Analysis

  • max time kernel
    227s
  • max time network
    229s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 15:46

General

  • Target

    http://ramsomware

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ramsomware
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffc437c46f8,0x7ffc437c4708,0x7ffc437c4718
      2⤵
        PID:4724
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:2428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:540
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:8
          2⤵
            PID:1636
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
            2⤵
              PID:2660
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:1856
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:1
                2⤵
                  PID:3028
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:1
                  2⤵
                    PID:412
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4268 /prefetch:8
                    2⤵
                      PID:464
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4268 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2012
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:1
                      2⤵
                        PID:2764
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:1
                        2⤵
                          PID:1700
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                          2⤵
                            PID:3552
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:1
                            2⤵
                              PID:2200
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                              2⤵
                                PID:1060
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:1
                                2⤵
                                  PID:4092
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:1
                                  2⤵
                                    PID:3684
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1712 /prefetch:1
                                    2⤵
                                      PID:4336
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5076 /prefetch:8
                                      2⤵
                                        PID:3500
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=2444 /prefetch:8
                                        2⤵
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3468
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:1
                                        2⤵
                                          PID:2340
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:1
                                          2⤵
                                            PID:5032
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:1
                                            2⤵
                                              PID:2388
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6732 /prefetch:8
                                              2⤵
                                                PID:6092
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:1
                                                2⤵
                                                  PID:6116
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:8
                                                  2⤵
                                                    PID:1292
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5564
                                                  • C:\Users\Admin\Downloads\BadRabbit.exe
                                                    "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4728
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                      3⤵
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1336
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c schtasks /Delete /F /TN rhaegal
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5872
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /Delete /F /TN rhaegal
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5912
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3207837532 && exit"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6064
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3207837532 && exit"
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1232
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 16:06:00
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3712
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 16:06:00
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:5240
                                                      • C:\Windows\5CEB.tmp
                                                        "C:\Windows\5CEB.tmp" \\.\pipe\{5A8E8E4F-2C8F-4357-B614-F45809E0E465}
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4420
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17342720090856933797,5946313191179972027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5416
                                                  • C:\Users\Admin\Downloads\BadRabbit.exe
                                                    "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5812
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                      3⤵
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1408
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:3712
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:3972
                                                    • C:\Windows\system32\taskmgr.exe
                                                      "C:\Windows\system32\taskmgr.exe" /4
                                                      1⤵
                                                      • Checks SCSI registry key(s)
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:5304
                                                    • C:\Windows\System32\rundll32.exe
                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                      1⤵
                                                        PID:5180
                                                      • C:\Users\Admin\Downloads\BadRabbit.exe
                                                        "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5168
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                          2⤵
                                                          • Loads dropped DLL
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1080
                                                      • C:\Users\Admin\Downloads\BadRabbit.exe
                                                        "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2444
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                          2⤵
                                                          • Loads dropped DLL
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5600

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        eeaa8087eba2f63f31e599f6a7b46ef4

                                                        SHA1

                                                        f639519deee0766a39cfe258d2ac48e3a9d5ac03

                                                        SHA256

                                                        50fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9

                                                        SHA512

                                                        eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        b9569e123772ae290f9bac07e0d31748

                                                        SHA1

                                                        5806ed9b301d4178a959b26d7b7ccf2c0abc6741

                                                        SHA256

                                                        20ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b

                                                        SHA512

                                                        cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        d08529998e091f0aef4bee622bb9b93c

                                                        SHA1

                                                        8e2419f86d701b7eecdf2a69ade473e79b02da83

                                                        SHA256

                                                        311797a9c97f376ea051fda9a3f395733c5b08bc951cd248068f5664b79bba69

                                                        SHA512

                                                        98f0f8bb040adce9f925dfdb6a55e76c3173ec8a747c9072cfe220c3d75f26740d7d2979190f6d307b260d9b7fb42e15926549da9f3b2dd588476222fdeaaa9c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        111B

                                                        MD5

                                                        807419ca9a4734feaf8d8563a003b048

                                                        SHA1

                                                        a723c7d60a65886ffa068711f1e900ccc85922a6

                                                        SHA256

                                                        aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                        SHA512

