Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    18-05-2021 13:00

General

  • Target

    35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437.exe

  • Size

    258KB

  • MD5

    865f9e9a157c088e9f0a0c2a9c372e90

  • SHA1

    e893fe8942e7d9eb136fc21ee9800e58dda39851

  • SHA256

    35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437

  • SHA512

    e97968838b7969fd481fb9ba78e079f7d47133f1d15afdaa1890b7c21ace2504f3b43fff7149a42ffa186838fe0112a07d2b1f82fda00490da1010d024d70548

Malware Config

Signatures

  • GandCrab Payload 1 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437.exe
    "C:\Users\Admin\AppData\Local\Temp\35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup politiaromana.bit ns1.virmach.ru
      2⤵
        PID:1788
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup malwarehunterteam.bit ns1.virmach.ru
        2⤵
          PID:600
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup gdcb.bit ns2.virmach.ru
          2⤵
            PID:804
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup politiaromana.bit ns2.virmach.ru
            2⤵
              PID:1428
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup malwarehunterteam.bit ns2.virmach.ru
              2⤵
                PID:1748

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Modify Registry

            1
            T1112

            Discovery

            Query Registry

            2
            T1012

            Peripheral Device Discovery

            1
            T1120

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/600-64-0x0000000000000000-mapping.dmp
            • memory/804-65-0x0000000000000000-mapping.dmp
            • memory/1428-66-0x0000000000000000-mapping.dmp
            • memory/1700-60-0x00000000762C1000-0x00000000762C3000-memory.dmp
              Filesize

              8KB

            • memory/1700-61-0x0000000000400000-0x00000000007AE000-memory.dmp
              Filesize

              3.7MB

            • memory/1700-62-0x00000000003C0000-0x00000000003D6000-memory.dmp
              Filesize

              88KB

            • memory/1748-67-0x0000000000000000-mapping.dmp
            • memory/1788-63-0x0000000000000000-mapping.dmp