Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-05-2021 00:21

General

  • Target

    7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe

  • Size

    88KB

  • MD5

    b9fd952b27bc30f2561efbd2b2919ec7

  • SHA1

    a8066d045f15b399bd1cb684b687537f56eb703f

  • SHA256

    7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db

  • SHA512

    55d9eee46fedf05e33a64a66382a26903140c25a55500adbbab1a4f87cae530abe9a1da98a4f5b61a0a9d10835fc883f21eba438e00e1c907edd3e5848fafd7e

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets file execution options in registry 2 TTPs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe
    "C:\Users\Admin\AppData\Local\Temp\7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe
      2⤵
        PID:956
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\123.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Windows\SysWOW64\reg.exe
          reg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\ZhuDongFangYu.exe" /v debugger /t reg_sz /d "ntsd -d" /f
          3⤵
            PID:4000
          • C:\Windows\SysWOW64\reg.exe
            reg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\360tray.exe" /v debugger /t reg_sz /d "ntsd -d" /f
            3⤵
              PID:3768
            • C:\Windows\SysWOW64\reg.exe
              reg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\taskmgr.exe" /v debugger /t reg_sz /d "ntsd -d" /f
              3⤵
                PID:3756
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c assoc .txt = exefile
              2⤵
              • Modifies registry class
              PID:680
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ftype comfile=C:\Users\Admin\AppData\Local\Temp\7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe
              2⤵
              • Modifies system executable filetype association
              • Modifies registry class
              PID:2972
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ftype zipfile=C:\Users\Admin\AppData\Local\Temp\7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe
              2⤵
              • Modifies registry class
              PID:1868
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ftype jpgfile=C:\Users\Admin\AppData\Local\Temp\7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe
              2⤵
              • Modifies registry class
              PID:3616
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ftype txtfile=C:\Users\Admin\AppData\Local\Temp\7148ca8cc9041482682156ca16a1e83eba1333e16f41e80e522363a55ff2a0db.exe
              2⤵
              • Modifies registry class
              PID:3028
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\SysWOW64\rundll32.exe "C:\Windows\infpub.dat",#2 15
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:2876
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
              2⤵
              • Modifies extensions of user files
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1220
              • C:\Windows\SysWOW64\cmd.exe
                /c schtasks /Delete /F /TN rhaegal
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2104
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Delete /F /TN rhaegal
                  4⤵
                    PID:3776
                • C:\Windows\SysWOW64\cmd.exe
                  /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1650755206 && exit"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3940
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1650755206 && exit"
                    4⤵
                    • Creates scheduled task(s)
                    PID:1128
                • C:\Windows\SysWOW64\cmd.exe
                  /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:43:00
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2208
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 00:43:00
                    4⤵
                    • Creates scheduled task(s)
                    PID:4084
                • C:\Windows\5C3F.tmp
                  "C:\Windows\5C3F.tmp" \\.\pipe\{8B5ECF9B-52B7-443B-AD0D-A756779CA155}
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2704

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1220-128-0x0000000002EB0000-0x0000000002F18000-memory.dmp

              Filesize

              416KB

            • memory/1220-133-0x0000000002EB0000-0x0000000002F18000-memory.dmp

              Filesize

              416KB