Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    59s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/03/2025, 08:04

General

  • Target

    https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/BadRabbit.zip

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/BadRabbit.zip
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd567cc40,0x7ffcd567cc4c,0x7ffcd567cc58
      2⤵
        PID:1532
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2208,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2196 /prefetch:2
        2⤵
          PID:4496
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1700,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2264 /prefetch:3
          2⤵
            PID:3524
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1940,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2296 /prefetch:8
            2⤵
              PID:3980
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3112 /prefetch:1
              2⤵
                PID:3164
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3144 /prefetch:1
                2⤵
                  PID:256
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4532,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4544 /prefetch:8
                  2⤵
                    PID:2088
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,14311087933793504528,13360267414932755896,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4876 /prefetch:8
                    2⤵
                    • NTFS ADS
                    PID:4804
                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                  1⤵
                    PID:5064
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                    1⤵
                      PID:4660
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:432
                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                        1⤵
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:4588
                        • C:\Windows\SysWOW64\rundll32.exe
                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                          2⤵
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4844
                          • C:\Windows\SysWOW64\cmd.exe
                            /c schtasks /Delete /F /TN rhaegal
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2124
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Delete /F /TN rhaegal
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:72
                          • C:\Windows\SysWOW64\cmd.exe
                            /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 510013637 && exit"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1416
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 510013637 && exit"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:3388
                          • C:\Windows\SysWOW64\cmd.exe
                            /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 08:23:00
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2444
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 08:23:00
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:5036
                          • C:\Windows\F2FB.tmp
                            "C:\Windows\F2FB.tmp" \\.\pipe\{376D2B6A-DB53-4C10-88B9-DA26ECD9353D}
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2800

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        d0bde3084e18f7f8816f2d5628bf3a13

                        SHA1

                        4038fc9b9cd788dc2479b5100202bc4bb724c262

                        SHA256

                        63079a7ea30c3602d82c3b2bd7fdc12b24b6557f71472bdd5440e30e2fdc6fae

                        SHA512

                        93432b49e26d9ff3d9b0b95d01650bd1074cb6ac20f81dd0f1c7a896668920291c78c6f50596846e4461d29835b8564050c463fbd75b0c9930e21ce96d182070

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        1KB

                        MD5

                        21554cc8f4c5d8c21df934f132ff5055

                        SHA1

                        90193ca4bb1adbd37acb133daaa3e906e38ce5a8

                        SHA256

                        b89a501e58461b30246318adc7e6a7ce5f16f9b34781d833eeb63face8a4296b

                        SHA512

                        9a4ebbd4f4bdda05aa297c697320125640408206a82f3add03ccdef99fdbba76a0eb8fcb15d6a7fe6155c7e173a9b9e6537fab33f3e5320e7c1179768328829c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                        Filesize

                        264KB

                        MD5

                        f50f89a0a91564d0b8a211f8921aa7de

                        SHA1

                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                        SHA256

                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                        SHA512

                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        eb3cf25b91dcd2b9edd4d9399aed6971

                        SHA1

                        d7cc8fb2eda319f58a9b041a11e49b46f2f7dc6e

                        SHA256

                        98c63616571f4de6165c49eca144ae3a72094955ae51b9e1a9942d66596bc78d

                        SHA512

                        cde2002943ecd1b2ce7727e7b315eedc31fc2c28b3ea8e49a02cdd66b594c1d2f317908b57c99de3fe3045dc9c92d73d2532440fd653cdfeef9fe95aa108ea19

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        b7e5aa3f538444e6dccc7180c7f9286f

                        SHA1

                        48837ef1c9e644a7f27af9478df0591c16321d4e

                        SHA256

                        939a27d31bbe226d635631cd3bb4db9b963bf950a15566151ab8899a5ab9a752

                        SHA512

                        2ee534a6eb7cc3861d8c225ffb2beace633f1756fa7de5e025a366f0bfc0c33e9095612bd648a24e31d4c0b787c83437f7b8bf0945b482a9bc96babea14f170f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        2297cb0b061f4491098e046e71beee72

