Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 17:53

General

  • Target

  • Size

    431KB

  • MD5

    fbbdc39af1139aebba4da004475e8839

  • SHA1

    de5c8d858e6e41da715dca1c019df0bfb92d32c0

  • SHA256

    630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

  • SHA512

    74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

  • SSDEEP

    12288:BHNTywFAvN86pLbqWRKHZKfErrZJyZ0yqsGO3XR63:vT56NbqWRwZaEr3yt2O3XR63

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\cmd.exe
        /c schtasks /Delete /F /TN rhaegal
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2496
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Delete /F /TN rhaegal
          4⤵
            PID:4448
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3535658540 && exit"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3535658540 && exit"
            4⤵
            • Creates scheduled task(s)
            PID:3868
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 18:11:00
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1396
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 18:11:00
            4⤵
            • Creates scheduled task(s)
            PID:2120
        • C:\Windows\3D3.tmp
          "C:\Windows\3D3.tmp" \\.\pipe\{74683556-6F2F-4DD6-8BA6-AA639A1D72D3}
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:228
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1056
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\WriteDisconnect.gif
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3900 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3084
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\UnregisterSuspend.wmf"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4292
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3808
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3632
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\StepRead.mht
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff9dd0a46f8,0x7ff9dd0a4708,0x7ff9dd0a4718
        2⤵
          PID:2076
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,981954352691387228,12981270485951492242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
          2⤵
            PID:2124
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,981954352691387228,12981270485951492242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3252
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,981954352691387228,12981270485951492242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8
            2⤵
              PID:64
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,981954352691387228,12981270485951492242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:1
              2⤵
                PID:4356
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,981954352691387228,12981270485951492242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                2⤵
                  PID:4308
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                1⤵
                  PID:2580
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:440
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:4556

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      6fbbaffc5a50295d007ab405b0885ab5

                      SHA1

                      518e87df81db1dded184c3e4e3f129cca15baba1

                      SHA256

                      b9cde79357b550b171f70630fa94754ca2dcd6228b94f311aefe2a7f1ccfc7b6

                      SHA512

                      011c69bf56eb40e7ac5d201c1a0542878d9b32495e94d28c2f3b480772aa541bfd492a9959957d71e66f27b3e8b1a3c13b91f4a21756a9b8263281fd509c007b

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      360dd5debf8bf7b89c4d88d29e38446c

                      SHA1

                      65afff8c78aeb12c577a523cb77cd58d401b0f82

                      SHA256

                      3d9debe659077c04b288107244a22f1b315bcf7495bee75151a9077e71b41eef

                      SHA512

                      0ee5b81f0acc82befa24a4438f2ca417ae6fac43fa8c7f264b83b4c792b1bb8d4cecb94c6cbd6facc120dc10d7e4d67e014cdb6b4db83b1a1b60144bb78f7542

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      3bedbf76cd1308cb91e18e303142359d

                      SHA1

                      13ba74e652c59560180d7617c80f68b7da0ea02a

                      SHA256

                      214582fb90eb8660898e07968b49aa2859642ac07e0e04675b0f7c7385fc9545

                      SHA512

                      a03d97e34aca40fe3bb006da4b5d75afd6b77023c7b88998ecd1908d51ac704d272d5c8dea4b572ec29a5fa22b307959046d1eefd48c8cfd3d8027ac8fe9cef6

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      d8919bbf0b9ceacd5fa4c06ca86f3e30

                      SHA1

                      f3606846cfd5dbec222f5127c8863494cb9c6cbd

                      SHA256

                      d6058b49855010a5ee82677c87776853f02a52f75945e9c777f5b3918bd49ef0

                      SHA512

                      064c6bcb091cd48667ef29c06d99677765e2282ca4cc1fe44bc1bc2036ca9a8cfc44b546a37f66dc438dd3a76cf6a282ff23ca9b532ecef08b0f65314d561c9a

