Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-06-2023 09:30

General

  • Target

    BadRabbit.exe

  • Size

    431KB

  • MD5

    fbbdc39af1139aebba4da004475e8839

  • SHA1

    de5c8d858e6e41da715dca1c019df0bfb92d32c0

  • SHA256

    630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

  • SHA512

    74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

  • SSDEEP

    12288:BHNTywFAvN86pLbqWRKHZKfErrZJyZ0yqsGO3XR63:vT56NbqWRwZaEr3yt2O3XR63

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • mimikatz is an open source tool to dump credentials on Windows 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BadRabbit.exe
    "C:\Users\Admin\AppData\Local\Temp\BadRabbit.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Windows\SysWOW64\cmd.exe
        /c schtasks /Delete /F /TN rhaegal
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Delete /F /TN rhaegal
          4⤵
            PID:3888
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1536132580 && exit"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4804
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1536132580 && exit"
            4⤵
            • Creates scheduled task(s)
            PID:3084
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:49:00
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:49:00
            4⤵
            • Creates scheduled task(s)
            PID:2816
        • C:\Windows\68B1.tmp
          "C:\Windows\68B1.tmp" \\.\pipe\{42C24EF1-CDA2-4DFD-A8E2-C038B67A7E01}
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3720
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb83009758,0x7ffb83009768,0x7ffb83009778
        2⤵
          PID:4632
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:8
          2⤵
            PID:4824
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:2
            2⤵
              PID:4836
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:8
              2⤵
                PID:4888
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:1
                2⤵
                  PID:3956
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:1
                  2⤵
                    PID:3360
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:1
                    2⤵
                      PID:828
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4368 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:8
                      2⤵
                        PID:1712
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:8
                        2⤵
                          PID:1180
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:8
                          2⤵
                            PID:3124
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:8
                            2⤵
                              PID:292
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5072 --field-trial-handle=1772,i,11505716156445504066,7184825042479685789,131072 /prefetch:1
                              2⤵
                                PID:2136
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:760

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\4ae39cae-7e9f-47c3-9204-3a3857776696.tmp

                                Filesize

                                159KB

                                MD5

                                df2744c40bb773fdc1ab22ee953fbcf5

                                SHA1

                                90b5f2ce5849db903667c4e99927712f94fcad59

                                SHA256

                                bcd39105ed28950b78b74bc373005cc9f95493a7c0425f291b3b70c676109246

                                SHA512

                                cde54d5b68ca3b4e01c26607dd34eb2361eab7aece23784c83916b686b30b7c8f213045b3a9cc3d15cf2b00c9fdce5c777affe78c7120e6cb13080a19b53e442

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                648B

                                MD5

                                c77d7a0324ae1a47533049708aff9c6e

                                SHA1

                                7b86232134c21179370b3f381291905f67a91ddc

                                SHA256

                                2a37ce78fe424a14732722a50b1eacb7d8564ea97150556891af47ad53c381ed

                                SHA512

                                4709d337eb8f0410af08c4233887c3cb2aad8e16b9d660099cf29c2bca887f87dc56b8b1bfeae58b753893d66bc771d56e7c80fdc0e59685b9ce3b8e44cfa9e6

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                5f472faca0dc99131cdf99b9044452ab

                                SHA1

                                f9038658122a73e23c4c99c1a864be45641323dc

                                SHA256

                                95468e02305676dd06a5ac4e94a259d35eb3db01ee6d653dc7170aae9845d9b0

                                SHA512

                                32e9889bbe20641afac8043ec83eec585fa90c827677c075bb9d92cd615ee0e1c104e5487fe82ffd0394c0f54096e5d45cb7abcda98b7e16764ab988218c419e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                369B

                                MD5

                                607939521091a475b15e8621cc16b678

                                SHA1

                                bd53f708084cc81e906cf5fa5285028fb0c32dc5

                                SHA256

                                c5857c2af52efecbc91c29e33e5b3c665e9a6c889e5163156bdce191912d2213

                                SHA512

                                a8a99132b800ff6df6b6875b376ecabd473a9476e6da169e8df5c1653c35d53e8dbcaeeeafcbe547f5ea023868f7ee2f26276862d1cc3cadaa31a8d0063e5f43

