Resubmissions

24-08-2023 11:16

230824-nda8msdf8z 10

05-08-2023 22:52

230805-2tn2bsfa82 10

24-07-2023 06:25

230724-g6s6laag35 10

22-07-2023 15:57

230722-tee6wabg5w 10

20-07-2023 23:19

230720-3bb5gsbf5v 10

20-07-2023 23:06

230720-23f23sba63 10

03-02-2021 11:43

210203-6bgge2nfan 10

22-11-2020 06:42

201122-6x1at779dj 10

Analysis

  • max time kernel
    927s
  • max time network
    795s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-11-2020 06:42

Errors

Reason
Machine shutdown

General

  • Target

    Endermanch@CleanThis.exe

  • Size

    618KB

  • MD5

    a50fc0da1d2b3c4aa8a6adaccf69a5de

  • SHA1

    e001f4043ab4be644ea10e0d65303d6e57b31ffe

  • SHA256

    cf6eb8377789e316629c0396a2dbb53c69b5fd67bbd0e7163b8d305aaa756e90

  • SHA512

    4bbc7676391ed4085f628d1f4e1f0af16f5cd6fd9efb8c61176bccdb6ee03b06896c6ddfba9fcf363b133ade3a8a1b8cd17ef92d8eb9adeec247f9bd41dbec2b

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Deletes NTFS Change Journal 2 TTPs

    The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Clears Windows event logs 1 TTPs
  • Blacklisted process makes network request 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14742 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Endermanch@CleanThis.exe
    "C:\Users\Admin\AppData\Local\Temp\Endermanch@CleanThis.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4708
  • C:\Windows\SysWOW64\rundll32.exe
    C:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 15
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
      2⤵
      • Blacklisted process makes network request
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Windows\SysWOW64\cmd.exe
        /c schtasks /Delete /F /TN rhaegal
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Delete /F /TN rhaegal
          4⤵
            PID:3280
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3587941686 && exit"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:536
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3587941686 && exit"
            4⤵
            • Creates scheduled task(s)
            PID:648
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 06:59:00
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 06:59:00
            4⤵
            • Creates scheduled task(s)
            PID:1376
        • C:\Windows\DB04.tmp
          "C:\Windows\DB04.tmp" \\.\pipe\{DD5C21E4-8A05-4C54-ADE7-6DBAF41D3B8F}
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:968
        • C:\Windows\SysWOW64\cmd.exe
          /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Windows\SysWOW64\wevtutil.exe
            wevtutil cl Setup
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4532
          • C:\Windows\SysWOW64\wevtutil.exe
            wevtutil cl System
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3928
          • C:\Windows\SysWOW64\wevtutil.exe
            wevtutil cl Security
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3788
          • C:\Windows\SysWOW64\wevtutil.exe
            wevtutil cl Application
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2688
          • C:\Windows\SysWOW64\fsutil.exe
            fsutil usn deletejournal /D C:
            4⤵
              PID:2696
          • C:\Windows\SysWOW64\cmd.exe
            /c schtasks /Delete /F /TN drogon
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4648
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Delete /F /TN drogon
              4⤵
                PID:2884
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0 /state0:0xa3ad2855 /state1:0x41c64e6d
          1⤵
          • Modifies WinLogon to allow AutoLogon
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:4372

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Winlogon Helper DLL

        2
        T1004

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        2
        T1112

        Indicator Removal on Host

        1
        T1070

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Impact

        Inhibit System Recovery

        1
        T1490

        Data Destruction

        1
        T1485

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\DB04.tmp
          MD5

          347ac3b6b791054de3e5720a7144a977

          SHA1

          413eba3973a15c1a6429d9f170f3e8287f98c21c

          SHA256

          301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

          SHA512

          9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

        • C:\Windows\DB04.tmp
          MD5

          347ac3b6b791054de3e5720a7144a977

          SHA1

          413eba3973a15c1a6429d9f170f3e8287f98c21c

          SHA256

          301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

          SHA512

          9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

        • memory/536-4-0x0000000000000000-mapping.dmp
        • memory/648-5-0x0000000000000000-mapping.dmp
        • memory/808-6-0x0000000000000000-mapping.dmp
        • memory/968-7-0x0000000000000000-mapping.dmp
        • memory/1376-10-0x0000000000000000-mapping.dmp
        • memory/1864-2-0x0000000000000000-mapping.dmp
        • memory/2688-15-0x0000000000000000-mapping.dmp
        • memory/2696-16-0x0000000000000000-mapping.dmp
        • memory/2884-18-0x0000000000000000-mapping.dmp
        • memory/2944-11-0x0000000000000000-mapping.dmp
        • memory/3280-3-0x0000000000000000-mapping.dmp
        • memory/3788-14-0x0000000000000000-mapping.dmp
        • memory/3928-13-0x0000000000000000-mapping.dmp
        • memory/4244-1-0x0000000003480000-0x00000000034E8000-memory.dmp
          Filesize

          416KB

        • memory/4244-0-0x0000000000000000-mapping.dmp
        • memory/4532-12-0x0000000000000000-mapping.dmp
        • memory/4648-17-0x0000000000000000-mapping.dmp