Edit tour

Windows Analysis Report
TDL7Z3zNPD.exe

Overview

General Information

Sample name:TDL7Z3zNPD.exe
renamed because original name is a hash value
Original sample name:a82c5abfc976b78a19020e690992a803fae267080d1e3fb30dff552a0ddf73b1.exe
Analysis ID:1670877
MD5:ccb993b425257228bd48c0aac20d5027
SHA1:20c2350d5dee7c06dfcd9d182bfa87a02ad8e275
SHA256:a82c5abfc976b78a19020e690992a803fae267080d1e3fb30dff552a0ddf73b1
Tags:cactusexeransomwareuser-TheRavenFile
Infos:

Detection

Babuk
Score:64
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Babuk Ransomware
Deletes shadow drive data (may be related to ransomware)
Found Tor onion address
May use bcdedit to modify the Windows boot settings
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • TDL7Z3zNPD.exe (PID: 7592 cmdline: "C:\Users\user\Desktop\TDL7Z3zNPD.exe" MD5: CCB993B425257228BD48C0AAC20D5027)
    • conhost.exe (PID: 7600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
BabukBabuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1258140495.00007FF73701A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_babukYara detected Babuk RansomwareJoe Security
    00000000.00000000.1255293811.00007FF73701A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_babukYara detected Babuk RansomwareJoe Security
      Process Memory Space: TDL7Z3zNPD.exe PID: 7592JoeSecurity_babukYara detected Babuk RansomwareJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.TDL7Z3zNPD.exe.7ff736c10000.0.unpackJoeSecurity_babukYara detected Babuk RansomwareJoe Security
          0.0.TDL7Z3zNPD.exe.7ff736c10000.0.unpackJoeSecurity_babukYara detected Babuk RansomwareJoe Security
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: TDL7Z3zNPD.exeVirustotal: Detection: 63%Perma Link
            Source: TDL7Z3zNPD.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

