Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 14:42
Static task
static1
Behavioral task
behavioral1
Sample
f05758c648da3f68d5d6bd44eff1f87808cd768103038d65230bc517a9d1dedb.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
f05758c648da3f68d5d6bd44eff1f87808cd768103038d65230bc517a9d1dedb.exe
Resource
win10v20210410
General
-
Target
f05758c648da3f68d5d6bd44eff1f87808cd768103038d65230bc517a9d1dedb.exe
-
Size
24KB
-
MD5
91516a89dfd2a50be40e012fc3a8e7e1
-
SHA1
b4be2d16df6a504ff19b2708c02ac8f10d0c75c4
-
SHA256
f05758c648da3f68d5d6bd44eff1f87808cd768103038d65230bc517a9d1dedb
-
SHA512
494cbdf081760db86784da44833fc3903444233f7908fc3ce235b78008bced64c36ff72e3ef009b41ab38a57274e44083a7fb7b12542455d84faeb7f672516ce
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Executes dropped EXE 1 IoCs
pid Process 1760 FA63.tmp -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SyncAdd.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\InvokeSubmit.tiff rundll32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\FA63.tmp rundll32.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe 2684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 3636 rundll32.exe 1760 FA63.tmp 1760 FA63.tmp 1760 FA63.tmp 1760 FA63.tmp 1760 FA63.tmp 1760 FA63.tmp 3636 rundll32.exe 3636 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3636 rundll32.exe Token: SeDebugPrivilege 3636 rundll32.exe Token: SeTcbPrivilege 3636 rundll32.exe Token: SeDebugPrivilege 1760 FA63.tmp -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4032 wrote to memory of 3636 4032 rundll32.exe 81 PID 4032 wrote to memory of 3636 4032 rundll32.exe 81 PID 4032 wrote to memory of 3636 4032 rundll32.exe 81 PID 3636 wrote to memory of 2132 3636 rundll32.exe 82 PID 3636 wrote to memory of 2132 3636 rundll32.exe 82 PID 3636 wrote to memory of 2132 3636 rundll32.exe 82 PID 2132 wrote to memory of 1260 2132 cmd.exe 84 PID 2132 wrote to memory of 1260 2132 cmd.exe 84 PID 2132 wrote to memory of 1260 2132 cmd.exe 84 PID 3636 wrote to memory of 3236 3636 rundll32.exe 85 PID 3636 wrote to memory of 3236 3636 rundll32.exe 85 PID 3636 wrote to memory of 3236 3636 rundll32.exe 85 PID 3636 wrote to memory of 2308 3636 rundll32.exe 87 PID 3636 wrote to memory of 2308 3636 rundll32.exe 87 PID 3636 wrote to memory of 2308 3636 rundll32.exe 87 PID 3236 wrote to memory of 2040 3236 cmd.exe 88 PID 3236 wrote to memory of 2040 3236 cmd.exe 88 PID 3236 wrote to memory of 2040 3236 cmd.exe 88 PID 3636 wrote to memory of 1760 3636 rundll32.exe 89 PID 3636 wrote to memory of 1760 3636 rundll32.exe 89 PID 2308 wrote to memory of 2684 2308 cmd.exe 92 PID 2308 wrote to memory of 2684 2308 cmd.exe 92 PID 2308 wrote to memory of 2684 2308 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05758c648da3f68d5d6bd44eff1f87808cd768103038d65230bc517a9d1dedb.exe"C:\Users\Admin\AppData\Local\Temp\f05758c648da3f68d5d6bd44eff1f87808cd768103038d65230bc517a9d1dedb.exe"1⤵PID:3988
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 151⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2682773206 && exit"3⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2682773206 && exit"4⤵
- Creates scheduled task(s)
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:42:003⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:42:004⤵
- Creates scheduled task(s)
PID:2684
-
-
-
C:\Windows\FA63.tmp"C:\Windows\FA63.tmp" \\.\pipe\{351F9051-2346-49FB-B8CE-23524199DAFE}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-