                        SHA1

                        e0ecc89135a0a1795ab85f5deeeaa32de4a9aa47

                        SHA256

                        c131cdce9ee66baac961254cab49c676f2b341bb6a3b282370bf335579a3a23e

                        SHA512

                        8843d3af8a128b871326797c926f67f3c050e72741bace016c3b70711413dcd8fefa60c411237b611c40efb9a6dc6f83fabcbe9f7e1f4bc5d885bdc360cda4f6

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        96676bcf23722daa2cef2a0e61fe3cb1

                        SHA1

                        24eb846f414d07d3ec6713ee8c0cce58dbd65e1f

                        SHA256

                        4abc7a4d275bd9c5a8fd85fcb77e46cd002a29d3fc8725d51e7b7cda376389dc

                        SHA512

                        a17e8fc7a40bcc3489110b8227576501727398642207eb7ba99104dff4c3515c71fcfcfb3014ccf33505f04ab72af1ba27fc4dd59cb317bb8830ff021ebba112

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        123KB

                        MD5

                        9e46be415d97a57494ee1e06cd0d621d

                        SHA1

                        36a62c2b35fd5243a2a014866db54c0bbf1d077c

                        SHA256

                        d55bb6559fe6e0ab684d66200d0f4fcf17477d62c2f0a8761ef0d881899d98bf

                        SHA512

                        d65b12e76fba165990118dab515e8912298b744584090d96930760b00056b5fa56dc4b72f4c8fd6647a38ddcdab1c5808019ab7fcdc68f9122decf25d941501f

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        123KB

                        MD5

                        6dfb23492e2fec065788762318dd04fa

                        SHA1

                        e24ef91b72402187fe97ab5dcbdbe132793634fb

                        SHA256

                        25008b40f5a81b7ebc5a1ada1e4c82e96b5c7d3f19857619ac5bd9debb5eb4b8

                        SHA512

                        98b834b48343b42478726c4ac715c6c9461ca2adefef8f5ce6a6be9423e23fec4af22e7d47c6804d731279e3e69ecca9f38ba78bad0f5d5d198339159865c6eb

                      • C:\Users\Admin\Downloads\BadRabbit.zip

                        Filesize

                        393KB

                        MD5

                        61da9939db42e2c3007ece3f163e2d06

                        SHA1

                        4bd7e9098de61adecc1bdbd1a01490994d1905fb

                        SHA256

                        ea8ccb8b5ec36195af831001b3cc46caedfc61a6194e2568901e7685c57ceefa

                        SHA512

                        14d0bc14a10e5bd8022e7ab4a80f98600f84754c2c80e22a8e3d9f9555dde5bad056d925576b29fc1a37e73c6ebca693687b47317a469a7dfdc4ab0f3d97a63e

                      • C:\Users\Admin\Downloads\BadRabbit.zip:Zone.Identifier

                        Filesize

                        26B

                        MD5

                        fbccf14d504b7b2dbcb5a5bda75bd93b

                        SHA1

                        d59fc84cdd5217c6cf74785703655f78da6b582b

                        SHA256

                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                        SHA512

                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                      • C:\Windows\F2FB.tmp

                        Filesize

                        60KB

                        MD5

                        347ac3b6b791054de3e5720a7144a977

                        SHA1

                        413eba3973a15c1a6429d9f170f3e8287f98c21c

                        SHA256

                        301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                        SHA512

                        9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                      • C:\Windows\infpub.dat

                        Filesize

                        401KB

                        MD5

                        1d724f95c61f1055f0d02c2154bbccd3

                        SHA1

                        79116fe99f2b421c52ef64097f0f39b815b20907

                        SHA256

                        579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                        SHA512

                        f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                      • memory/4844-280-0x0000000000740000-0x00000000007A8000-memory.dmp

                        Filesize

                        416KB

                      • memory/4844-288-0x0000000000740000-0x00000000007A8000-memory.dmp

                        Filesize

                        416KB

                      • memory/4844-291-0x0000000000740000-0x00000000007A8000-memory.dmp

                        Filesize

                        416KB