Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    18-05-2021 13:00

General

  • Target

    35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437.exe

  • Size

    258KB

  • MD5

    865f9e9a157c088e9f0a0c2a9c372e90

  • SHA1

    e893fe8942e7d9eb136fc21ee9800e58dda39851

  • SHA256

    35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437

  • SHA512

    e97968838b7969fd481fb9ba78e079f7d47133f1d15afdaa1890b7c21ace2504f3b43fff7149a42ffa186838fe0112a07d2b1f82fda00490da1010d024d70548

Malware Config

Signatures

  • GandCrab Payload 1 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437.exe
    "C:\Users\Admin\AppData\Local\Temp\35f91fc5eef67c4fcd843c9d2351f770d09c5ec4b4efc10ded35de84cfcb7437.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup politiaromana.bit ns1.virmach.ru
      2⤵
        PID:2772
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup malwarehunterteam.bit ns1.virmach.ru
        2⤵
          PID:3776
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup gdcb.bit ns2.virmach.ru
          2⤵
            PID:3944
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup politiaromana.bit ns2.virmach.ru
            2⤵
              PID:2204
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup malwarehunterteam.bit ns2.virmach.ru
              2⤵
                PID:652
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup gdcb.bit ns1.virmach.ru
                2⤵
                  PID:1584
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup politiaromana.bit ns1.virmach.ru
                  2⤵
                    PID:2324

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Defense Evasion

                Modify Registry

                1
                T1112

                Discovery

                Query Registry

                2
                T1012

                Peripheral Device Discovery

                1
                T1120

                System Information Discovery

                2
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/652-120-0x0000000000000000-mapping.dmp
                • memory/1584-121-0x0000000000000000-mapping.dmp
                • memory/2204-119-0x0000000000000000-mapping.dmp
                • memory/2324-122-0x0000000000000000-mapping.dmp
                • memory/2772-116-0x0000000000000000-mapping.dmp
                • memory/3776-117-0x0000000000000000-mapping.dmp
                • memory/3944-118-0x0000000000000000-mapping.dmp
                • memory/4036-114-0x0000000000400000-0x00000000007AE000-memory.dmp
                  Filesize

                  3.7MB

                • memory/4036-115-0x00000000001E0000-0x00000000001F6000-memory.dmp
                  Filesize

                  88KB