Edit tour

Windows Analysis Report
H6VMxCA4Pn.exe

Overview

General Information

Sample name:H6VMxCA4Pn.exe
renamed because original name is a hash value
Original sample name:871b245bd87dbb3ed064e9e42522dcb7dee8d80b9463f8ee4bcf9da184dd5e87.exe
Analysis ID:1675331
MD5:466a8e120c75770ecbc0c73f0439d304
SHA1:fd7a5b83989667fca0a7e8c39ea46f0fbafc4bd3
SHA256:871b245bd87dbb3ed064e9e42522dcb7dee8d80b9463f8ee4bcf9da184dd5e87
Tags:cactusexeransomwareuser-TheRavenFile
Infos:

Detection

Babuk
Score:64
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Babuk Ransomware
Deletes shadow drive data (may be related to ransomware)
Found Tor onion address
May use bcdedit to modify the Windows boot settings
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • H6VMxCA4Pn.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\H6VMxCA4Pn.exe" MD5: 466A8E120C75770ECBC0C73F0439D304)
    • conhost.exe (PID: 7360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
BabukBabuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000000.1184264498.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_babukYara detected Babuk RansomwareJoe Security
    00000000.00000002.1188360968.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_babukYara detected Babuk RansomwareJoe Security
      Process Memory Space: H6VMxCA4Pn.exe PID: 7352JoeSecurity_babukYara detected Babuk RansomwareJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.H6VMxCA4Pn.exe.7ff6f3150000.0.unpackJoeSecurity_babukYara detected Babuk RansomwareJoe Security
          0.0.H6VMxCA4Pn.exe.7ff6f3150000.0.unpackJoeSecurity_babukYara detected Babuk RansomwareJoe Security
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: H6VMxCA4Pn.exeVirustotal: Detection: 65%Perma Link
            Source: H6VMxCA4Pn.exeReversingLabs: Detection: 69%
            Source: H6VMxCA4Pn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

            Networking

            barindex
            Source: H6VMxCA4Pn.exeString found in binary or memory: http://webmail.4y5hmtskokip55m2pkeyxvyjemsll5svbv7h5z6iwti4eszb6qw5skqd.onion
            Source: H6VMxCA4Pn.exeString found in binary or memory: http://sonarmsng5vzwqezlvtu2iiwwdn3dxkhotftikhowpfjuzg7p3ca5eid.onion/contact/Cactus_Support
            Source: H6VMxCA4Pn.exe, 00000000.00000000.1184264498.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Do not interrupt the encryption process, don't stop or reboot your machines until the encryption is complete. Otherwise the data may be corrupted.In addition to the encrypted infrastructure, we have downloaded a lot of confidential information from your systems. The publication of these documents may cause the termination of your commercial activities, contracts with your clients and partners, and multiple lawsuits.If you ignore this warning and do not contact us, your sensitive data will be posted on our blog: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In your best interest is to avoid contacting law enforcement and data recovery companies. They can't help you with the recovery, will cause more problems and expenses, and delay the return to normal work significantly.Besides, if you contact the police we will immediately publish your data.We offer the best solution to the problem, to receive our decryption software and prevent disclosure of your sensitive information contact us directly.A quick recovery is very important to keep your business running at full capacity and minimize losses. This is why you need to begin negotiations as soon as possible. By the way, if you don't contact us within 5 days, we will start publishing your data.
            Source: H6VMxCA4Pn.exeString found in binary or memory: Do not interrupt the encryption process, don't stop or reboot your machines until the encryption is complete. Otherwise the data may be corrupted.In addition to the encrypted infrastructure, we have downloaded a lot of confidential information from your systems. The publication of these documents may cause the termination of your commercial activities, contracts with your clients and partners, and multiple lawsuits.If you ignore this warning and do not contact us, your sensitive data will be posted on our blog: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In your best interest is to avoid contacting law enforcement and data recovery companies. They can't help you with the recovery, will cause more problems and expenses, and delay the return to normal work significantly.Besides, if you contact the police we will immediately publish your data.We offer the best solution to the problem, to receive our decryption software and prevent disclosure of your sensitive information contact us directly.A quick recovery is very important to keep your business running at full capacity and minimize losses. This is why you need to begin negotiations as soon as possible. By the way, if you don't contact us within 5 days, we will start publishing your data.
            Source: H6VMxCA4Pn.exeString found in binary or memory: http://sonarmsng5vzwqezlvtu2iiwwdn3dxkhotftikhowpfjuzg7p3ca5eid.onion/contact/Cactus_Support
            Source: H6VMxCA4Pn.exeString found in binary or memory: http://webmail.4y5hmtskokip55m2pkeyxvyjemsll5svbv7h5z6iwti4eszb6qw5skqd.onion
            Source: H6VMxCA4Pn.exeString found in binary or memory: https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In
            Source: H6VMxCA4Pn.exeString found in binary or memory: https://www.torproject.org/download)

