Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/02/2023, 03:18
230223-dtzaasee76 623/02/2023, 03:06
230223-dl9fasee57 1023/02/2023, 03:00
230223-dhndnaee52 10Analysis
-
max time kernel
622s -
max time network
624s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2023, 03:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20230220-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 2 IoCs
resource yara_rule behavioral2/files/0x00060000000231bb-506.dat mimikatz behavioral2/files/0x00060000000231bb-509.dat mimikatz -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\DisableCopy.tiff rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1784 6F18.tmp -
Loads dropped DLL 1 IoCs
pid Process 5032 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\infpub.dat [email protected] File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\6F18.tmp rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe 1364 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133215988370098013" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3592 vlc.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe 708 chrome.exe 708 chrome.exe 5032 rundll32.exe 5032 rundll32.exe 5032 rundll32.exe 5032 rundll32.exe 1784 6F18.tmp 1784 6F18.tmp 1784 6F18.tmp 1784 6F18.tmp 1784 6F18.tmp 1784 6F18.tmp 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3592 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 3592 vlc.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe 832 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3592 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4456 2172 chrome.exe 82 PID 2172 wrote to memory of 4456 2172 chrome.exe 82 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2604 2172 chrome.exe 84 PID 2172 wrote to memory of 2852 2172 chrome.exe 85 PID 2172 wrote to memory of 2852 2172 chrome.exe 85 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86 PID 2172 wrote to memory of 4840 2172 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://github.com/Endermanch/MalwareDatabase1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ca049758,0x7ff9ca049768,0x7ff9ca0497782⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:22⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:12⤵PID:324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2784 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2784 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1796,i,11350186558773079909,8489936519400094085,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\Temp1_BadRabbit.zip\[email protected]"C:\Users\Admin\AppData\Local\Temp\Temp1_BadRabbit.zip\[email protected]"1⤵
- Drops file in Windows directory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Modifies extensions of user files
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5032 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵PID:1136
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3542433249 && exit"3⤵PID:1240
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3542433249 && exit"4⤵
- Creates scheduled task(s)
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 04:32:003⤵PID:1052
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 04:32:004⤵
- Creates scheduled task(s)
PID:1364
-
-
-
