File name:

BadRabbit.exe

Full analysis: https://app.any.run/tasks/5e242da5-157b-4fdf-8173-3379a121540e
Verdict: Malicious activity
Analysis date: November 24, 2023, 04:58:36
OS: Windows 10 Professional (build: 19044, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

FBBDC39AF1139AEBBA4DA004475E8839

SHA1:

DE5C8D858E6E41DA715DCA1C019DF0BFB92D32C0

SHA256:

630325CAC09AC3FAB908F903E3B00D0DADD5FDAA0875ED8496FCBB97A558D0DA

SSDEEP:

12288:BHNTywFAvN86pLbqWRKHZKfErrZJyZ0yqsGO3XR63:vT56NbqWRwZaEr3yt2O3XR63

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • BadRabbit.exe (PID: 3120)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2600)
      • cmd.exe (PID: 4340)
      • cmd.exe (PID: 4480)
    • Unusual connection from system programs

      • rundll32.exe (PID: 4420)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • BadRabbit.exe (PID: 3120)
    • Starts CMD.EXE for commands execution

      • rundll32.exe (PID: 4420)
    • Starts application with an unusual extension

      • rundll32.exe (PID: 4420)
    • Connects to the server without a host name

      • rundll32.exe (PID: 4420)
  • INFO

    • Checks supported languages

      • BadRabbit.exe (PID: 3120)
      • E427.tmp (PID: 408)
    • Dropped object may contain TOR URL's

      • BadRabbit.exe (PID: 3120)
      • rundll32.exe (PID: 4420)
    • Drops the executable file immediately after the start

      • rundll32.exe (PID: 4420)
    • Checks proxy server information

      • rundll32.exe (PID: 4420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:10:22 04:33:58+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 12288
InitializedDataSize: 43520
UninitializedDataSize: -
EntryPoint: 0x12c0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows command line
FileVersionNumber: 27.0.0.170
ProductVersionNumber: 27.0.0.170
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Adobe Systems Incorporated
FileDescription: Adobe® Flash® Player Installer/Uninstaller 27.0 r0
FileVersion: 27,0,0,170
InternalName: Adobe® Flash® Player Installer/Uninstaller 27.0
LegalCopyright: Copyright © 1996-2017 Adobe Systems Incorporated
LegalTrademarks: Adobe® Flash® Player
OriginalFileName: FlashUtil.exe
ProductName: Adobe® Flash® Player Installer/Uninstaller
ProductVersion: 27,0,0,170
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
91
Monitored processes
16
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start badrabbit.exe conhost.exe no specs rundll32.exe cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs e427.tmp no specs conhost.exe no specs schtasks.exe no specs schtasks.exe no specs tiworker.exe no specs badrabbit.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\WINDOWS\system32\shutdown.exe /r /t 0 /f" /ST 05:16:00C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
408"C:\Windows\E427.tmp" \\.\pipe\{866D79ED-0B69-4195-9299-C7BC929E6360}C:\Windows\E427.tmprundll32.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\e427.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
516\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
840C:\WINDOWS\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1940_none_21b971f2c458567a\TiWorker.exe -EmbeddingC:\Windows\WinSxS\x86_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1940_none_21b971f2c458567a\TiWorker.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Exit code:
0
Version:
10.0.19041.1940 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1940_none_21b971f2c458567a\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
952schtasks /Delete /F /TN rhaegalC:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeE427.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2600/c schtasks /Delete /F /TN rhaegalC:\Windows\System32\cmd.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2696schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\WINDOWS\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3499614005 && exit"C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2772\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBadRabbit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3120"C:\Users\admin\AppData\Local\Temp\BadRabbit.exe" C:\Users\admin\AppData\Local\Temp\BadRabbit.exe
explorer.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
HIGH
Description:
Adobe® Flash® Player Installer/Uninstaller 27.0 r0
Exit code:
0
Version:
27,0,0,170
Modules
Images
c:\users\admin\appdata\local\temp\badrabbit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
850
Read events
833
Write events
17
Delete events
0

