Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4.exe

Overview

General Information

Sample name:4.exe
Analysis ID:1579345
MD5:c82121875584b5607f9d8a9c5c10889a
SHA1:4bc0ed52931c44261aa1d40c42d01255427c683b
SHA256:01d4ced698c9826e5879e235a74bab2b794e85df04b3c693345ef1925a20aeb9
Infos:

Detection

Babuk
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Babuk Ransomware
AI detected suspicious sample
Deletes shadow drive data (may be related to ransomware)
Found Tor onion address
Machine Learning detection for sample
Program does not show much activity (idle)

Classification

  • System is w10x64
  • 4.exe (PID: 7328 cmdline: "C:\Users\user\Desktop\4.exe" MD5: C82121875584B5607F9D8A9C5C10889A)
    • conhost.exe (PID: 7336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
BabukBabuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_babukYara detected Babuk RansomwareJoe Security
    Process Memory Space: 4.exe PID: 7328JoeSecurity_babukYara detected Babuk RansomwareJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 4.exeReversingLabs: Detection: 83%
      Source: 4.exeVirustotal: Detection: 78%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.8% probability
      Source: 4.exeJoe Sandbox ML: detected
      Source: 4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

      Networking

      barindex
      Source: 4.exe, 00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: Do not interrupt the encryption process, don't stop or reboot your machines until the encryption is complete. Otherwise the data may be corrupted.In addition to the encrypted infrastructure, we have downloaded a lot of confidential information from your systems. The publication of these documents may cause the termination of your commercial activities, contracts with your clients and partners, and multiple lawsuits.If you ignore this warning and do not contact us, your sensitive data will be posted on our blog: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In your best interest is to avoid contacting law enforcement and data recovery companies. They can't help you with the recovery, will cause more problems and expenses, and delay the return to normal work significantly.Besides, if you contact the police we will immediately publish your data.We offer the best solution to the problem, to receive our decryption software and prevent disclosure of your sensitive information contact us directly.A quick recovery is very important to keep your business running at full capacity and minimize losses. This is why you need to begin negotiations as soon as possible. By the way, if you don't contact us within 5 days, we will start publishing your data.
      Source: 4.exe, 00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: Yara matchFile source: 00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4.exe PID: 7328, type: MEMORYSTR
      Source: 4.exe, 00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: steam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrvssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled nobasic_string: construction from null is not valid
      Source: classification engineClassification label: mal72.rans.evad.winEXE@2/0@0/0
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7336:120:WilError_03
      Source: C:\Users\user\Desktop\4.exeMutant created: \Sessions\1\BaseNamedObjects\rnxe-b4ou-eplg-zyr5cAcTuS
      Source: C:\Users\user\Desktop\4.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 4.exeReversingLabs: Detection: 83%
      Source: 4.exeVirustotal: Detection: 78%
      Source: unknownProcess created: C:\Users\user\Desktop\4.exe "C:\Users\user\Desktop\4.exe"
      Source: C:\Users\user\Desktop\4.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\4.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\4.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\4.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\4.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\4.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\4.exeSection loaded: ntmarta.dllJump to behavior
      Source: 4.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: 4.exeStatic file information: File size 4777351 > 1048576
      Source: 4.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x20aa00
      Source: 4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Software Packing
      OS Credential Dumping1
      System Information Discovery
      Remote ServicesData from Local System1
      Proxy
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      File Deletion
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      4.exe83%ReversingLabsWin64.Ransomware.Cactus
      4.exe79%VirustotalBrowse
      4.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In4.exe, 00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmptrue
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1579345
        Start date and time:2024-12-21 20:17:03 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 39s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:4.exe
        Detection:MAL
        Classification:mal72.rans.evad.winEXE@2/0@0/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (console) x86-64, for MS Windows
        Entropy (8bit):6.843338611151386
        TrID:
        • Win64 Executable Console (202006/5) 81.26%