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: Yara matchFile source: 0.2.H6VMxCA4Pn.exe.7ff6f3150000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.H6VMxCA4Pn.exe.7ff6f3150000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1184264498.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1188360968.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: H6VMxCA4Pn.exe PID: 7352, type: MEMORYSTR
            Source: H6VMxCA4Pn.exeBinary or memory string: vssadmin delete shadows /all /quiet
            Source: H6VMxCA4Pn.exe, 00000000.00000000.1184264498.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: %d.%m.%Y %XC:\ProgramData\critical.logsteam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrmssqlfdlaunchermssqlserversqlserveragentmssqlserverolapservicessastelemetrysqlbrowsersqltelemetrysqlpbdmssqlpbenginesqlwritervssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled noIPC$ADMIN$basic_string: construction from null is not valid
            Source: H6VMxCA4Pn.exeBinary or memory string: %d.%m.%Y %XC:\ProgramData\critical.logsteam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrmssqlfdlaunchermssqlserversqlserveragentmssqlserverolapservicessastelemetrysqlbrowsersqltelemetrysqlpbdmssqlpbenginesqlwritervssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled noIPC$ADMIN$basic_string: construction from null is not valid
            Source: H6VMxCA4Pn.exeStatic PE information: Number of sections : 20 > 10
            Source: classification engineClassification label: mal64.rans.evad.winEXE@2/0@0/0
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7360:120:WilError_03
            Source: H6VMxCA4Pn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: H6VMxCA4Pn.exeVirustotal: Detection: 65%
            Source: H6VMxCA4Pn.exeReversingLabs: Detection: 69%
            Source: H6VMxCA4Pn.exeString found in binary or memory: set-addPolicy
            Source: H6VMxCA4Pn.exeString found in binary or memory: id-cmc-addExtensions
            Source: H6VMxCA4Pn.exeString found in binary or memory: id-cmc-addExtensions
            Source: H6VMxCA4Pn.exeString found in binary or memory: set-addPolicy
            Source: unknownProcess created: C:\Users\user\Desktop\H6VMxCA4Pn.exe "C:\Users\user\Desktop\H6VMxCA4Pn.exe"
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeSection loaded: ntmarta.dllJump to behavior
            Source: H6VMxCA4Pn.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: H6VMxCA4Pn.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: H6VMxCA4Pn.exeStatic file information: File size 9301424 > 1048576
            Source: H6VMxCA4Pn.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x405200
            Source: H6VMxCA4Pn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Source: H6VMxCA4Pn.exeStatic PE information: section name: .xdata
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /4
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /19
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /31
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /45
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /57
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /70
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /81
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /97
            Source: H6VMxCA4Pn.exeStatic PE information: section name: /113
            Source: H6VMxCA4Pn.exeBinary or memory string: %d.%m.%Y %XC:\ProgramData\critical.logsteam.exethebat.exemsftesql.exesqlagent.exesqlbrowser.exesqlwriter.exeoracle.exeocssd.exedbsnmp.exesynctime.exexfssvccon.exesqlservr.exemydesktopservice.exeocautoupds.exeagntsvc.exeencsvc.exefirefoxconfig.exetbirdconfig.exemydesktopqos.exeocomm.exemysqld.exemysqld-nt.exemysqld-opt.exedbeng5o.exesqbcoreservice.exeexcel.exeinfopath.exemsaccess.exemspub.exeonenote.exeoutlook.exepowerpnt.exethunderbird.exevisio.exewinword.exewordpad.exesql.exeagntsvc.exeisqlplussvc.exeencsvc.exefirefox.exedbeng50.exenotepad.exephonesvcveeammemtassqlbackupvsssophossvc$mepocsmsexchangegxvssgxblrgxfwdgxcvdgxcimgrmssqlfdlaunchermssqlserversqlserveragentmssqlserverolapservicessastelemetrysqlbrowsersqltelemetrysqlpbdmssqlpbenginesqlwritervssadmin delete shadows /all /quietC:\Windows\System32\vssadmin.exeWMIC shadowcopy deleteC:\Windows\System32\wbem\WMIC.exebcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\bcdedit.exebcdedit /set {default} recoveryenabled noIPC$ADMIN$basic_string: construction from null is not valid
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: H6VMxCA4Pn.exeBinary or memory string: spoolsv.exeexplorer.exesihost.exefontdrvhost.execmd.exedwm.exeLogonUI.exeSearchUI.exelsass.execsrss.exesmss.exewinlogon.exeservices.execonhost.exe$recycle.binsystem volume informationwindowstmptempthumbwinntwindows.~btwindows.oldperflogperflogsbootprogramdatapackagesefiwindowsappsmicrosoftgooglechromewindows defendermicrosoft sharedinternet explorertor browservmware toolsctslckwindows defender advanced threat protectionwindows photo viewercommon filesmicrosoft.netwindows media playerwindows ntwindowspowershellusoprivateusosharedpackage cacheexedlllnksysmsibatc:C:\\.txt._-Information.readme.txtpagefile.sysdesktop.inicritical.logupdate.logntuser.datntuser.log7\\?\\\\\?\UNC\\rn.batbasic_string: construction from null is not validZDKdFHsIMgOf
            Source: H6VMxCA4Pn.exeBinary or memory string: vmware tools
            Source: C:\Users\user\Desktop\H6VMxCA4Pn.exeProcess information queried: ProcessInformationJump to behavior
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Bootkit
            1
            Process Injection
            1
            Bootkit
            OS Credential Dumping1
            Security Software Discovery
            Remote ServicesData from Local System1
            Proxy
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Process Injection
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            File Deletion
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1675331 Sample: H6VMxCA4Pn.exe Startdate: 27/04/2025 Architecture: WINDOWS Score: 64 11 Multi AV Scanner detection for submitted file 2->11 13 Yara detected Babuk Ransomware 2->13 15 Found Tor onion address 2->15 17 Deletes shadow drive data (may be related to ransomware) 2->17 6 H6VMxCA4Pn.exe 1 2->6         started        process3 signatures4 19 Found Tor onion address 6->19 21 Deletes shadow drive data (may be related to ransomware) 6->21 9 conhost.exe 6->9         started        process5

