Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe
-
Size
79KB
-
MD5
7b910a871a5bb36d8f47094f51eaac46
-
SHA1
61817e25b0cfae37a3f289fc308e67146f874342
-
SHA256
ae2b65de86e012e926c22d0f81c7d4e495d8cbcae8aa34c298c267477d2d3ec0
-
SHA512
3e0da7617b4f699d551dee400dea9d2c5ddccb99057ab48ef81ad8d1b7b182dc38e04aaa8248368e1f668022cf73f45190acc8a82eb114cd0d13b1c44489fdaa
-
SSDEEP
1536:yQ4Bh+fyPhBAxC66ksrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2S8bj/:2h+fyPECLksrQLOJgY8Zp8LHD4XWaNHj
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2528 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exepid process 1888 2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2724 vssvc.exe Token: SeRestorePrivilege 2724 vssvc.exe Token: SeAuditPrivilege 2724 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.execmd.exedescription pid process target process PID 1888 wrote to memory of 2936 1888 2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe cmd.exe PID 1888 wrote to memory of 2936 1888 2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe cmd.exe PID 1888 wrote to memory of 2936 1888 2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe cmd.exe PID 1888 wrote to memory of 2936 1888 2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe cmd.exe PID 2936 wrote to memory of 2528 2936 cmd.exe vssadmin.exe PID 2936 wrote to memory of 2528 2936 cmd.exe vssadmin.exe PID 2936 wrote to memory of 2528 2936 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_7b910a871a5bb36d8f47094f51eaac46_babuk_destroyer.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2528
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724