C:\Windows\6F18.tmp"C:\Windows\6F18.tmp" \\.\pipe\{13738308-DE07-42A2-BB58-A14456DC00C1}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\ImportDismount.mov"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3592
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bdc0edb8227b6b2942ad8bd7feb12a12
SHA1559f0b3313c07424365ad1411ef2c79592bd7651
SHA256c4689c5b88875513d887fd4f573148ffb4b0d52ee126f46108a6b7fdcf902323
SHA512012a0781b0e56be46716f4d398f66369869dd62ed5cfd532daceb1cbd2611d5475e9629921277ff905ebacf7709e5cca818a1e0135c7757c271ec908c36fce98
-
Filesize
1KB
MD53a4ff23920571cfb094b83fc8de67b36
SHA1bd0a4695c685f453426542db98277db2a7ef38c7
SHA256a5855bbd6433d48d70ff4f001fa1c96bd4439afb7b1ccee172610bfb4fa6fb92
SHA5125955c777f696cc7ec6da1e95e32486801b66f6cd3d12476a1f60efbe787f175731f6034f64b6fc3c546894ae10176ab9c362e6ac3996e893e46b1cdb1e30f9ca
-
Filesize
264KB
MD518d241d9c6f1c998779e88ca1aba2e31
SHA10ab9e48cd1b0698d259f59cd716e1cad37c8eca1
SHA256ca19328742c4a1d0ca9a43facba0e0153424aa3ade27fa04b8876d513a07462e
SHA512b0fbe548fb3854e900da1aa14cc48c7fc381720c1fade18ca5ad4f690c8ed42b85c5a00aee199cf68f12c81a10606c9ab51e778a8b8cca08637a64b2477d9b5f
-
Filesize
2KB
MD5a882c943296c28e302cada5860ae92d7
SHA159587ef48af63dfd3f56363bec633e876bc00059
SHA25642ffb7410fa4f3e8dc88286afc702a336428517d57f37f9c8485f8af45b0bcc6
SHA51235ff496a630ec29890d180f060809b7dc24b6771cbbb2e8a258b2a57187a8db563a9a2ed343340f2f563e1e3a5596093db2125202391704bffd2922e47b03688
-
Filesize
2KB
MD53a39887ec31ec5cd6a25d1849e58a74d
SHA17a174ed5047ca597883224a0be2bc1c8b469f267
SHA2560429f26c325e33c5c20b41dd8720af91cca9caf70f9502fb8a8d88ecd027e766
SHA51247e9b2253a5f2e4a3f45d9644652f8ab1b723c5006de6f16aca6b55a2ef138783c020d5d3d25bbdb4ee6d6bcfdd6a43134df5c94ba05529ec4a3c2055e96e895
-
Filesize
2KB
MD552d7b2361da00fb00651ef40f290b4f7
SHA134460010281f1dc99b13030a78d011537bcedf4a
SHA256aad2233f74deeeca1c931a4d9b53ae299fc59e0b27347d7192c489ae11980c10
SHA512731371a38d6dd225e7eaabf4f2a475a2318453151cc0ff3ce9ec2c2bcacd06c68153d6053cd5f60d0dbde6d8d5245d3e9276c31bc3f1ce6de02ae734b438f22b
-
Filesize
2KB
MD50de4f63d50c0615555eb6494a390ba0b
SHA17e7a9376436903e71e5b952cf5296560b1f06d21
SHA256a125a82d438f2c3002df8fe54182a51fc1aedf051bf00e0f9ddff9c21d06853a
SHA5126b4c05d4e9a08270c7ed48b88f15704e7a952c7d5420127acc865e2a872a5cfcae41c414d9244659a8879a56ec7105499f0b4bd42d308fd1ef24aa98ee7f9211
-
Filesize
1KB
MD53f5e67e2d0416e19629e310f06aafb7f
SHA11439cb6b1d532a7914c26c3b530a75e533b1af23
SHA256fa6496459f02b62d671e1e2b22ad31d75010c7a78b6c4e3bcfc981c429594dc1
SHA512a70e5ec25dfe377f1e4e4a46517e616fd02770c49f76bfef0f583a6a1777728d89984e5156ff585eb526f702f6f369eb3cc3c9e524cc5a8963fb6968778cb84f
-
Filesize
1KB
MD5bef3861d03db66287ab449ec45130a58
SHA13be9dd8f1104372846643246a609d70f21cf6968
SHA256f38d22b4040b2e17d59efabf81a049984c4abaa617adcb936d6b3c8b80741a4d
SHA5129f2b1a3e79a66bb9bcbaaaa2be024e19c436969599e15989504524b814df3f814193b74599af9a8cf39825ec97f064add9b021fdf4e61b3c33cde6bd0bfb0dc9
-
Filesize
1KB
MD53178c3c6428b57704dffc21889de7985
SHA1f4d12c054601ea478c99360c0886e2562956b6a9
SHA256fb72b171e3d3c189fb9d6a6b1cb7acaef32a4a77204990c92d589c904fce869e
SHA512015d694cd2d60aa84460f5d62d08c20fb5fc307d8e275a5db2d08650e58750e4f76963bd8b4f662b6b3b1a377033ee854a89886a12b3f28e276dbc05328e6eac
-
Filesize
1KB
MD5a4235f7011a9972f8ef58f02ae6db599
SHA17332ddd5d2567a0704c95dadf1b713eb7149b25a