                                                        f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        646B

                                                        MD5

                                                        0fa2db62eea3cf2c348712911e41fb1e

                                                        SHA1

                                                        78394454b14b54e67367fb7a807e67d8360ad0b9

                                                        SHA256

                                                        3aeca8ea7ad5ef126923673a89f11154bb4244c1d709924c5ba213d764d20162

                                                        SHA512

                                                        18ced0d65242c7384c369be0420b9c77cae0f62efebb899f959b6bd882f92b29120ef1baef7a52014cd5e42a50d43313da4a7bbb4796a3fdbcb48302fefd3a3b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        879B

                                                        MD5

                                                        1c5769d08d4d685bb8ba21944e6ac8a8

                                                        SHA1

                                                        1d53a1c240defb34ee4456245e2891e5dc049c81

                                                        SHA256

                                                        d06a6063551e46e4d279c01d1902b2aeace37f811830a903de267418e0683b23

                                                        SHA512

                                                        844cb1bd5b4cbcfa741348333fa93077a704e87ffd6aeed0def6b74ca675e81963d2d49b197db09860d235ea82c1ba493ac03d0926881e8e15a05ffa07fe1d97

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        0417f5d241ce065a75eb281d4d1f7383

                                                        SHA1

                                                        1f7dc0141f3efd2ca552b65fd1ede376979ee272

                                                        SHA256

                                                        5eff98d17d4ef6331bd4a62bf80490e72462afb9c312f6dd5921d361e6baabff

                                                        SHA512

                                                        749cde3b27eb98eb3717310f19ec24cde50e07d6e81e5e8ef5fb208e4e8560c98bbd782bd146ce88e7861f1a683937da092ecc88a3814d7b9720263a439174a1

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        db68494d1f9267f60c6cc4142aa97860

                                                        SHA1

                                                        8db93d3c1503dbb7c30dc0fd9bb96fd21f57cdb9

                                                        SHA256

                                                        2c4c3fcb9d8e661933b10aa22730b4efa79e206443b1d29fed06a50804cd6fd1

                                                        SHA512

                                                        00800a94766516f6e13db2c0d9b0b6b45db3af7ef3fcb335280cfe40dc3cd5e404e64746dda8fd20c851f5947c3aeb7d14439f8d20514a8fb8b170e4b9835300

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        1e2b7dbbfd578b055697a7474ae3074a

                                                        SHA1

                                                        dcfb3d88eacb17f6005ad4fa11df771885c9e1d4

                                                        SHA256

                                                        d512882c99a10b7d8ce438b0c6deaecdac6bf3946b02e090a4924baab34efd76

                                                        SHA512

                                                        21a2bd8d2bfaa59bdde27ede571641f374a58656d708d5872367b572b2a91f2fffad714b42c48f79da10d0cc50271c9bc40619e5df08744c116b10b7c7eb24d8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        22adc223029b407fa8e63c86d72f29c5

                                                        SHA1

                                                        5b2130ea361599d8ae2cd7f82ed093a5a6f9f10f

                                                        SHA256

                                                        d9ea0aa6f89b540c18d5a8954abd74afe768a21984a6a72080b627667b6b8383

                                                        SHA512

                                                        2b56990cb5a4b910d6511948d433a2ea954139dd3ef6b0b190b1a4ab0e03c08e44cb88eb6353566c9fe54c4e7d5f5e8286add3ba3a5a01752c2e3f61310fa86f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        284f2efe4c21c8ea2265fedb2c540903

                                                        SHA1

                                                        ce8ae08aad92e3f7816f54c2142f5132711b4362

                                                        SHA256

                                                        e1f25c37905d13e0f798fce2428f1a3fbe3ece277c736d5d3c2337eeeb94d79c

                                                        SHA512

                                                        3da121e3be111509701e0d7f82cfd4986302f31be9cbda4f23c814c648c98b8a76386064d5eec18985eda993508cbc4385f06ec8d2aaec029ada5ba2c2d7c967

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        dab4edbd7a739d5412b8e4e464edab0f

                                                        SHA1

                                                        f53be12ffdf9ce18f144bd5e8511be1d5fec0f64

                                                        SHA256

                                                        54a409a4306674f5cfca3e00f4460dc124b5c7f35d37a3d3d08a4eb17c621a13

                                                        SHA512

                                                        a6c0ccf6db55ee93d7eeceab60f96c663614354649568e7bc5094f2673facf180ba2f0b96b8287144319779a7ac7dc39c06a15c343c2c5bc520e7c523685285b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        b9e740179cd56a2a62d8b0a3d4e00e42

