Overview
overview
10Static
static
10002.7z
windows7-x64
002.7z
windows10-2004-x64
002.7z
android-9-x86
002.7z
android-13-x64
002.7z
macos-10.15-amd64
002.7z
ubuntu-18.04-amd64
002.7z
debian-9-armhf
002.7z
debian-9-mips
002.7z
debian-9-mipsel
01aabfaa41...50.exe
windows7-x64
301aabfaa41...50.exe
windows10-2004-x64
301aabfaa41...50.exe
android-13-x64
01aabfaa41...50.exe
android-13-x64
01aabfaa41...50.exe
macos-10.15-amd64
01aabfaa41...50.exe
ubuntu-18.04-amd64
01aabfaa41...50.exe
debian-9-armhf
01aabfaa41...50.exe
debian-9-mips
01aabfaa41...50.exe
debian-9-mipsel
01c647838c...7f.exe
windows7-x64
301c647838c...7f.exe
windows10-2004-x64
1001c647838c...7f.exe
android-9-x86
01c647838c...7f.exe
android-13-x64
01c647838c...7f.exe
macos-10.15-amd64
01c647838c...7f.exe
ubuntu-18.04-amd64
01c647838c...7f.exe
debian-9-armhf
01c647838c...7f.exe
debian-9-mips
01c647838c...7f.exe
debian-9-mipsel
02f5c32fa2...d6.exe
windows7-x64
602f5c32fa2...d6.exe
windows10-2004-x64
602f5c32fa2...d6.exe
android-9-x86
02f5c32fa2...d6.exe
android-13-x64
02f5c32fa2...d6.exe
macos-10.15-amd64
Analysis
-
max time kernel
197s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 08:57
Static task
static1
Behavioral task
behavioral1
Sample
002.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
002.7z
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
002.7z
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
002.7z
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
002.7z
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
002.7z
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
002.7z
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
002.7z
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
002.7z
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral10
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral12
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral13
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
macos-20241101-en
Behavioral task
behavioral15
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral16
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral19
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral22
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
macos-20241101-en
Behavioral task
behavioral24
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral25
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral27
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral28
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral30
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral31
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral32
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
macos-20241106-en
General
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
-
Size
79KB
-
MD5
f9afb31bc17811e5ab4fa406f105b1fe
-
SHA1
d1a9449dcc8a3aa0c887bce71f128866175f679a
-
SHA256
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f
-
SHA512
6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55
-
SSDEEP
1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Malware Config
Extracted
C:\Recovery\How To Restore Your Files.txt
darkside
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Babuk family
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (190) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\G: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\J: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\K: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\N: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\Q: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\E: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\Y: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\M: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\H: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\L: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\B: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\X: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\W: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\U: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\P: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\O: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\S: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\Z: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\V: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\R: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\T: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe File opened (read-only) \??\I: 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2760 vssadmin.exe 4508 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4316 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe 4316 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4184 vssvc.exe Token: SeRestorePrivilege 4184 vssvc.exe Token: SeAuditPrivilege 4184 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4316 wrote to memory of 2372 4316 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe 82 PID 4316 wrote to memory of 2372 4316 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe 82 PID 2372 wrote to memory of 2760 2372 cmd.exe 84 PID 2372 wrote to memory of 2760 2372 cmd.exe 84 PID 4316 wrote to memory of 2180 4316 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe 85 PID 4316 wrote to memory of 2180 4316 01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe 85 PID 2180 wrote to memory of 4508 2180 cmd.exe 90 PID 2180 wrote to memory of 4508 2180 cmd.exe 90 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exeC:\Users\Admin\AppData\Local\Temp\01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe dsrm -subtree -noprompt -c user"http://+:443"1⤵
- Checks computer location settings
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4508
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b57be4df98eb3b740a28da699734499
SHA1abee599dc58c21a7cacf4bc6a727fee782df8b23
SHA256d7c3edc0231627dccb4c8fc5477ef3bb556f73b5f44d26d7b979c86e856731d6
SHA51296299b107c3623bda24845a732147b988b153664355a6748c5085e443b626377c8b5cc4c5a83347cc00093dffa7233d6a9665f2b812a2f6e7244b9a9c8f3a389