 89 PID 3036 wrote to memory of 4360 3036 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe 90 PID 3036 wrote to memory of 4360 3036 2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe 90 PID 4360 wrote to memory of 3864 4360 cmd.exe 93 PID 4360 wrote to memory of 3864 4360 cmd.exe 93 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-16_239379865eecbe894b9dfa3623a11878_babuk_destroyer.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2844
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3864
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416B
MD5be6ff0c888b03ae7be25a9cd40d25ec4
SHA1f81998b65f6ebbd9d53e86c97212476b99481c13
SHA256ffb8aae1f157ca72e7a3a861e8f7750f42ce675110fa857f1a628ec622b9d930
SHA51232c36045fef6b4e0246a67313a79d20c1417fbea72194ffb21ae632849015ca00bb5cf56ee64291a9d810195c17d279173165629e06522ba6ba6c802983eb4d5