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            H6VMxCA4Pn.exe65%VirustotalBrowse
            H6VMxCA4Pn.exe69%ReversingLabsWin64.Ransomware.Kaktos
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://webmail.4y5hmtskokip55m2pkeyxvyjemsll5svbv7h5z6iwti4eszb6qw5skqd.onion0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://sonarmsng5vzwqezlvtu2iiwwdn3dxkhotftikhowpfjuzg7p3ca5eid.onion/contact/Cactus_SupportH6VMxCA4Pn.exefalse
              high
              https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/InH6VMxCA4Pn.exefalse
                high
                https://www.torproject.org/download)H6VMxCA4Pn.exefalse
                  high
                  http://webmail.4y5hmtskokip55m2pkeyxvyjemsll5svbv7h5z6iwti4eszb6qw5skqd.onionH6VMxCA4Pn.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1675331
                  Start date and time:2025-04-27 05:37:16 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 19s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:11
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:H6VMxCA4Pn.exe
                  renamed because original name is a hash value
                  Original Sample Name:871b245bd87dbb3ed064e9e42522dcb7dee8d80b9463f8ee4bcf9da184dd5e87.exe
                  Detection:MAL
                  Classification:mal64.rans.evad.winEXE@2/0@0/0
                  EGA Information:Failed
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 184.29.183.29, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target H6VMxCA4Pn.exe, PID 7352 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32+ executable (console) x86-64, for MS Windows
                  Entropy (8bit):6.417471372544136
                  TrID:
                  • Win64 Executable Console (202006/5) 92.65%
                  • Win64 Executable (generic) (12005/4) 5.51%
                  • Generic Win/DOS Executable (2004/3) 0.92%
                  • DOS Executable Generic (2002/1) 0.92%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:H6VMxCA4Pn.exe
                  File size:9'301'424 bytes
                  MD5:466a8e120c75770ecbc0c73f0439d304
                  SHA1:fd7a5b83989667fca0a7e8c39ea46f0fbafc4bd3
                  SHA256:871b245bd87dbb3ed064e9e42522dcb7dee8d80b9463f8ee4bcf9da184dd5e87
                  SHA512:ebbe62fb8fabc044ed6c6d5ec42a4766d891eff64eb7b67d11e02411eaddc07653d48b41e157e858ea41ee020d78421fc4c06f0c8235df68bbab6d1c93571fae
                  SSDEEP:98304:n+FfIxhQ8w+eR3P6R+mze17zynFVyMWMpMeXyoNdtOUHF345hnMXWcegplh:gEiP6RtqNaMeiqdtOUH9
                  TLSH:BF964B5365AB0CE9DDD667B492C76336A734FD218A792F3F6604C6302D13AC06E6BB10
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g..e.&.....&....(.R@..VS..>.............@..............................j...........`... ............................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x1400013f0
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows cui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x67A31B93 [Wed Feb 5 08:04:35 2025 UTC]
                  TLS Callbacks:0x4032d4e0, 0x1, 0x4032d4b0, 0x1, 0x40341a90, 0x1
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:48804626b2034b9fcb4423433f85c971
                  Instruction
                  dec eax
                  sub esp, 28h
                  dec eax
                  mov eax, dword ptr [004C1B95h]
                  mov dword ptr [eax], 00000000h
                  call 00007FA4B0B13CBFh
                  nop
                  nop
                  dec eax
                  add esp, 28h
                  ret
                  nop dword ptr [eax]
                  dec eax
                  sub esp, 28h
                  call 00007FA4B0E517A4h
                  dec eax
                  cmp eax, 01h
                  sbb eax, eax
                  dec eax
                  add esp, 28h
                  ret
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  dec eax
                  lea ecx, dword ptr [00000009h]
                  jmp 00007FA4B0B13F19h
                  nop dword ptr [eax+00h]
                  ret
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  push ebp
                  dec eax