        • UPX compressed Win32 Executable (30571/9) 12.30%
        • Win64 Executable (generic) (12005/4) 4.83%
        • Generic Win/DOS Executable (2004/3) 0.81%
        • DOS Executable Generic (2002/1) 0.81%
        File name:4.exe
        File size:4'777'351 bytes
        MD5:c82121875584b5607f9d8a9c5c10889a
        SHA1:4bc0ed52931c44261aa1d40c42d01255427c683b
        SHA256:01d4ced698c9826e5879e235a74bab2b794e85df04b3c693345ef1925a20aeb9
        SHA512:3d0086dd2f520721f18123ef7ae93ef29613282a3b15a51024535170c04c5dea3be96f05a2bd09860acfe1bc1c4b7cead2c67a5b04783c71ecf6a62b7ac4a17e
        SSDEEP:98304:8PXlkUBvBfVFKea3IxoSLdtOUHu345hsMXWruBhW2:8PyUB9G7YxLdtOUHP
        TLSH:38263B8228DF0D9AEDC13BB861C3632A677CBE61CF6B4F27A60841355D532C57D2AB50
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Me.dd.......&....(.. .......H...i...H....@..............................i...........`... ............................
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x1406995c0
        Entrypoint Section:UPX1
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Time Stamp:0x654DE0E4 [Fri Nov 10 07:51:00 2023 UTC]
        TLS Callbacks:0x40699810, 0x1
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:daded6775a8b352b79134b7639b1b4f1
        Instruction
        push ebx
        push esi
        push edi
        push ebp
        dec eax
        lea esi, dword ptr [FFDF5A5Ah]
        dec eax
        lea edi, dword ptr [esi-0048E025h]
        dec eax
        lea eax, dword ptr [edi+00567FBCh]
        push dword ptr [eax]
        mov dword ptr [eax], 2E5AC714h
        push eax
        push edi
        xor ebx, ebx
        xor ecx, ecx
        dec eax
        or ebp, FFFFFFFFh
        call 00007F2734B449E5h
        add ebx, ebx
        je 00007F2734B44994h
        rep ret
        mov ebx, dword ptr [esi]
        dec eax
        sub esi, FFFFFFFCh
        adc ebx, ebx
        mov dl, byte ptr [esi]
        rep ret
        dec eax
        lea eax, dword ptr [edi+ebp]
        cmp ecx, 05h
        mov dl, byte ptr [eax]
        jbe 00007F2734B449B3h
        dec eax
        cmp ebp, FFFFFFFCh
        jnbe 00007F2734B449ADh
        sub ecx, 04h
        mov edx, dword ptr [eax]
        dec eax
        add eax, 04h
        sub ecx, 04h
        mov dword ptr [edi], edx
        dec eax
        lea edi, dword ptr [edi+04h]
        jnc 00007F2734B44981h
        add ecx, 04h
        mov dl, byte ptr [eax]
        je 00007F2734B449A2h
        dec eax
        inc eax
        mov byte ptr [edi], dl
        sub ecx, 01h
        mov dl, byte ptr [eax]
        dec eax
        lea edi, dword ptr [edi+01h]
        jne 00007F2734B44982h
        rep ret
        cld
        inc ecx
        pop ebx
        jmp 00007F2734B4499Ah
        dec eax
        inc esi
        mov byte ptr [edi], dl
        dec eax
        inc edi
        mov dl, byte ptr [esi]
        add ebx, ebx
        jne 00007F2734B4499Ch
        mov ebx, dword ptr [esi]
        dec eax
        sub esi, FFFFFFFCh
        adc ebx, ebx
        mov dl, byte ptr [esi]
        jc 00007F2734B44978h
        lea eax, dword ptr [ecx+01h]
        jmp 00007F2734B44999h
        dec eax
        inc ecx
        call ebx
        adc eax, eax
        inc ecx
        call ebx
        adc eax, eax
        add ebx, ebx
        jne 00007F2734B4499Ch
        mov ebx, dword ptr [esi]
        dec eax
        sub esi, FFFFFFFCh
        adc ebx, ebx
        mov dl, byte ptr [esi]
        jnc 00007F2734B44976h
        sub eax, 03h
        jc 00007F2734B449ABh
        shl eax, 08h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x69a4ec0x278.rsrc
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x69a0000x4ec.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4d40000x27924UPX1
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x69a7640x14.rsrc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x6998380x28UPX1
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        UPX00x10000x48e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        UPX10x48f0000x20b0000x20aa00d85c9eac6a2402ea3f9be49984007eedunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x69a0000x10000x800f36a9a76ee7a8ce95b13885d1186df8aFalse0.3984375data4.927303385403973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0x69a05c0x48fXML 1.0 document, ASCII text0.40102827763496146
        DLLImport
        ADVAPI32.dllOpenServiceA
        KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
        msvcrt.dllatoi
        PSAPI.DLLGetProcessImageFileNameW
        RstrtMgr.DLLRmGetList
        SHELL32.dllStrStrIW
        USER32.dllShowWindow
        WS2_32.dllhtonl
        WSOCK32.dllbind
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:14:17:53
        Start date:21/12/2024
        Path:C:\Users\user\Desktop\4.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\4.exe"
        Imagebase:0x7ff656910000
        File size:4'777'351 bytes
        MD5 hash:C82121875584B5607F9D8A9C5C10889A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_babuk, Description: Yara detected Babuk Ransomware, Source: 00000000.00000002.1666262820.00007FF656D19000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:14:17:53
        Start date:21/12/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7699e0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        No disassembly