Analysis
-
max time kernel
93s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe
-
Size
80KB
-
MD5
7bb7c2899106b7c16b787c98c37ac8df
-
SHA1
15ba68d29d846a9ea07ff0df4d84655cfce0a7a0
-
SHA256
63e2ba3f181ba59f1926b7588d9c8d3d5589c15eb4354bc23348f22a49d04f9d
-
SHA512
372dd659779b377a715c7f1b7dbffe76de3645289c6237550dbd07488b93ebbb287ff9e5d4ae4b28256db2418362652e7f5804d8d9b8850ca0c5dd4750dae28d
-
SSDEEP
1536:mV9N/IUx1fSsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG24m:UN/D6srQLOJgY8Zp8LHD4XWaNH71dLdy
Malware Config
Extracted
C:\Recovery\WindowsRE\readme_for_unlock.txt
https://gdpr-info.eu/
http://rytsr4wlztsd436yx36atz2h52kql7cnlksuvgvphrzxnl7abn3cccid.onion
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1398) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe -
Drops startup file 1 IoCs
Processes:
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme_for_unlock.txt 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exedescription ioc process File opened (read-only) \??\Y: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\O: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\J: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\X: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\Q: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\R: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\U: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\I: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\G: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\H: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\L: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\B: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\E: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\T: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\A: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\S: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\N: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\M: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\W: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\K: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\Z: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\V: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe File opened (read-only) \??\P: 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 4016 vssadmin.exe 3684 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exepid process 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1012 vssvc.exe Token: SeRestorePrivilege 1012 vssvc.exe Token: SeAuditPrivilege 1012 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.execmd.execmd.execmd.exedescription pid process target process PID 3884 wrote to memory of 4856 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 3884 wrote to memory of 4856 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 4856 wrote to memory of 4016 4856 cmd.exe vssadmin.exe PID 4856 wrote to memory of 4016 4856 cmd.exe vssadmin.exe PID 3884 wrote to memory of 980 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 3884 wrote to memory of 980 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 3884 wrote to memory of 3120 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 3884 wrote to memory of 3120 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 3884 wrote to memory of 3120 3884 2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe cmd.exe PID 980 wrote to memory of 3684 980 cmd.exe vssadmin.exe PID 980 wrote to memory of 3684 980 cmd.exe vssadmin.exe PID 3120 wrote to memory of 6112 3120 cmd.exe cmd.exe PID 3120 wrote to memory of 6112 3120 cmd.exe cmd.exe PID 3120 wrote to memory of 6112 3120 cmd.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe"1⤵
- Checks computer location settings
- Drops startup file
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c START /b "" cmd /c DEL "C:\Users\Admin\AppData\Local\Temp\2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe" &EXIT2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\cmd.execmd /c DEL "C:\Users\Admin\AppData\Local\Temp\2024-05-25_7bb7c2899106b7c16b787c98c37ac8df_babuk_destroyer.exe"3⤵PID:6112
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ebe81a4c3938d07af46fae704091bf16
SHA1d65d6222011c893db440db814b0f4e56559b2c78
SHA25646f33031161d4be6f0a2cd08a85f96d778415ee35d825bd8e65b0b0b5b04d8d2
SHA512b2224a332fae2c304bd487ccd8725d75f706dc2f9f13abb2f06a95e8df16ad856fa636f24399ca0ef86b4212c9d4bdeec2eb84d18f707bbcceac1d771d89c570