                  mov ebp, esp
                  dec eax
                  add esp, FFFFFF80h
                  mov ecx, 00000008h
                  call 00007FA4B0E51913h
                  dec eax
                  mov dword ptr [ebp-08h], eax
                  dec eax
                  mov eax, dword ptr [ebp-08h]
                  inc ecx
                  mov eax, 00000004h
                  mov edx, 00000008h
                  dec eax
                  mov ecx, eax
                  dec eax
                  mov eax, dword ptr [0056F6B1h]
                  call eax
                  mov dword ptr [ebp-1Eh], 00000000h
                  mov word ptr [ebp-1Ah], 0100h
                  dec eax
                  lea eax, dword ptr [ebp-1Eh]
                  dec eax
                  lea edx, dword ptr [ebp-18h]
                  dec eax
                  mov dword ptr [esp+50h], edx
                  mov dword ptr [esp+48h], 00000000h
                  mov dword ptr [esp+40h], 00000000h
                  mov dword ptr [esp+38h], 00000000h
                  mov dword ptr [esp+30h], 00000000h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5700000x2d20.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5750000x4e8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4d90000x27abc.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5760000x9f84.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x4c10a00x28.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x4051f00x405200440705eff85c3bda8bfc14157e75fbf4unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x4070000x51e00x520073af51cc3739f2c3f0dfb50ea58aade1False0.13943407012195122data2.2188756964962106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rdata0x40d0000xcb7000xcb80011254cdcf40a54b2e9532121127f2449False0.2905381411240786data5.089672235716194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .pdata0x4d90000x27abc0x27c00f1c14e7c1264031e90ca35d34d40f739False0.5108404579402516data6.265608697581868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .xdata0x5010000x2a4ec0x2a600a5b318a574255623eee27921d197f01fFalse0.17778046644542772data4.679106316051192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .bss0x52c0000x43d900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .idata0x5700000x2d200x2e0045eca9c5745836ab6bf5c8a728ac0ff8False0.24150815217391305data4.019757774332753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .CRT0x5730000x680x2001e7a582f0adf512a237e416b59bf7320False0.078125data0.41055857183492983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .tls0x5740000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x5750000x4e80x600030ae0ffd84f4d5fb35bebea560e68c7False0.3333333333333333data4.780597815738071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .reloc0x5760000x9f840xa00027bfddca032fa717ae92280a0c5ee036False0.2821044921875data5.451010052213658IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /40x5800000x24800x26004d4328f90a39c6229ef29c32e68ede66False0.2235814144736842data2.4302295398813785IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /190x5830000xd13a20xd140053e5847e2c6e27bdae10bda4247dd7d1False0.29473636312724016data5.990824587660499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /310x6550000xc67f0xc8007e215954acbf12192f47b807559b13adFalse0.23375data4.948696830329289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /450x6620000x1b0de0x1b20056ac9802930ed2e2265816dbe76e5de8False0.4290214573732719data5.240525868884352IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /570x67e0000x84500x860099688471e59c08db44c95d893b76c6d2False0.20157999067164178data4.562752306631266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /700x6870000x30280x32007bae741bf9ee07263757d3e91680566cFalse0.254921875data4.510426403615046IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /810x68b0000x6e430x7000cc1d7c67863cde6f3c8504ca31b9d1a3False0.11324637276785714data5.017648937189938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /970x6920000x14aab0x14c006423425a63adf7c25c5e1397587b3fd5False0.5042239269578314data5.968226727632548IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  /1130x6a70000x1cd10x1e00974a80b66ebfffcfddb96a0ec9719d50False0.5291666666666667data5.381567916499713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_MANIFEST0x5750580x48fXML 1.0 document, ASCII text0.40102827763496146
