Overview
overview
10Static
static
10ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
7ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
1ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
1ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
9ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
5ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10Resubmissions
03-07-2024 22:59
240703-2yn7wszhlp 1003-07-2024 16:13
240703-tn93lsyglf 1003-07-2024 16:11
240703-tm84xsyfma 1010-05-2024 16:25
240510-tw1h5shh47 1024-08-2023 11:16
230824-nda8msdf8z 10Analysis
-
max time kernel
301s -
max time network
313s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-02-2021 11:43
Static task
static1
Behavioral task
behavioral24
Sample
Endermanch@NavaShield(1).exe
Resource
win10v20201028
General
-
Target
-
Size
239KB
-
MD5
2f8f6e90ca211d7ef5f6cf3c995a40e7
-
SHA1
f8940f280c81273b11a20d4bfb43715155f6e122
-
SHA256
1f5a26f24a2bfdd301008f0cc51a6c3762f41b926f974c814f1ecaa4cb28e5e6
-
SHA512
2b38475550edee5519e33bd18fea510ad73345a27c20f6457710498d34e3d0cf05b0f96f32d018e7dc154a6f2232ea7e3145fd0ed5fb498f9e4702a4be1bb9c8
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Executes dropped EXE 1 IoCs
pid Process 1176 8C1F.tmp -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\RequestRegister.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\WaitRestart.tiff rundll32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\8C1F.tmp rundll32.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1532 schtasks.exe 640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 200 rundll32.exe 200 rundll32.exe 200 rundll32.exe 200 rundll32.exe 1176 8C1F.tmp 1176 8C1F.tmp 1176 8C1F.tmp 1176 8C1F.tmp 1176 8C1F.tmp 1176 8C1F.tmp 200 rundll32.exe 200 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 200 rundll32.exe Token: SeDebugPrivilege 200 rundll32.exe Token: SeTcbPrivilege 200 rundll32.exe Token: SeDebugPrivilege 1176 8C1F.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3248 [email protected] -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3532 wrote to memory of 200 3532 rundll32.exe 79 PID 3532 wrote to memory of 200 3532 rundll32.exe 79 PID 3532 wrote to memory of 200 3532 rundll32.exe 79 PID 200 wrote to memory of 3692 200 rundll32.exe 80 PID 200 wrote to memory of 3692 200 rundll32.exe 80 PID 200 wrote to memory of 3692 200 rundll32.exe 80 PID 3692 wrote to memory of 1960 3692 cmd.exe 82 PID 3692 wrote to memory of 1960 3692 cmd.exe 82 PID 3692 wrote to memory of 1960 3692 cmd.exe 82 PID 200 wrote to memory of 2852 200 rundll32.exe 83 PID 200 wrote to memory of 2852 200 rundll32.exe 83 PID 200 wrote to memory of 2852 200 rundll32.exe 83 PID 200 wrote to memory of 1864 200 rundll32.exe 85 PID 200 wrote to memory of 1864 200 rundll32.exe 85 PID 200 wrote to memory of 1864 200 rundll32.exe 85 PID 200 wrote to memory of 1176 200 rundll32.exe 88 PID 200 wrote to memory of 1176 200 rundll32.exe 88 PID 2852 wrote to memory of 1532 2852 cmd.exe 87 PID 2852 wrote to memory of 1532 2852 cmd.exe 87 PID 2852 wrote to memory of 1532 2852 cmd.exe 87 PID 1864 wrote to memory of 640 1864 cmd.exe 90 PID 1864 wrote to memory of 640 1864 cmd.exe 90 PID 1864 wrote to memory of 640 1864 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Suspicious use of FindShellTrayWindow
PID:3248
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 151⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3508456074 && exit"3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3508456074 && exit"4⤵
- Creates scheduled task(s)
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 13:02:003⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 13:02:004⤵
- Creates scheduled task(s)
PID:640
-
-
-
C:\Windows\8C1F.tmp"C:\Windows\8C1F.tmp" \\.\pipe\{2F8DD38A-9176-4BFD-82CB-13E15DC514E4}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-