Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 14:42
Static task
static1
Behavioral task
behavioral1
Sample
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe
Resource
win10v20210410
General
-
Target
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe
-
Size
788KB
-
MD5
bf7a7748c4499a6d44c688ba37896a53
-
SHA1
45c68363fdb2eeae08c827307206f6f9fe7bf944
-
SHA256
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095
-
SHA512
60089da79f1b8e72ce6e0ebcfc9fac7e3b1b82cc49b64be89556b4c89b4b117db95c158eb6126be2a3291a22cca5640ffe5f4710f0a3fab42ac40d8151ec4602
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Executes dropped EXE 1 IoCs
pid Process 3568 FCE4.tmp -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\GrantSplit.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\RedoRemove.tiff rundll32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\FCE4.tmp rundll32.exe File opened for modification C:\Windows\infpub.dat rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1292 1824 WerFault.exe 59 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3572 schtasks.exe 2288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 1908 rundll32.exe 3568 FCE4.tmp 3568 FCE4.tmp 3568 FCE4.tmp 3568 FCE4.tmp 3568 FCE4.tmp 3568 FCE4.tmp 1908 rundll32.exe 1908 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 1292 WerFault.exe Token: SeBackupPrivilege 1292 WerFault.exe Token: SeDebugPrivilege 1292 WerFault.exe Token: SeShutdownPrivilege 1908 rundll32.exe Token: SeDebugPrivilege 1908 rundll32.exe Token: SeTcbPrivilege 1908 rundll32.exe Token: SeDebugPrivilege 3568 FCE4.tmp -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4012 wrote to memory of 1908 4012 rundll32.exe 82 PID 4012 wrote to memory of 1908 4012 rundll32.exe 82 PID 4012 wrote to memory of 1908 4012 rundll32.exe 82 PID 1908 wrote to memory of 3624 1908 rundll32.exe 83 PID 1908 wrote to memory of 3624 1908 rundll32.exe 83 PID 1908 wrote to memory of 3624 1908 rundll32.exe 83 PID 3624 wrote to memory of 2100 3624 cmd.exe 85 PID 3624 wrote to memory of 2100 3624 cmd.exe 85 PID 3624 wrote to memory of 2100 3624 cmd.exe 85 PID 1908 wrote to memory of 3856 1908 rundll32.exe 86 PID 1908 wrote to memory of 3856 1908 rundll32.exe 86 PID 1908 wrote to memory of 3856 1908 rundll32.exe 86 PID 3856 wrote to memory of 2288 3856 cmd.exe 88 PID 3856 wrote to memory of 2288 3856 cmd.exe 88 PID 3856 wrote to memory of 2288 3856 cmd.exe 88 PID 1908 wrote to memory of 2360 1908 rundll32.exe 89 PID 1908 wrote to memory of 2360 1908 rundll32.exe 89 PID 1908 wrote to memory of 2360 1908 rundll32.exe 89 PID 1908 wrote to memory of 3568 1908 rundll32.exe 91 PID 1908 wrote to memory of 3568 1908 rundll32.exe 91 PID 2360 wrote to memory of 3572 2360 cmd.exe 93 PID 2360 wrote to memory of 3572 2360 cmd.exe 93 PID 2360 wrote to memory of 3572 2360 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe"C:\Users\Admin\AppData\Local\Temp\d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe"1⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 5882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 151⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 922500635 && exit"3⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 922500635 && exit"4⤵
- Creates scheduled task(s)
PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:42:003⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:42:004⤵
- Creates scheduled task(s)
PID:3572
-
-
-
C:\Windows\FCE4.tmp"C:\Windows\FCE4.tmp" \\.\pipe\{2F0B4EA3-4146-4F83-BBE0-5A9FD4B589A6}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-