Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 09:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/MadMan.exe
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/MadMan.exe
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\Downloads\\Birele.exe" Birele.exe -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x00090000000234cd-266.dat mimikatz -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4088 BadRabbit.exe 1536 F23F.tmp 4224 BadRabbit.exe 2880 BadRabbit.exe 2356 Birele.exe -
Loads dropped DLL 3 IoCs
pid Process 4704 rundll32.exe 5092 rundll32.exe 4444 rundll32.exe -
resource yara_rule behavioral1/files/0x00070000000234d4-341.dat upx behavioral1/memory/2356-414-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/2356-416-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/2356-431-0x0000000000400000-0x0000000000438000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\Downloads\\Birele.exe" Birele.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 63 raw.githubusercontent.com 64 raw.githubusercontent.com -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\infpub.dat BadRabbit.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File opened for modification C:\Windows\F23F.tmp rundll32.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\infpub.dat BadRabbit.exe File created C:\Windows\infpub.dat BadRabbit.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe 1520 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 2056 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 838759.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 176340.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 3216 msedge.exe 3216 msedge.exe 684 identity_helper.exe 684 identity_helper.exe 1484 msedge.exe 1484 msedge.exe 4704 rundll32.exe 4704 rundll32.exe 4704 rundll32.exe 4704 rundll32.exe 1536 F23F.tmp 1536 F23F.tmp 1536 F23F.tmp 1536 F23F.tmp 1536 F23F.tmp 1536 F23F.tmp 1536 F23F.tmp 5092 rundll32.exe 5092 rundll32.exe 4444 rundll32.exe 4444 rundll32.exe 2300 msedge.exe 2300 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 4704 rundll32.exe Token: SeDebugPrivilege 4704 rundll32.exe Token: SeTcbPrivilege 4704 rundll32.exe Token: SeDebugPrivilege 1536 F23F.tmp Token: SeShutdownPrivilege 5092 rundll32.exe Token: SeDebugPrivilege 5092 rundll32.exe Token: SeTcbPrivilege 5092 rundll32.exe Token: SeShutdownPrivilege 4444 rundll32.exe Token: SeDebugPrivilege 4444 rundll32.exe Token: SeTcbPrivilege 4444 rundll32.exe Token: SeDebugPrivilege 2056 taskkill.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3216 wrote to memory of 4828 3216 msedge.exe 81 PID 3216 wrote to memory of 4828 3216 msedge.exe 81 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 4580 3216 msedge.exe 82 PID 3216 wrote to memory of 1592 3216 msedge.exe 83 PID 3216 wrote to memory of 1592 3216 msedge.exe 83 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84 PID 3216 wrote to memory of 1580 3216 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/MadMan.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe41846f8,0x7fffe4184708,0x7fffe41847182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6792 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2168
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4088 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵PID:4940
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1826755043 && exit"3⤵PID:2328
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1826755043 && exit"4⤵
- Creates scheduled task(s)
PID:3596
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:50:003⤵PID:872
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:50:004⤵
- Creates scheduled task(s)
PID:1520
-
-
-
C:\Windows\F23F.tmp"C:\Windows\F23F.tmp" \\.\pipe\{102C8B4F-C896-42EF-9B50-E099B184BB4A}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4224 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Users\Admin\Downloads\BadRabbit.exe"C:\Users\Admin\Downloads\BadRabbit.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\Downloads\Birele.exe"C:\Users\Admin\Downloads\Birele.exe"1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
PID:2356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\82e26b9b-136d-43d6-9ff5-6d46b20edd74.tmp
Filesize5KB
MD507d2a3943dd0b5897f156f0355919842
SHA1db53d406037b921acbe007b5866188eb91d224ab