            Networking

            barindex
            Source: TDL7Z3zNPD.exe, 00000000.00000000.1255293811.00007FF73701A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Do not interrupt the encryption process, don't stop or reboot your machines until the encryption is complete. Otherwise the data may be corrupted.In addition to the encrypted infrastructure, we have downloaded a lot of confidential information from your systems. The publication of these documents may cause the termination of your commercial activities, contracts with your clients and partners, and multiple lawsuits.If you ignore this warning and do not contact us, your sensitive data will be posted on our blog: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In your best interest is to avoid contacting law enforcement and data recovery companies. They can't help you with the recovery, will cause more problems and expenses, and delay the return to normal work significantly.Besides, if you contact the police we will immediately publish your data.We offer the best solution to the problem, to receive our decryption software and prevent disclosure of your sensitive information contact us directly.A quick recovery is very important to keep your business running at full capacity and minimize losses. This is why you need to begin negotiations as soon as possible. By the way, if you don't contact us within 5 days, we will start publishing your data.
            Source: TDL7Z3zNPD.exeString found in binary or memory: Do not interrupt the encryption process, don't stop or reboot your machines until the encryption is complete. Otherwise the data may be corrupted.In addition to the encrypted infrastructure, we have downloaded a lot of confidential information from your systems. The publication of these documents may cause the termination of your commercial activities, contracts with your clients and partners, and multiple lawsuits.If you ignore this warning and do not contact us, your sensitive data will be posted on our blog: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In your best interest is to avoid contacting law enforcement and data recovery companies. They can't help you with the recovery, will cause more problems and expenses, and delay the return to normal work significantly.Besides, if you contact the police we will immediately publish your data.We offer the best solution to the problem, to receive our decryption software and prevent disclosure of your sensitive information contact us directly.A quick recovery is very important to keep your business running at full capacity and minimize losses. This is why you need to begin negotiations as soon as possible. By the way, if you don't contact us within 5 days, we will start publishing your data.
            Source: TDL7Z3zNPD.exeString found in binary or memory: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: Yara matchFile source: 0.2.TDL7Z3zNPD.exe.7ff736c10000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.TDL7Z3zNPD.exe.7ff736c10000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1258140495.00007FF73701A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.1255293811.00007FF73701A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: TDL7Z3zNPD.exe PID: 7592, type: MEMORYSTR
            Source: TDL7Z3zNPD.exe, 00000000.00000000.1255293811.00007FF73701A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: steam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrvssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled nobasic_string: construction from null is not valid
            Source: TDL7Z3zNPD.exeBinary or memory string: steam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrvssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled nobasic_string: construction from null is not valid
            Source: TDL7Z3zNPD.exeStatic PE information: Number of sections : 20 > 10
            Source: TDL7Z3zNPD.exe, 00000000.00000002.1257672942.0000024FF4048000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBp
            Source: classification engineClassification label: mal64.rans.evad.winEXE@2/0@0/0
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeMutant created: \Sessions\1\BaseNamedObjects\768j-9nbu-7q6d-vacncAcTuS
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7600:120:WilError_03
            Source: TDL7Z3zNPD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: TDL7Z3zNPD.exeVirustotal: Detection: 63%
            Source: TDL7Z3zNPD.exeString found in binary or memory: id-cmc-addExtensions
            Source: TDL7Z3zNPD.exeString found in binary or memory: set-addPolicy
            Source: unknownProcess created: C:\Users\user\Desktop\TDL7Z3zNPD.exe "C:\Users\user\Desktop\TDL7Z3zNPD.exe"
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\TDL7Z3zNPD.exeSection loaded: ntmarta.dllJump to behavior
            Source: TDL7Z3zNPD.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: TDL7Z3zNPD.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: TDL7Z3zNPD.exeStatic file information: File size 9222026 > 1048576
            Source: TDL7Z3zNPD.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x403000
            Source: TDL7Z3zNPD.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Source: TDL7Z3zNPD.exeStatic PE information: section name: .xdata
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /4
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /19
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /31
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /45
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /57
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /70
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /81
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /97
            Source: TDL7Z3zNPD.exeStatic PE information: section name: /113
            Source: TDL7Z3zNPD.exeBinary or memory string: steam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrvssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled nobasic_string: construction from null is not valid
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Bootkit
            1
            Process Injection
            1
            Bootkit
            OS Credential Dumping1
            System Information Discovery
            Remote ServicesData from Local System1
            Proxy
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Process Injection
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            File Deletion
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1670877 Sample: TDL7Z3zNPD.exe Startdate: 22/04/2025 Architecture: WINDOWS Score: 64 11 Multi AV Scanner detection for submitted file 2->11 13 Yara detected Babuk Ransomware 2->13 15 Found Tor onion address 2->15 17 Deletes shadow drive data (may be related to ransomware) 2->17 6 TDL7Z3zNPD.exe 1 2->6         started        process3 signatures4 19 Found Tor onion address 6->19 21 Deletes shadow drive data (may be related to ransomware) 6->21 9 conhost.exe 6->9         started        process5