                                                        SHA1

                                                        2b60e1a088722ca49c855ae84e5dc9155a708169

                                                        SHA256

                                                        7d8786a0392971eb3ef3fcacbfb9d8eb9527a64d2ccb5ae5739868775d1098af

                                                        SHA512

                                                        683e611e280575091bbc713da1cbc5ae29ab6a97da16612bee592f1190f8934b8436e97f390de014dbc9afcd0691588912c6ef5cd177b4313db6415533b1a826

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        d7a38d244ff7aca6848424a1802d0069

                                                        SHA1

                                                        94f5b9e2f6e49fcf0708ea1aa8e59d2e1bbf40e3

                                                        SHA256

                                                        8030ae7b0c559c2727a24a01fb06956920239b9ffcf64452b9952747d6038362

                                                        SHA512

                                                        e4b534ef9f723649f87781947ab4072193181e41b2096eb74f3ef596e8f089c0967dbfbfd371fd24cc66571192eb74cd4de0bbd9ee58b6ea3595f04ce5ed0ebe

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        a28451894cc298b2853ddb0a14281eed

                                                        SHA1

                                                        18e4ae7f3f049c2c2300d9247ab052b6fed189ec

                                                        SHA256

                                                        878c8ff7c43102629286a232f426d60de9f5d3b9c4dcd950f584cada4b69f0d6

                                                        SHA512

                                                        b5e5348dd0f28a0edefa7b3f3338ec00530156ed0b2ae59b6fa3f85659cf9aba48b61e90723a387a1641ec0835b22683ed6b0249d911b1faffff2ee6764e5bcb

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        bc4b582fb7469c085685693e0214ff23

                                                        SHA1

                                                        b2851daac9701018da6b7fbc7e52cb52e77d7f2a

                                                        SHA256

                                                        57178bd0c50d227822ebb73b8a4ebdd7d25406a4725e4f4d48254bcf956755f8

                                                        SHA512

                                                        d507d39e441f4e24d0b7a825e57b33b24c387245b7f839bb15c943d4aaa633e2a548d4b543be1095293f6da8264d82236923c0d12994a476b0094fa2469ba5e8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        75fa7383cc1e9f5e62c187d69e916d76

                                                        SHA1

                                                        4de186b4783bb4a3d0f99c22a4042719dbd8ec10

                                                        SHA256

                                                        3cca3fd7b3fc1f0f7b5a762b435173a482bedf0fd8ad8f20a0805a81ce3501cf

                                                        SHA512

                                                        c5af0af38d0a43a197e9dd66d1de59f30a0781ec33f6191777a4f08889ecb749a51601e969ca5c52b3ded9cd184c91bcdd5815db6ffc11bc7309f6887bca27a2

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        63e729b0cd32f6d4d6a447cf50ea0abd

                                                        SHA1

                                                        45e300418786581932522328ccd6ff04b5605761

                                                        SHA256

                                                        27256f011e41702874cc8a34495f455a1fd07c4b24b37ef0e710e2adf7a75ef1

                                                        SHA512

                                                        63fc438407dc24cb31c47a3c65ac71660397ce438c9804fd58cf0d8387c8fb21456a8685fd3d388b14a2df9f2d9db87fd8cef966c7df45c264ed956bd20f69fc

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        64320ea9ab363fcbb10710c7f6ee3aa9

                                                        SHA1

                                                        126f2263732549697eb2c03d59f155b4f082d4bd

                                                        SHA256

                                                        4b89688a4cfb56ea870c488f787626b7fdf96925786e3ab0a806c3096bdd3708

                                                        SHA512

                                                        d9bccc41ba12ce63770ea4b0a2e42b9f3e68ced3f8494fefa1103c9da2bffa4b345f91032e73ec721d28ca6bb53942f3a34f1c5577949166712d26aa28a3e248

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        ba0b42f61b5f78d36e2fe195b38354f5