SHA256154acbb035abb614fa652ce3f5537ce7167e601ac6b092dc67f619aadb38fe63
SHA51231e99c6925ef6e166222752159699a3ba1730552cabf26216b81fab36fbf9636e6e4005bc59155f0432065b2a76e9feabc3bcf0eed7633f5cfe31b9ec1f159cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5add57f71825c0c9eeb670a4fed67ae8b
SHA1e4d335f87af91e20aaf0c81f460e9ea19332325f
SHA256184a6bcecd20688f47bfe256f947d3d39a9fbff3e7b73ed53cfa56adaded9033
SHA51231df1314529b523d55fc55f4d1e985677d42d4377c484dc71f6f04dda8c3697514c5e60eac2fa03a91e49be7de44cf2a56d68a1db986acc0c6ad5aa5d87f9ef8
-
Filesize
579B
MD565141ee7de186b38be5e1fdaddb3d501
SHA1455647ecf2fe6d59ac8b378758eb06b9b7a4e69c
SHA256534e5e7800ffb87965af22f5b6137df74b4cf5ab7c061b0a325bb5f62c157465
SHA512d0625d5c88c342ebf59235de6d9ce14e2e9c054d6aa15cc3658a8f9fd913642374f817c41d594b77bdd17218b063047a572d1eaf4ff5c33f638550dfb9f14b37
-
Filesize
6KB
MD5691375cf1f0aa85df7f16392f57fd2ea
SHA119b906488a9163ad868f67bdb3ef0634e7c5a64f
SHA256d8c99dfb2a020e1e8c3a76149a8c33125b6ab8bc9249a36a5583595b0425c975
SHA512c8614730f9e1e440f1f87c131eee740d244f15e22a5464bc088a395d7e503efbfc790a177c6da57e8f49109ce1c38b79e83e72184946bed5d1b502c7b5be8df2
-
Filesize
6KB
MD50877828442b9588dcfa09078285c2273
SHA1048a71144a70e28f87c3be0686e73a2a9186597b
SHA256322453614222f6bd85e45906ce11a1c482a6f418d8cfd9302617fc23a71f9c73
SHA5120434e7f03190cf22e93cb38dd742a6d553e1ece475bb02064a795eef56387daab52636dacdb69f5910ddbd3dfe3d1aa9e8b3949bc13f82ebc490cd8c6e67f38a
-
Filesize
1KB
MD55590c1290eb61016806670d4b8491440
SHA138f9f5cab85e8df60f4281711aca7ec5459b74d2
SHA256d75c397fc43298ef06c7f98e530084a55748018735130bb1c3b2acb0bc8171d1
SHA512cec3d39bd1d72c61574af64ebaeb66164abdb4d76f61216d84c34e1c8c24eaed7bc4b6aa684363f898d1eee0edcb171c84984b64099c5fd30986e2c7f067e8cb
-
Filesize
1KB
MD56eb5fbd1e37cda7c1782294338c9a4a9
SHA1f4a1bd176c9980bc2f2ad164fe3d2e7d0ce3b7b1
SHA2565c5726aa17c44a5ccafe7d6109b7c0fa0dd283446700d33b890786cf2ffae3f9
SHA51285943c13682104c15b9f5bb9432c163429f581e2faef8aa6e8a8bdd7671b93ae49e61a1bece6f973422d40232722e894cca1438bf92cd27912b92da01e0ad2e8
-
Filesize
874B
MD5f293af34507bf0a9afcc7d399481bf6e
SHA1a11395bff209331a26f8b54b4a13e5b6a6c27360
SHA25675e14793077d3941e5a468f94d51a2746b578c0af4a92d82e4d7c98b9527b17d
SHA51241fbf35d8f979cb0ecb032559ed05f5d3a777ca26d8c41d3c0132cd962021afc3a6bef4a2ccbfd1f1249401ca06355d23ec54ed2f62b7b216fac8a898cbe7c0b
-
Filesize
1KB
MD51fccae8b4875bae89aee857c6c47e1a4
SHA162b77ad46cf09d70f7a664a182f82d26d50b53ce
SHA25672cd005be0b0800322975e498f0a695890ac00e59c63dbef68a65ae5f82df89a
SHA512bdc4577b286ed58fe5d67c4128f55648b45f0023547f31305d0adb8b817ad7760246cc55c50cd09ea755de55edda1f2f98156d244228045bd73dbe6e1db9eaa9
-
Filesize
874B
MD572034596c2621b7d5fbbc979dcf36acc
SHA1bb3db32d96834aaebe2f603bb8a48e014d2df9b1
SHA256c7e9e19695238218b8f1f299a33791a22ff0295af2a7e8bf1391c5aeda7b9134
SHA512742e9e4d1b78291f1c6e93c352e1aa4e09291a97a1e1ca520a87bb30908c1fbd49e70dd9a76424d36e9a285b9eba5ac608f3e0eb4766a8b9caf58d1f8383ee3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD57bba8a1ec4cb24bfc05a065fcecca172
SHA1e861820b91311e113fcaff3cb266b0e5e2e85e7a
SHA2568d53da8d6a0c33b682fa3f2aefa905e230c6e45bc993c6457304d6dd912c28e1
SHA5126a5f817da0ec3ab528365f0b029e608d236084921a15ceea79afc925f1d97d0e34e4cae9ab7c8c1c029aa3713d55fefcf8a5ea2478c719989dd59e7492271675
-
Filesize
11KB
MD5d427e3b21bb406e01a3035ea44db5a50
SHA1aba9ab185d5f346a00d9a6e5db9aaab37def00f0
SHA25610f6df91156dbd6113c910200615a48e80bf564cfb4628080a1a2f341416d1a6
SHA512e412e5e17e034cebe41064241f958de74ce7685034b2d85c1ba5fdfedbed92d3b2eddc1a88749a59b85998315783bec8db65fe80a425bf87047702ce9db7426c
-
Filesize
11KB
MD5f2d97f804dd334e3308a83bd257e21ef
SHA12eecf1bdcf271427e726854ec580c2c66fecd15f
SHA256cc2c9990fcb99b0d3774f001bb67f7c5aba2418134b54848088d53f84cae9e94
SHA5128a3bd22abf26fa897679d96cfac6ee0bd16a63d24fa925059dbaeadeb44fd1b392fdf4637030a406a7c9f54a99d380cb9ec88a5bfa4f441bea7ade09c22e52d3
-
Filesize
116KB
MD541789c704a0eecfdd0048b4b4193e752
SHA1fb1e8385691fa3293b7cbfb9b2656cf09f20e722
SHA256b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23
SHA51276391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea
-
Filesize
431KB
MD5fbbdc39af1139aebba4da004475e8839
SHA1de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA51274eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113