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            TDL7Z3zNPD.exe64%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/InTDL7Z3zNPD.exefalse
              high
              No contacted IP infos
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1670877
              Start date and time:2025-04-22 09:05:36 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 5s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Power Change
              Sample name:TDL7Z3zNPD.exe
              renamed because original name is a hash value
              Original Sample Name:a82c5abfc976b78a19020e690992a803fae267080d1e3fb30dff552a0ddf73b1.exe
              Detection:MAL
              Classification:mal64.rans.evad.winEXE@2/0@0/0
              EGA Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 184.29.183.29, 4.245.163.56, 150.171.27.254
              • Excluded domains from analysis (whitelisted): c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target TDL7Z3zNPD.exe, PID 7592 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32+ executable (console) x86-64, for MS Windows
              Entropy (8bit):6.418676674278581
              TrID:
              • Win64 Executable Console (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:TDL7Z3zNPD.exe
              File size:9'222'026 bytes
              MD5:ccb993b425257228bd48c0aac20d5027
              SHA1:20c2350d5dee7c06dfcd9d182bfa87a02ad8e275
              SHA256:a82c5abfc976b78a19020e690992a803fae267080d1e3fb30dff552a0ddf73b1
              SHA512:b0da5aa97c9605ea59374bc44bb2b207f3f928813c29d26a1b4d51dc87d6a58d20d6050b23631acda28d78ef4ca2219cb507fbdd14fd861bd333ab2fb719e62b
              SSDEEP:98304:spDzj18PqRj6+eK+3gp53LuGnLYrfJ40YeeWB9OutOUHu345hsMXWruB0W2:ej1/N+6obZOutOUHk
              TLSH:FE965B5365AB0CEDDDDA67B492D76336A734FD218A792F3B6604C6302D139C06E2BB10
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....ze..d.......&....(.0@..&S..>.............@.............................Pi...........`... ............................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x1400013f0
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x657AEE8C [Thu Dec 14 12:01:16 2023 UTC]
              TLS Callbacks:0x4032b460, 0x1, 0x4032b430, 0x1, 0x4033fa20, 0x1
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:2db53f4954708699a2b0e735b5b59251
              Instruction
              dec eax
              sub esp, 28h
              dec eax
              mov eax, dword ptr [004BE4A5h]
              mov dword ptr [eax], 00000000h
              call 00007FB5310D6A3Fh
              nop
              nop
              dec eax
              add esp, 28h
              ret
              nop dword ptr [eax]
              dec eax
              sub esp, 28h
              call 00007FB5314124A4h
              dec eax
              cmp eax, 01h
              sbb eax, eax
              dec eax
              add esp, 28h
              ret
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              dec eax
              lea ecx, dword ptr [00000009h]
              jmp 00007FB5310D6C99h
              nop dword ptr [eax+00h]
              ret
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              push ebp
              dec eax
              mov ebp, esp
              dec eax
              sub esp, 00000090h
              dec eax
              mov eax, dword ptr [0056B806h]
              call eax
              dec eax
              mov dword ptr [ebp-08h], eax
              mov ecx, 00000008h
              call 00007FB531412603h
              dec eax
              mov dword ptr [ebp-10h], eax
              mov edx, 00000028h
              mov ecx, 00000040h
              dec eax
              mov eax, dword ptr [0056B941h]
              call eax
              dec eax
              mov dword ptr [ebp-18h], eax
              dec eax
              mov eax, dword ptr [ebp-10h]
              inc ecx
              mov eax, 00000004h
              mov edx, 00000008h
              dec eax
              mov ecx, eax
              dec eax
              mov eax, dword ptr [0056B682h]
              call eax
              mov dword ptr [ebp-26h], 00000000h
              mov word ptr [ebp-22h], 0100h
              dec eax
              lea eax, dword ptr [ebp+00h]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x56c0000x2cf4.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5710000x4e8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4d60000x27948.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5720000x9f38.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x4bd9a00x28.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x402e500x403000deafb4fd12cde2c1b60860c86c787133unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x4040000x51200x5200e706e7a92dccbaef2b9fe1e975b26c2fFalse0.13724275914634146data2.1655766071634344IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x40a0000xcb0200xcb200d5be3237699f56612e4f798a600fe652False0.29029447115384616data5.093957452695144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .pdata0x4d60000x279480x27a00757379b8151dd98e75a12e66dd817d18False0.5116386533911672data6.275470632316642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xdata0x4fe0000x29fdc0x2a0000f438f4829e223726847696e9d64bc78False0.17568824404761904data4.694062618150425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .bss0x5280000x43c900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x56c0000x2cf40x2e00ea1eb029fff0efb3b71bb519b00ac913False0.2398947010869565data4.167456177867594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .CRT0x56f0000x680x200dc8f96afaaaa9a9fed2fff837af96d94False0.078125data0.40665232183492983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x5700