                  DLLImport
                  KERNEL32.DLLAcquireSRWLockExclusive, AcquireSRWLockShared, AddVectoredExceptionHandler, CloseHandle, ConvertFiberToThread, ConvertThreadToFiberEx, CopyFileW, CreateDirectoryW, CreateEventA, CreateFiberEx, CreateFileW, CreateHardLinkW, CreateProcessW, CreateSemaphoreA, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, DeleteFileW, DuplicateHandle, EnterCriticalSection, FindClose, FindFirstFileW, FindFirstVolumeW, FindNextFileW, FindNextVolumeW, FindVolumeClose, FormatMessageA, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDiskFreeSpaceExW, GetDriveTypeW, GetEnvironmentVariableW, GetFileAttributesW, GetFileInformationByHandle, GetFileSizeEx, GetFileType, GetFullPathNameW, GetHandleInformation, GetLastError, GetLogicalDriveStringsW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExA, GetModuleHandleExW, GetModuleHandleW, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetProcessId, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetThreadContext, GetThreadPriority, GetTickCount64, GetVersion, GetVolumeInformationW, HeapAlloc, HeapFree, InitializeCriticalSection, InitializeSRWLock, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessorFeaturePresent, K32GetProcessImageFileNameW, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, MoveFileExW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, Process32NextW, RaiseException, ReadConsoleA, ReadConsoleW, ReleaseSRWLockExclusive, ReleaseSRWLockShared, ReleaseSemaphore, RemoveDirectoryW, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetConsoleMode, SetEndOfFile, SetEvent, SetFileAttributesW, SetFilePointer, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, SwitchToFiber, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteFile
                  ADVAPI32.dllAddAccessDeniedAce, AllocateAndInitializeSid, CloseServiceHandle, ControlService, CryptAcquireContextW, CryptGenRandom, CryptReleaseContext, DeregisterEventSource, InitializeAcl, OpenSCManagerA, OpenServiceA, RegisterEventSourceW, ReportEventW, SetSecurityInfo
                  msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _beginthreadex, _cexit, _close, _commode, _endthreadex, _errno, _exit, _fdopen, _fileno, _findclose, _fileno, _fmode, _fstat64, _get_osfhandle, _gmtime64, _initterm, _localtime64, _lock, _lseeki64, _onexit, _read, _setjmp, _setmode, _stat64, _strdup, _strdup, _strtoi64, _strtoui64, _telli64, _time64, _ultoa, _unlock, _vsnprintf, _vsnwprintf, _wchdir, _wchmod, _wfindfirst64, _wfindnext64, _wfopen, _wfullpath, _wgetcwd, _wmkdir, _wopen, _wremove, _wrename, _write, _wstat64, _wsystem, _wutime64, abort, atoi, calloc, clock, exit, fclose, feof, ferror, fflush, fgets, fopen, fprintf, fputc, fputs, fputwc, fread, free, fwprintf, fseek, ftell, fwrite, getc, getenv, isspace, iswctype, isxdigit, localeconv, longjmp, malloc, memchr, memcmp, memcpy, memmove, memset, printf, qsort, raise, rand, realloc, remove, setlocale, setvbuf, signal, sprintf, srand, strcat, strchr, strcmp, strcoll, strcpy, strcspn, strerror, strftime, strlen, strncmp, strncpy, strrchr, strspn, strstr, strtol, strtoul, strxfrm, tolower, towlower, towupper, ungetc, vfprintf, wcscat, wcscmp, wcscoll, wcscpy, wcsftime, wcslen, wcsncmp, wcsstr, wcstol, wcstombs, wcsxfrm
                  NETAPI32.dllNetApiBufferFree, NetShareDel, NetShareEnum
                  RstrtMgr.DLLRmEndSession, RmGetList, RmRegisterResources, RmShutdown, RmStartSession
                  SHELL32.dllIsUserAnAdmin, StrStrIW
                  USER32.dllGetProcessWindowStation, GetUserObjectInformationW, MessageBoxW, ShowWindow
                  WS2_32.dllgethostbyaddr, getservbyname, getservbyport, htonl, htons, inet_addr, inet_ntoa
                  WSOCK32.dllWSACleanup, WSAGetLastError, WSASetLastError, WSAStartup, accept, bind, closesocket, connect, gethostbyname, getsockname, getsockopt, ioctlsocket, listen, ntohs, recv, select, send, setsockopt, shutdown, socket
                  No network behavior found
                  050100s020406080100