Modification events

(PID) Process:(4420) rundll32.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{71a27cdd-812a-11d0-bec7-08002be2092f}
Operation:writeName:LowerFilters
Value:
fvevol
(PID) Process:(4420) rundll32.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CrashControl
Operation:writeName:DumpFilters
Value:
dumpfve.sys
(PID) Process:(840) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide
Operation:writeName:LastScavengingStarvationReport
Value:
905179D6E5C6D901
(PID) Process:(840) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdHigh
Value:
31049445
(PID) Process:(840) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdHigh
Value:
31071890
(PID) Process:(4420) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4420) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4420) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4420) rundll32.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(840) TiWorker.exeKey:HKEY_LOCAL_MACHINE\COMPONENTS\ServicingStackVersions
Operation:writeName:10.0.19041.1940 (WinBuild.160101.0800)
Value:
2023/3/31:11:45:16.349 10.0.19041.1940 (WinBuild.160101.0800)
Executable files
4
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
840TiWorker.exeC:\WINDOWS\LOGS\CBS\CBS.LOGtext
MD5:B097E1A6358273065DE0D935C4C47703
SHA256:4E6CB1478264242461000BCF6CA2855B4FA5798A318AE945BBC5211E09DBD021
4420rundll32.exeC:\Windows\E427.tmpexecutable
MD5:37945C44A897AA42A66ADCAB68F560E0
SHA256:2F8C54F9FA8E47596A3BEFF0031F85360E56840C77F71C6A573ACE6F46412035
3120BadRabbit.exeC:\Windows\infpub.datexecutable
MD5:1D724F95C61F1055F0D02C2154BBCCD3
SHA256:579FD8A0385482FB4C789561A30B09F25671E86422F40EF5CCA2036B28F99648
4420rundll32.exeC:\Users\admin\Tracing\WPPMedia\Skype_MediaStackETW.etl.bakbinary
MD5:05DAB2B5D587B63A3CE43B7FA0FBB621
SHA256:12BF2A95887B26B7EE1CF4F7A424FE737DADD9C533BA2E8BEA968D6248C883B2
4420rundll32.exeC:\Users\admin\Documents\Database1.accdbbinary
MD5:0E9130C28A4F2AB551359BDD00831383
SHA256:30619B2924E9CE46A5448433810A9F85EF484B62B22C4431AF8F04E938A724A9
4420rundll32.exeC:\Windows\dispci.exeexecutable
MD5:B14D8FAF7F0CBCFAD051CEFE5F39645F
SHA256:8EBC97E05C8E1073BDA2EFB6F4D00AD7E789260AFA2C276F0C72740B838A0A93
4420rundll32.exeC:\Windows\cscc.datexecutable
MD5:B4E6D97DAFD9224ED9A547D52C26CE02
SHA256:682ADCB55FE4649F7B22505A54A9DBC454B4090FC2BB84AF7DB5B0908F3B7806
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
34
DNS requests
7
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4420
rundll32.exe
OPTIONS
400
104.115.33.219:80
http://104.115.33.219/
unknown
html
209 b
unknown
1160
svchost.exe
GET
200
23.77.197.145:80
http://download.windowsupdate.com/c/msdownload/update/others/2023/04/38812849_109aaaf1da424d3d1f7fa172fd205d6570c8dddc.cab
unknown
compressed
7.70 Kb
unknown
4420
rundll32.exe
OPTIONS
200
40.83.50.89:80
http://40.83.50.89/
unknown
unknown
1160
svchost.exe
GET
200
23.77.197.145:80
http://download.windowsupdate.com/c/msdownload/update/others/2023/06/39193375_1833d16e57151290c5fbc6445977a2fd49a29617.cab
unknown
compressed
13.8 Kb
unknown
1420
svchost.exe
OPTIONS
200
40.83.50.89:80
http://40.83.50.89/admin%24
unknown
unknown
1160
svchost.exe
GET
200
23.77.197.145:80
http://download.windowsupdate.com/d/msdownload/update/others/2023/04/38772905_132318e1274863ca561b542999ddd3b077a9e942.cab
unknown
compressed
7.66 Kb
unknown
1420
svchost.exe
PROPFIND
405
40.83.50.89:80
http://40.83.50.89/admin%24
unknown
html
1.26 Kb
unknown
1420
svchost.exe
PROPFIND
405
40.83.50.89:80
http://40.83.50.89/admin%24
unknown
html
1.26 Kb
unknown
1160
svchost.exe
GET
200
23.77.197.145:80
http://download.windowsupdate.com/d/msdownload/update/others/2020/06/32007343_2aebfdb6115e1eaccfbdc983de52833ac6b2cd39.cab
unknown
compressed
7.07 Kb
unknown
1420
svchost.exe
OPTIONS
400
104.115.33.219:80
http://104.115.33.219/admin%24/
unknown
html
209 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1160
svchost.exe
40.127.169.103:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1160
svchost.exe
40.83.50.89:443
fe2cr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.2:445
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
104.115.33.219:445
AKAMAI-AS
GB
unknown
192.168.100.30:49696
unknown
4
System
40.83.50.89:445
fe2cr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
192.168.100.30:49698
unknown
4420
rundll32.exe
192.168.100.2:80
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 104.77.160.148
whitelisted
fe2cr.update.microsoft.com
  • 40.83.50.89
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
download.windowsupdate.com
  • 23.77.197.145
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
4
System
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempt to connect to an external SMB server
4
System
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempt to connect to an external SMB server
1160
svchost.exe
Generic Protocol Command Decode
SURICATA HTTP Response invalid protocol
1420
svchost.exe
A Network Trojan was detected
ET MALWARE BadRabbit Ransomware Activity Via WebDAV (cscc)
2 ETPRO signatures available at the full report
No debug info