000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x5710000x4e80x6007bb75ff0b08b50c6eac14449d8033074False0.333984375data4.7823913622889584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x5720000x9f380xa000d0cc4b10f9af6f3dfa642555d038f338False0.2810546875data5.446935941478724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /40x57c0000x23100x24000ab170630d5c1d65c2ba5fd2b0d70effFalse0.22916666666666666data2.4703200594587593IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /190x57f0000xc53c80xc5400f5df15a06dd374a96fc720b34eb0a7dcFalse0.2963638208967047data5.996197696654939IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /310x6450000xc32f0xc400e7a4f9dd50bb9932ce36da7e3ec8a189False0.23487324617346939data4.949123208937445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /450x6520000x19a3f0x19c002a79bc905498eac4acf836fd67a9f74bFalse0.4298202366504854data5.223030067952597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /570x66c0000x7dd80x7e00868dc9d2b12f48322b1c95a7d252c136False0.2058531746031746data4.586168864864171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /700x6740000x2bca0x2c0097f29411b63f8b434953d3282e700b41False0.2785866477272727data4.556736428924381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /810x6770000x6de40x6e00150ad6da94159883ba875b75f701a1bbFalse0.11502130681818182data5.043777069233123IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /970x67e0000x14aab0x14c00c0a706b5601bed235c043a076c82c150False0.5041650978915663data5.968165520201052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /1130x6930000x1b3c0x1c008e215c8a2e918815f7923dcc518f0095False0.5439453125data5.4694387933596875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_MANIFEST0x5710580x48fXML 1.0 document, ASCII text0.40102827763496146
              DLLImport
              KERNEL32.DLLAcquireSRWLockExclusive, AcquireSRWLockShared, AddVectoredExceptionHandler, CloseHandle, ConvertFiberToThread, ConvertThreadToFiberEx, CopyFileW, CreateDirectoryW, CreateEventA, CreateFiberEx, CreateFileW, CreateHardLinkW, CreateMutexW, CreateProcessW, CreateSemaphoreA, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, DeleteFileW, DuplicateHandle, EnterCriticalSection, FindClose, FindFirstFileW, FindFirstVolumeW, FindNextFileW, FindNextVolumeW, FindVolumeClose, FormatMessageA, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDiskFreeSpaceExW, GetDriveTypeW, GetEnvironmentVariableW, GetFileAttributesW, GetFileInformationByHandle, GetFileSizeEx, GetFileType, GetFullPathNameW, GetHandleInformation, GetLastError, GetLogicalDriveStringsW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExA, GetModuleHandleExW, GetModuleHandleW, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetProcessId, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetThreadContext, GetThreadPriority, GetTickCount64, GetVersion, GetVolumeInformationW, HeapAlloc, HeapFree, InitializeCriticalSection, InitializeSRWLock, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessorFeaturePresent, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalAlloc, LocalFree, MoveFileExW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, Process32NextW, RaiseException, ReadConsoleA, ReadConsoleW, ReleaseSRWLockExclusive, ReleaseSRWLockShared, ReleaseSemaphore, RemoveDirectoryW, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetConsoleMode, SetEndOfFile, SetEvent, SetFileAttributesW, SetFilePointer, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, SwitchToFiber, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteFile
              ADVAPI32.dllAddAccessDeniedAce, AllocateAndInitializeSid, CloseServiceHandle, ControlService, CryptAcquireContextW, CryptGenRandom, CryptReleaseContext, DeregisterEventSource, InitializeAcl, OpenSCManagerA, OpenServiceA, RegisterEventSourceW, ReportEventW, SetSecurityInfo
              msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _beginthreadex, _cexit, _close, _commode, _endthreadex, _errno, _exit, _fdopen, _fileno, _findclose, _fileno, _fmode, _fstat64, _get_osfhandle, _gmtime64, _initterm, _localtime64, _lock, _lseeki64, _onexit, _read, _setjmp, _setmode, _stat64, _strdup, _strdup, _strtoi64, _strtoui64, _telli64, _time64, _ultoa, _unlock, _vsnprintf, _vsnwprintf, _wchdir, _wchmod, _wfindfirst64, _wfindnext64, _wfopen, _wfullpath, _wgetcwd, _wmkdir, _wopen, _wremove, _wrename, _write, _wstat64, _wsystem, _wutime64, abort, atoi, calloc, clock, exit, fclose, feof, ferror, fflush, fgets, fopen, fprintf, fputc, fputs, fputwc, fread, free, fwprintf, fseek, ftell, fwrite, getc, getenv, isspace, iswctype, isxdigit, localeconv, longjmp, malloc, memchr, memcmp, memcpy, memmove, memset, printf, qsort, raise, rand, realloc, remove, setlocale, setvbuf, signal, sprintf, srand, strcat, strchr, strcmp, strcoll, strcpy, strcspn, strerror, strftime, strlen, strncmp, strncpy, strrchr, strspn, strstr, strtol, strtoul, strxfrm, tolower, towlower, towupper, ungetc, vfprintf, wcscat, wcscmp, wcscoll, wcscpy, wcsftime, wcslen, wcsncmp, wcsstr, wcstol, wcstombs, wcsxfrm
              PSAPI.DLLGetProcessImageFileNameW
              RstrtMgr.DLLRmEndSession, RmGetList, RmRegisterResources, RmShutdown, RmStartSession
              SHELL32.dllIsUserAnAdmin, StrStrIW
              USER32.dllGetProcessWindowStation, GetUserObjectInformationW, MessageBoxW, ShowWindow
              WS2_32.dllgethostbyaddr, getservbyname, getservbyport, htonl, htons, inet_addr, inet_ntoa
              WSOCK32.dllWSACleanup, WSAGetLastError, WSASetLastError, WSAStartup, accept, bind, closesocket, connect, gethostbyname, getsockname, getsockopt, ioctlsocket, listen, ntohs, recv, select, send, setsockopt, shutdown, socket
              No network behavior found
              050100s020406080100