                  Click to jump to process

                  Click to jump to process

                  Click to jump to process

                  Target ID:0
                  Start time:23:38:14
                  Start date:26/04/2025
                  Path:C:\Users\user\Desktop\H6VMxCA4Pn.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\H6VMxCA4Pn.exe"
                  Imagebase:0x7ff6f3150000
                  File size:9'301'424 bytes
                  MD5 hash:466A8E120C75770ECBC0C73F0439D304
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_babuk, Description: Yara detected Babuk Ransomware, Source: 00000000.00000000.1184264498.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_babuk, Description: Yara detected Babuk Ransomware, Source: 00000000.00000002.1188360968.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:23:38:14
                  Start date:26/04/2025
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff62fc20000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Executed Functions

                  Memory Dump Source
                  • Source File: 00000000.00000002.1188069066.00007FF6F3151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6F3150000, based on PE: true
                  • Associated: 00000000.00000002.1188054911.00007FF6F3150000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188300801.00007FF6F3557000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188317536.00007FF6F3558000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188331180.00007FF6F355A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188347420.00007FF6F355B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188360968.00007FF6F355D000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188435842.00007FF6F367C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188435842.00007FF6F36C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188491498.00007FF6F36C5000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188504411.00007FF6F36C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1188504411.00007FF6F37DB000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff6f3150000_H6VMxCA4Pn.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7b759f3f5ec11b98a7795379ba3916615fb85d5804f5df92d5a943883ac572a7
                  • Instruction ID: 5d7c9d3318e78ae079ad32ca680b58d8385dde306f32fd19d19e667027105118
                  • Opcode Fuzzy Hash: 7b759f3f5ec11b98a7795379ba3916615fb85d5804f5df92d5a943883ac572a7
                  • Instruction Fuzzy Hash: 13B01230D0820598FB417F25D88331C32206B04B45F404030D82C6B3D5DF3C50104710