                                                        SHA1

                                                        909dabde901bb7496e8c46599346e336e2977af5

                                                        SHA256

                                                        94e326c2c82c85ae91f6e8479f09bf09f1f33f7c4db2e839e60cd4270e06d12f

                                                        SHA512

                                                        7cb60f10c3d8ebdc42817ecb79b49e468544000bde8543d9e9dd84f06bebfa7cec08dc3f90f965ca68b01342e9bf8be1e06d880aa5a5158faf95cc89e96190d8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58500f.TMP

                                                        Filesize

                                                        703B

                                                        MD5

                                                        38a3959c580cd5f5989520c22aebaa63

                                                        SHA1

                                                        6b6c4cba7858f8090eb541d2ff4e4e1cb3342d95

                                                        SHA256

                                                        25922fe7032550710faf13fca6615f4d42cf6a8bbc09121ddc7734363d5177d2

                                                        SHA512

                                                        d77f3d025557e736faf13f1bf9bd509a4fb165dfee3862c4dcfd10c1258bd48d16fce70f2a34f9b975265d8cb8e518b7c7908ff8bad8a05010b4c78301b3a96a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        2008418430ab46cf66dca0cc97b863d3

                                                        SHA1

                                                        4c553bd609d55e00f6b8266e88bc585880cc505e

                                                        SHA256

                                                        1dbf807f2470e1ddb8036ad1f3c224d39c56c1e1f6f8b9c7a1162c6028e87306

                                                        SHA512

                                                        aaefcf64631bdd8ca8fe053d63db9007dabc183250bcb1ad35381beb30d6f73905a2bedeb7b9fab6f7e7c1bb7b7109d7b4691e2b5e502e59220a6cf47509910f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        d9a9be7e2f18cc017f067d1c88c7966e

                                                        SHA1

                                                        7fcad05bf4d579c6cfbea7ba0ef9970b1d24c2f9

                                                        SHA256

                                                        cc609999107404b8bc84bffc3c2ea4337b891527b77fd28f32528cd92b4e5937

                                                        SHA512

                                                        2773a10f042fb3d59cf9f5bd6883dcf98afd203c0572d0014c9721117b72b18bff641305f9b784a8e74a39e3ad67be137468758b80413f638d85b0828a59358b

                                                      • C:\Users\Admin\Downloads\Unconfirmed 692336.crdownload

                                                        Filesize

                                                        431KB

                                                        MD5

                                                        fbbdc39af1139aebba4da004475e8839

                                                        SHA1

                                                        de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                        SHA256

                                                        630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                        SHA512

                                                        74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                      • C:\Windows\5CEB.tmp

                                                        Filesize

                                                        60KB

                                                        MD5

                                                        347ac3b6b791054de3e5720a7144a977

                                                        SHA1

                                                        413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                        SHA256

                                                        301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                        SHA512

                                                        9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                                      • C:\Windows\infpub.dat

                                                        Filesize

                                                        401KB

                                                        MD5

                                                        c4f26ed277b51ef45fa180be597d96e8

                                                        SHA1

                                                        e9efc622924fb965d4a14bdb6223834d9a9007e7

                                                        SHA256

                                                        14d82a676b63ab046ae94fa5e41f9f69a65dc7946826cb3d74cea6c030c2f958

                                                        SHA512

                                                        afc2a8466f106e81d423065b07aed2529cbf690ab4c3e019334f1bedfb42dc0e0957be83d860a84b7285bd49285503bfe95a1cf571a678dbc9bdb07789da928e

                                                      • C:\Windows\infpub.dat

                                                        Filesize

                                                        401KB

                                                        MD5

                                                        1d724f95c61f1055f0d02c2154bbccd3

                                                        SHA1

                                                        79116fe99f2b421c52ef64097f0f39b815b20907

                                                        SHA256

                                                        579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                                        SHA512

                                                        f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                                                      • memory/1336-558-0x0000000000C20000-0x0000000000C88000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1336-565-0x0000000000C20000-0x0000000000C88000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1336-570-0x0000000000C20000-0x0000000000C88000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1408-616-0x0000000000A00000-0x0000000000A68000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1408-608-0x0000000000A00000-0x0000000000A68000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/5304-645-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-646-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-647-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-644-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-643-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-648-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-649-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-638-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-639-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5304-637-0x00000209CEEF0000-0x00000209CEEF1000-memory.dmp

                                                        Filesize

                                                        4KB