Analysis
-
max time kernel
75s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.7z
Resource
win10v2004-20250314-en
General
-
Target
Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.7z
-
Size
22KB
-
MD5
05736fead4f81b48adbb459dbc727d33
-
SHA1
ffcdcc5113cc6c2199d8522c0b8349bb847d2c5d
-
SHA256
22fee0b9c0435d8bea8ee63255ab4df89e167d10fad4e06909d5aa0a20c06d3f
-
SHA512
0e7046c299172e7d01d855fbe2e495992ee8be45a39e047a1128bf3250231a069770819ac0072f4d5bab96dd9d4532b42121f323ec16c1e50b58f07c1281adcb
-
SSDEEP
384:fu8K6uR9GJQkG12MRuj1qxMwys1iL7+kQer2l8JdhQg6LRpHx+4ZGYDvQVNzF:m8KjyQkGEWjawGL7z3hQtLBZIVN5
Malware Config
Extracted
C:\4fc20efa2b2ad5aa4b35f8fcca90f7df\How To Restore Your Files.txt
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/104617a28c7b21518d506b079ca9d5221551f89d5d54025a1ec71dd33aacd896/
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/
http://vq3zf757tzpwhs7bulnr43d2rfg5fkvvfkhee2zhhzievuxrbnarmgqd.onion/4c43fb6f271eda10ac65ec0dc918f7ec851455acb98c1fe29f3b2feffe53c286
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Babuk family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (178) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 6064 vssadmin.exe 5520 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 116 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 116 7zFM.exe Token: 35 116 7zFM.exe Token: SeSecurityPrivilege 116 7zFM.exe Token: SeDebugPrivilege 3704 taskmgr.exe Token: SeSystemProfilePrivilege 3704 taskmgr.exe Token: SeCreateGlobalPrivilege 3704 taskmgr.exe Token: SeBackupPrivilege 4812 vssvc.exe Token: SeRestorePrivilege 4812 vssvc.exe Token: SeAuditPrivilege 4812 vssvc.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 116 7zFM.exe 116 7zFM.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe 3704 taskmgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4724 wrote to memory of 1788 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe 98 PID 4724 wrote to memory of 1788 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe 98 PID 1788 wrote to memory of 6064 1788 cmd.exe 102 PID 1788 wrote to memory of 6064 1788 cmd.exe 102 PID 4724 wrote to memory of 4332 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe 106 PID 4724 wrote to memory of 4332 4724 Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe 106 PID 4332 wrote to memory of 5520 4332 cmd.exe 109 PID 4332 wrote to memory of 5520 4332 cmd.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:116
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:6064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5520
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3704
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\How To Restore Your Files.txt1⤵PID:3960
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5655a099a144e6164ba891274ac9aa406
SHA166c4292b9f1b516ec0869adcd64efeb5c4bd1917
SHA256cfad30c98f7fdd4c40a88994cb4d2f8499d67525ac92031d1f77595164b27b71
SHA5123fc847a23a2fbc3a03607195451a22caf3cd867d4085796d8ddb4e6b490cd303524c22c75d9b9f204b17d62f089692fd8f11d9275a10e15da62ae3bcf2fedecf
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Babuk.a-2138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf.exe
Filesize79KB
MD5f6282c938e0662cf851feee0146d79a4
SHA19d0c6528565303e5b10a964a2783c77f25b9695b
SHA2562138c8a34a1eff40ba3fc81b6e3b7564c6b695b140e82f3fcf23b2ec2bf291cf
SHA512b99be65ddc6154128992b510aa1b053b56dbad7f91f9102e42a06ada2f3c58f5ac6423483728648c20adce862c6f0e136913c6d0441a47391cedc76194c2936f