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                535B

                                MD5

                                665c7c998dad872ddaa08102dfd13fc6

                                SHA1

                                ee1b8b0a36ece750be4418a4846650c423051ebc

                                SHA256

                                ba38e982a81f63ee8b733c1151045b5bf886e29fceca5e8ef439d1b6971afb60

                                SHA512

                                f908c936ec1e505f3fee074cbb680e0df91e9c31a1e0e2b9363c54ad67ad14d1889415f54182082348419c21aba83e92bb6fb261e127a81c25f848813c51314f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                369B

                                MD5

                                a259e5b5120d35fb54f2e697f9248bee

                                SHA1

                                75149844f10dfc21c5f11525abb02297b418f8d6

                                SHA256

                                8bdd5087931a931681d910183f1351d1ced7d0103879f91236959da238ab4b78

                                SHA512

                                a305d57c175dc25f055a4ec2f32f2d326112110f62afb1cb6849d9c6ba01f9364d72e07c54e13041ece43da31a534eb0d7fad26f4ff65ecd492f6829ffec1375

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                0e17ddb8e531c30bbab0d485e5483f83

                                SHA1

                                e0bc17b30c8c4eaec77efb46097fe5db3483d843

                                SHA256

                                ad0ea21cadcf1e899c752c9aaa9ce6c88d33ed483c21907a9ea41ae00c1b0f29

                                SHA512

                                2d4e051b446e8687f5e605b8c5ab46ddc6514b46185e86b02437d174009fe49723684e8ec4ee6c7fc5cd0623aa4c3e63e4183e6b717d2c9a37bde1d00406cc5f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                5e64e962747a692d1cd238ac1b7b4203

                                SHA1

                                32c91f0735d41dd2533329ff0e8e1c7ac4be6a6b

                                SHA256

                                5d9e721627a31048a8465c6729e180436a1ff0cc038e1e395495620eedcea328

                                SHA512

                                45f92d915961b58e58f5b64177d0112a22c77186a0c75d269905f62f6f1950440bce419aabd2e0f685d8e28100f24594c3d3c2e13e2083ab9c860ba5ebabd429

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                72KB

                                MD5

                                514bc51e026ba1e1b18d4ebed9508add

                                SHA1

                                85e42c86c7f3a1deedc72fe90607aef869794ec9

                                SHA256

                                46c9af36e57cce030da197e2b8772abcef37915343eb9e6b0155f0f50b37f11a

                                SHA512

                                2b6f51589a966bd25e575a038e1e51feef2d54fe1bee869e004c39bd6a067a96b6b0663605e2340e8adc1c5bebbb809bbd0ab7cd26a41ee70925a833427fa33f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                159KB

                                MD5

                                3e110fe33099d471257a998d0ffadb84

                                SHA1

                                1b65ea5a6f1957f911f8646aa476ea9beeb5d329

                                SHA256

                                436353631f45debb44909ad86d1300a2bd05cddb57da5d3ec7c06c012f28a183

                                SHA512

                                38884e32f59fce640392f9e3fe572298a0da630657e34f0c52b76ae555a8e1672890d28ffd913cf443a44932f4ccea25011d9871d1f667496df0213118c4d3c2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Windows\68B1.tmp

                                Filesize

                                60KB

                                MD5

                                347ac3b6b791054de3e5720a7144a977

                                SHA1

                                413eba3973a15c1a6429d9f170f3e8287f98c21c

                                SHA256

                                301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                SHA512

                                9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                              • C:\Windows\68B1.tmp

                                Filesize

                                60KB

                                MD5

                                347ac3b6b791054de3e5720a7144a977

                                SHA1

                                413eba3973a15c1a6429d9f170f3e8287f98c21c

                                SHA256

                                301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                SHA512

                                9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                              • C:\Windows\infpub.dat

                                Filesize

                                401KB

                                MD5

                                1d724f95c61f1055f0d02c2154bbccd3

                                SHA1

                                79116fe99f2b421c52ef64097f0f39b815b20907

                                SHA256

                                579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                SHA512

                                f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                              • memory/4472-133-0x0000000004780000-0x00000000047E8000-memory.dmp

                                Filesize

                                416KB

                              • memory/4472-130-0x0000000004780000-0x00000000047E8000-memory.dmp

                                Filesize

                                416KB

                              • memory/4472-122-0x0000000004780000-0x00000000047E8000-memory.dmp

                                Filesize

                                416KB