Overview
overview
10Static
static
10ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
7ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
1ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
1ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
9ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
5ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
ฺฺฺ�...ฺฺ
windows10_x64
10ฺฺฺ�...ฺฺ
windows10_x64
8ฺฺฺ�...ฺฺ
windows10_x64
10Resubmissions
03-07-2024 22:59
240703-2yn7wszhlp 1003-07-2024 16:13
240703-tn93lsyglf 1003-07-2024 16:11
240703-tm84xsyfma 1010-05-2024 16:25
240510-tw1h5shh47 1024-08-2023 11:16
230824-nda8msdf8z 10Analysis
-
max time kernel
306s -
max time network
311s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-02-2021 11:43
Static task
static1
Behavioral task
behavioral24
Sample
Endermanch@NavaShield(1).exe
Resource
win10v20201028
General
-
Target
-
Size
396KB
-
MD5
13f4b868603cf0dd6c32702d1bd858c9
-
SHA1
a595ab75e134f5616679be5f11deefdfaae1de15
-
SHA256
cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7
-
SHA512
e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Executes dropped EXE 4 IoCs
pid Process 2988 Free YouTube Downloader.exe 736 B094.tmp 2200 Box.exe 3260 Box.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ClosePing.tiff rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" [email protected] -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.ini [email protected] File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\B094.tmp rundll32.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe [email protected] File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe [email protected] File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe [email protected] -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe 1580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 64 rundll32.exe 64 rundll32.exe 64 rundll32.exe 64 rundll32.exe 736 B094.tmp 736 B094.tmp 736 B094.tmp 736 B094.tmp 736 B094.tmp 736 B094.tmp 64 rundll32.exe 64 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 64 rundll32.exe Token: SeDebugPrivilege 64 rundll32.exe Token: SeTcbPrivilege 64 rundll32.exe Token: SeDebugPrivilege 736 B094.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 Free YouTube Downloader.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2988 Free YouTube Downloader.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3636 wrote to memory of 2988 3636 [email protected] 75 PID 3636 wrote to memory of 2988 3636 [email protected] 75 PID 3392 wrote to memory of 64 3392 rundll32.exe 81 PID 3392 wrote to memory of 64 3392 rundll32.exe 81 PID 3392 wrote to memory of 64 3392 rundll32.exe 81 PID 64 wrote to memory of 2072 64 rundll32.exe 82 PID 64 wrote to memory of 2072 64 rundll32.exe 82 PID 64 wrote to memory of 2072 64 rundll32.exe 82 PID 2072 wrote to memory of 3812 2072 cmd.exe 84 PID 2072 wrote to memory of 3812 2072 cmd.exe 84 PID 2072 wrote to memory of 3812 2072 cmd.exe 84 PID 64 wrote to memory of 2568 64 rundll32.exe 85 PID 64 wrote to memory of 2568 64 rundll32.exe 85 PID 64 wrote to memory of 2568 64 rundll32.exe 85 PID 64 wrote to memory of 3972 64 rundll32.exe 87 PID 64 wrote to memory of 3972 64 rundll32.exe 87 PID 64 wrote to memory of 3972 64 rundll32.exe 87 PID 64 wrote to memory of 736 64 rundll32.exe 90 PID 64 wrote to memory of 736 64 rundll32.exe 90 PID 2568 wrote to memory of 3596 2568 cmd.exe 88 PID 2568 wrote to memory of 3596 2568 cmd.exe 88 PID 2568 wrote to memory of 3596 2568 cmd.exe 88 PID 3972 wrote to memory of 1580 3972 cmd.exe 92 PID 3972 wrote to memory of 1580 3972 cmd.exe 92 PID 3972 wrote to memory of 1580 3972 cmd.exe 92 PID 2988 wrote to memory of 2200 2988 Free YouTube Downloader.exe 94 PID 2988 wrote to memory of 2200 2988 Free YouTube Downloader.exe 94 PID 2988 wrote to memory of 2200 2988 Free YouTube Downloader.exe 94 PID 2988 wrote to memory of 3260 2988 Free YouTube Downloader.exe 95 PID 2988 wrote to memory of 3260 2988 Free YouTube Downloader.exe 95 PID 2988 wrote to memory of 3260 2988 Free YouTube Downloader.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"3⤵
- Executes dropped EXE
PID:2200
-
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"3⤵
- Executes dropped EXE
PID:3260
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 151⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:3812
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 4042766786 && exit"3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 4042766786 && exit"4⤵
- Creates scheduled task(s)
PID:3596
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 13:01:003⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 13:01:004⤵
- Creates scheduled task(s)
PID:1580
-
-
-
C:\Windows\B094.tmp"C:\Windows\B094.tmp" \\.\pipe\{52CE986F-4B10-49EF-9E03-4BC3E341382A}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-