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      11KB

                      MD5

                      60e775f421990bff660def4caad39414

                      SHA1

                      2fa3f2aad349e4c9586886cc75271da15ba99f30

                      SHA256

                      5d19e6916a97a038d1688af251028060fc4ca5ce31481a0b55b6de95fafd464b

                      SHA512

                      f19a50c763c232875f4ee4690a4fd06d821b0524153ead78062029557ddeaf7f1bb9f482d5834e4d61fecba373907bd5b098ef7153678d4959d6da01048888f0

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      11KB

                      MD5

                      9323332e01250f5033c028304ffb6f20

                      SHA1

                      b132cd20e31e6e0afdc1439dd8fbf49f3ad3e284

                      SHA256

                      d816bf0faf0676b7f42a33559775fae841fd74cecb904faea1e3ec4e2313859d

                      SHA512

                      2c0c881d9248c1dfe41fa1bb05d14f72fc1e3e22dc50f19860c7b81777cf4a8edf2a94b2b17efde70dcc911f08906c392b20abe327ab99d4ae22dc287cfc709d

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MN7N7EX1\suggestions[1].en-US

                      Filesize

                      17KB

                      MD5

                      5a34cb996293fde2cb7a4ac89587393a

                      SHA1

                      3c96c993500690d1a77873cd62bc639b3a10653f

                      SHA256

                      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                      SHA512

                      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                    • C:\Windows\3D3.tmp

                      Filesize

                      60KB

                      MD5

                      347ac3b6b791054de3e5720a7144a977

                      SHA1

                      413eba3973a15c1a6429d9f170f3e8287f98c21c

                      SHA256

                      301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                      SHA512

                      9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                    • C:\Windows\infpub.dat

                      Filesize

                      401KB

                      MD5

                      1d724f95c61f1055f0d02c2154bbccd3

                      SHA1

                      79116fe99f2b421c52ef64097f0f39b815b20907

                      SHA256

                      579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                      SHA512

                      f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                    • memory/1056-69-0x00007FF9EDEA0000-0x00007FF9EDEB7000-memory.dmp

                      Filesize

                      92KB

                    • memory/1056-61-0x00007FF9EE5C0000-0x00007FF9EE5F4000-memory.dmp

                      Filesize

                      208KB

                    • memory/1056-65-0x00007FF9DE8D0000-0x00007FF9DEB84000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/1056-70-0x00007FF9EDE80000-0x00007FF9EDE91000-memory.dmp

                      Filesize

                      68KB

                    • memory/1056-71-0x00007FF9EDE60000-0x00007FF9EDE77000-memory.dmp

                      Filesize

                      92KB

                    • memory/1056-72-0x00007FF9EDE40000-0x00007FF9EDE5D000-memory.dmp

                      Filesize

                      116KB

                    • memory/1056-73-0x00007FF9EDBC0000-0x00007FF9EDBD1000-memory.dmp

                      Filesize

                      68KB

                    • memory/1056-68-0x00007FF9EE6B0000-0x00007FF9EE6C8000-memory.dmp

                      Filesize

                      96KB

                    • memory/1056-74-0x00007FF9DD820000-0x00007FF9DE8CB000-memory.dmp

                      Filesize

                      16.7MB

                    • memory/1056-80-0x00007FF9EEB30000-0x00007FF9EEB97000-memory.dmp

                      Filesize

                      412KB

                    • memory/1056-60-0x00007FF66A7D0000-0x00007FF66A8C8000-memory.dmp

                      Filesize

                      992KB

                    • memory/2916-14-0x00000000027A0000-0x0000000002808000-memory.dmp

                      Filesize

                      416KB

                    • memory/2916-11-0x00000000027A0000-0x0000000002808000-memory.dmp

                      Filesize

                      416KB

                    • memory/2916-3-0x00000000027A0000-0x0000000002808000-memory.dmp

                      Filesize

                      416KB