SHA256205e05752a06b2462f04ae49d5bbfb3b8456202780573d54c80c5deaa6fb1789
SHA512f04f34956b6d6b7343f49c7c8aeeffbd78720f277878b153165f7e728e531d183b6eaab0a471fff5c7879769fcb246eaad3138a99b6a9c6b78da8af399889df5
-
Filesize
6KB
MD53c7b3873451c2e2e3f622e34f7ee5a25
SHA1a8038d74c0fba90a13abf5fd6137a3fceee22c57
SHA256149aecb778460bc9cebcaae3534dbda42941517d253770d62c6cef7cb78e0335
SHA512324bc4068a4d66ff45f1ad7d4e7fc01e5ab58d47007f8683a7d36e94b8b1855d1230310152e4cc00d45a5c4f497180e276633a1cf73508bac048842414d43b5f
-
Filesize
6KB
MD5dcc51b8d21bbf514f536b493cc013a3e
SHA198b8f6817e4346d9e7927ebe001f308faa8ba31a
SHA2569739d0fea356ef4aa0ce28ee5a70c855c9ad7f835fa1f0d5a5825c99518db8fb
SHA512280961e90fd897803295e723d8969f46b363014995497c7353e24283327664c1a08af0cc4aa41bb78b9d417661062041e884232b17c0dea887bfa57be8cfe65c
-
Filesize
6KB
MD5cab42b634bd5f15168fff380a403faa3
SHA1566c167f71b145239b6923100f1411734efc7c94
SHA2561c1971febbaca23f0afd3d030076adbbb35ee1a0bea3562745ca2ea9149878aa
SHA51299c616a0f0c4d17f397d11db86c809313c82fab01fe2feb914b2b6086fc4172ebed65cb304bafab57abc0580e4c5b5b2363dc68f57dd1723cfbe8f74fdf792cf
-
Filesize
15KB
MD5503a2d64d712e65698a0e66a4564dcb9
SHA190563e889d506eb7aadde0d1f7d5c93f0dddf421
SHA2565491213f08db53e82cd80c721742886e775080fe952ec2ff63c8e6638a9a8e66
SHA51294e96b9b627895aa09987a9f288b9576143865c87bf9ed1749a42569f6929add209da70b55517ffbfb613daba9f480a5278834b6ea259a8d3f0156061037e448
-
Filesize
140KB
MD5732d31a9f6d32f3f0df087a396a05417
SHA17ee6cdcd63cd793021cfa66e2fbdef36c595de56
SHA256e1917198e6378e953e7866b711d80cecd47e7cb57f380b1e20e21c716aa271f4
SHA51297fbf13ecdb5bcc7385ebc9d19dc673355c596f9e262d95dfb3ce7d6ce2f6c0c97c1f8059bf2e5f309ed71280a8f3df8d7f6e16bbc563cebd7df1a2aa52e48f3
-
Filesize
140KB
MD518f230c6b72dfdb24820ceb6ce7f2f8e
SHA14a069aebb33b8e8a450e78763fb16788c5a50a3b
SHA256cb574c91118b1f8498e1420905f12c8c80019805fff8df67ce9ccb8140ca8c11
SHA512d6517deae3132fe40728d9a5f35f7c234366ec8d8f648dccce6bf44eb6ece9cd3e86b92209ab0d848a830c0bf8cf043cac9828ce39b1f038dd8ae85688432a8a
-
Filesize
105KB
MD5949d0ddf0022d25e405285ef7a16664e
SHA1da93fb51ffa191d474dc2bb72ccea18ff13d92a8
SHA256e51010567140803f98b90858e785a2d51bb5f6ac14043b82f832e4b2dde61055
SHA51239931d54747fc7ac353c109fbdc1cb43f1ce54003297dc33327708581a5068dab7a435a4fd57f9f8020bd6f06b54fd789d344b7bdd0cd15fec618426253aafaf
-
Filesize
96KB
MD59e6a0543b45fed5ae97d672713eccb65
SHA118f9faefc2c9a751189fc0f67b6f31e1ddaa229a
SHA25617c443ab38760925ff407ebe53d5cc672b1d115c0f4305f166a778a7a944c292
SHA512ded6773493baa26d3781e1fb11f90a1ba9e32f4853d648eff7bfa71ff1ce549144d18865bddd974c9ff10b26dd763e7d690fc4be632ab014be702d6f77876dd1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
393KB
MD561da9939db42e2c3007ece3f163e2d06
SHA14bd7e9098de61adecc1bdbd1a01490994d1905fb
SHA256ea8ccb8b5ec36195af831001b3cc46caedfc61a6194e2568901e7685c57ceefa
SHA51214d0bc14a10e5bd8022e7ab4a80f98600f84754c2c80e22a8e3d9f9555dde5bad056d925576b29fc1a37e73c6ebca693687b47317a469a7dfdc4ab0f3d97a63e
-
Filesize
393KB
MD5de04c478827c2eed31a12e82b309979c
SHA135a330e91e714c682d3e1a5f926c7428fabb0d91
SHA25605fa34e3c5206ae35d9b02cc0ba20c7b2208a52185f9041c1b146f6404688a0d
SHA51254869aeaca927ad02d1eba92090d5e36f882ecbe75449e2fb7662a98e8bbdf8226691d4700ff1206c22977c37e2b0c9c47adc1d6817f6e75181c76b7a567f81d
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113