Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe
-
Size
80KB
-
MD5
13616e15e6e161bf2c187d4ccff0a74a
-
SHA1
5dc358621f84c54e25a5127e6c75873b302878c0
-
SHA256
c16db5977b4fc0999e81d73641a520b05384431102acc29a3976b47bbad97751
-
SHA512
e65ec8a0258f0046801e84785355c379aaf375b05bf0759bb49d8a89fc289a1ff446d978842f03de96aa76eb07484c92bcf9e7118665f2c2ffc60384c078e41e
-
SSDEEP
1536:nc2hl9N/IolKfGsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG24m:nc2N/4usrQLOJgY8Zp8LHD4XWaNH71dc
Malware Config
Extracted
C:\MSOCache\readme_for_unlock.txt
https://gdpr-info.eu/
http://s4xpejatghnopeieoqvjqsnfl576jekizgmw52s7ydth6wgyi2wh2gid.onion
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (377) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1676 cmd.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\T: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\P: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\J: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\H: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\K: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\L: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\Y: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\U: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\I: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\A: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\G: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\M: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\V: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\Q: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\W: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\E: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\O: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\Z: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\S: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\X: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\B: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe File opened (read-only) \??\N: 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2620 vssadmin.exe 3056 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2688 vssvc.exe Token: SeRestorePrivilege 2688 vssvc.exe Token: SeAuditPrivilege 2688 vssvc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2056 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 1680 wrote to memory of 2056 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 1680 wrote to memory of 2056 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 1680 wrote to memory of 2056 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 28 PID 2056 wrote to memory of 2620 2056 cmd.exe 30 PID 2056 wrote to memory of 2620 2056 cmd.exe 30 PID 2056 wrote to memory of 2620 2056 cmd.exe 30 PID 1680 wrote to memory of 3000 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 37 PID 1680 wrote to memory of 3000 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 37 PID 1680 wrote to memory of 3000 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 37 PID 1680 wrote to memory of 3000 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 37 PID 1680 wrote to memory of 1956 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 39 PID 1680 wrote to memory of 1956 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 39 PID 1680 wrote to memory of 1956 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 39 PID 1680 wrote to memory of 1956 1680 2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe 39 PID 3000 wrote to memory of 3056 3000 cmd.exe 41 PID 3000 wrote to memory of 3056 3000 cmd.exe 41 PID 3000 wrote to memory of 3056 3000 cmd.exe 41 PID 1956 wrote to memory of 1676 1956 cmd.exe 42 PID 1956 wrote to memory of 1676 1956 cmd.exe 42 PID 1956 wrote to memory of 1676 1956 cmd.exe 42 PID 1956 wrote to memory of 1676 1956 cmd.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" ☀瑾⛌瑾❰瑾杻<ř眑飯<)/c START /b "" cmd /c DEL "C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe" &EXIT2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c DEL "C:\Users\Admin\AppData\Local\Temp\2024-03-14_13616e15e6e161bf2c187d4ccff0a74a_babuk_destroyer.exe"3⤵
- Deletes itself
PID:1676
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5405c5458425f5bdb2cc6ca2351ba883f
SHA14f8890c8ee0ea19a7c8986073d78e6dbf396b59c
SHA256fc9dddc880f6b0dd15957f82df4468ae63dbaf67542372357ba7a992ff426a46
SHA51221c5539122414dca1dafe6ad65122c5296514edbe528414e4871e04eaa9390c890dbaa6fb3bb794455da095fc24390c708527c2eb81a230b551d0527bb419402