Resubmissions

10-06-2024 12:56

240610-p6k4zswhjq 10

10-06-2024 12:48

240610-p189maware 10

Analysis

  • max time kernel
    127s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2024 12:56

General

  • Target

    2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer.exe

  • Size

    79KB

  • MD5

    204253b2cf495b1304d529e4edcebaf0

  • SHA1

    ce4c825685a546ead3037d6e8b69d40d19ba2705

  • SHA256

    9d1382cfe812378d742424f3e4717cfee4fa90d1fe0c8067cdf998e9330c0e14

  • SHA512

    4176076157eec99d41e657b347ea1c5c234fcf30cac54a004fb09c5b800b51b1604c7c2aacc60e20c262d51c9a88f66cb1ba91fa4c0f077bc01a107c878591b9

  • SSDEEP

    1536:CukWBeGPGEbmsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2nsf:dBeBsmsrQLOJgY8Zp8LHD4XWaNH71dLc

Malware Config

Signatures

  • Babuk Locker

    RaaS first seen in 2021 initially called Vasa Locker.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-10_204253b2cf495b1304d529e4edcebaf0_babuk_destroyer.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2304
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:380
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\TraceRepair.mpg.babyk
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1396
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3160
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\How To Restore Your Files.txt
    1⤵
      PID:1152
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2064
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4320
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\How To Restore Your Files.txt
        1⤵
          PID:1544
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
          1⤵
            PID:4204
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" F:\How To Restore Your Files.txt
            1⤵
            • Enumerates connected drives
            PID:2612
          • C:\Program Files\dotnet\dotnet.exe
            "C:\Program Files\dotnet\dotnet.exe"
            1⤵
              PID:2084
            • C:\Program Files\dotnet\dotnet.exe
              "C:\Program Files\dotnet\dotnet.exe"
              1⤵
                PID:1924

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Recovery\WindowsRE\How To Restore Your Files.txt

                Filesize

                8KB

                MD5

                2af817219bb1d24a11ab839b9453b5f3

                SHA1

                f9ff9075f9472c41aeb93df2e439fe624dc143b0

                SHA256

                6a16454cad4534d51025f65277abaec0ff4a30082840154a35889445bb3ad0a0

                SHA512

                d443e149d8b097cc64b0bbbf65e3d660de43943a4b36ac4c41bfbdfe814fb895d7ba97128aa1235b85d2292b79afc451fbcb89cc6a56d33ecff7d93e18a15c30

              • C:\Users\Admin\Desktop\TraceRepair.mpg.babyk

                Filesize

                522KB

                MD5

                21705c7129c0efd3ba8b034145b50f61

                SHA1

                ad2e402f5f38683c2ea1dbc6205de5c382f95d19

                SHA256

                5034a0b5e16ae37dba37f52dee45f12ca40588e164efecec7535f2b8e7869dc6

                SHA512

                5e24f15fd43527290e561ec9d5a4428ad35079607a866404fb2859cf02326b1a9b5c32656a697c99996e06d82d5056b4729aa351ebaa05cc624c6fec2bb6c166

              • memory/2064-230-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-232-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-231-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-233-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-234-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-235-0x00007FF7F1D00000-0x00007FF7F1D10000-memory.dmp

                Filesize

                64KB

              • memory/2064-236-0x00007FF7F1D00000-0x00007FF7F1D10000-memory.dmp

                Filesize

                64KB

              • memory/2064-253-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-254-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-255-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB

              • memory/2064-252-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

                Filesize

                64KB