              Click to jump to process

              Click to jump to process

              Click to jump to process

              Target ID:0
              Start time:03:06:26
              Start date:22/04/2025
              Path:C:\Users\user\Desktop\TDL7Z3zNPD.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\TDL7Z3zNPD.exe"
              Imagebase:0x7ff736c10000
              File size:9'222'026 bytes
              MD5 hash:CCB993B425257228BD48C0AAC20D5027
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_babuk, Description: Yara detected Babuk Ransomware, Source: 00000000.00000002.1258140495.00007FF73701A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: JoeSecurity_babuk, Description: Yara detected Babuk Ransomware, Source: 00000000.00000000.1255293811.00007FF73701A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:03:06:26
              Start date:22/04/2025
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7e2000000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Executed Functions

              Memory Dump Source
              • Source File: 00000000.00000002.1257777893.00007FF736C11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF736C10000, based on PE: true
              • Associated: 00000000.00000002.1257762604.00007FF736C10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258100747.00007FF737014000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258116783.00007FF737017000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258140495.00007FF73701A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258140495.00007FF7370E6000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258260538.00007FF737138000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258260538.00007FF73717C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258313766.00007FF737181000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1258328629.00007FF737182000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff736c10000_TDL7Z3zNPD.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62029f7336a4ffebe64bb295d99f96a3d4e7c5830f5f8ef33d88c4184fc1ddb1
              • Instruction ID: f9ec81799c4589530cd2582f643ca2a7eb7778a9837360c3953eb75891fdb6cf
              • Opcode Fuzzy Hash: 62029f7336a4ffebe64bb295d99f96a3d4e7c5830f5f8ef33d88c4184fc1ddb1
              • Instruction Fuzzy Hash: 0FB0126190C206E4F3003F05DC41358A660AF14781FD04031C40C17351CF3CB011A731