329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample
329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
99KB
26-07-2021 13:35
78efe80384fa759964c9ea8bada3ac8d
6300dca046dee2d99f8429bdb9b5f3edc4d5ec1c
329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9
Extracted
Path | C:\HHZLMFN-DECRYPT.txt |
Family | gandcrab |
Ransom Note |
---= GANDCRAB V5.2 =---
***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED***********************
*****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS*****
Attention!
All your files, documents, photos, databases and other important files are encrypted and have the extension: .HHZLMFN
The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files.
The server with your key is in a closed network TOR. You can get there by the following ways:
----------------------------------------------------------------------------------------
| 0. Download Tor browser - https://www.torproject.org/
| 1. Install Tor browser
| 2. Open Tor Browser
| 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/8b5050ff5179efd
| 4. Follow the instructions on this page
----------------------------------------------------------------------------------------
On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free.
ATTENTION!
IN ORDER TO PREVENT DATA DAMAGE:
* DO NOT MODIFY ENCRYPTED FILES
* DO NOT CHANGE DATA BELOW
---BEGIN GANDCRAB KEY---
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
---END GANDCRAB KEY---
---BEGIN PC DATA---
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
---END PC DATA---
|
URLs |
http://gandcrabmfe6mnef.onion/8b5050ff5179efd |
Filter: none
-
Gandcrab
Description
Gandcrab is a Trojan horse that encrypts files on a computer.
Tags
-
Deletes shadow copies
Description
Ransomware often targets backup files to inhibit system recovery.
Tags
TTPs
-
Modifies extensions of user files329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Description
Ransomware generally changes the extension on encrypted files.
Tags
Reported IOCs
description ioc process File renamed C:\Users\Admin\Pictures\DismountTrace.png => C:\Users\Admin\Pictures\DismountTrace.png.hhzlmfn 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File renamed C:\Users\Admin\Pictures\PublishSync.crw => C:\Users\Admin\Pictures\PublishSync.crw.hhzlmfn 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File renamed C:\Users\Admin\Pictures\ShowCompress.raw => C:\Users\Admin\Pictures\ShowCompress.raw.hhzlmfn 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File renamed C:\Users\Admin\Pictures\UnpublishLimit.tif => C:\Users\Admin\Pictures\UnpublishLimit.tif.hhzlmfn 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File renamed C:\Users\Admin\Pictures\CloseInvoke.png => C:\Users\Admin\Pictures\CloseInvoke.png.hhzlmfn 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File renamed C:\Users\Admin\Pictures\DismountRename.png => C:\Users\Admin\Pictures\DismountRename.png.hhzlmfn 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Drops startup file329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Reported IOCs
description ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HHZLMFN-DECRYPT.txt 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\f517991df5179efc612.lock 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Enumerates connected drives329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Description
Attempts to read the root path of hard drives other than the default C: drive.
TTPs
Reported IOCs
description ioc process File opened (read-only) \??\Y: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\A: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\E: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\F: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\M: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\P: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\Q: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\X: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\Z: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\U: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\B: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\J: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\K: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\L: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\N: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\O: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\T: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\V: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\W: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\H: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\I: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\G: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\R: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened (read-only) \??\S: 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Sets desktop wallpaper using registry329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\bxmeoengtf.bmp" 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Drops file in Program Files directory329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Reported IOCs
description ioc process File opened for modification C:\Program Files\EnableSkip.cfg 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\InvokeShow.mhtml 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RenameUndo.wmx 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\ResumeOut.vst 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\CompareBlock.wmf 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RenameUse.css 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RepairLimit.au 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RevokeOut.xltm 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\UnblockUpdate.pcx 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\WaitCompare.bmp 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File created C:\Program Files (x86)\f517991df5179efc612.lock 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\EditOut.jpg 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\ExportTrace.emf 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RemoveAssert.wmf 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\SwitchApprove.mp4 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\UseLock.rtf 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File created C:\Program Files\HHZLMFN-DECRYPT.txt 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\BackupUnpublish.tif 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\DenyResolve.jpeg 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\InstallComplete.tif 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RegisterClose.mpeg3 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File opened for modification C:\Program Files\RemoveResume.ttf 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File created C:\Program Files (x86)\HHZLMFN-DECRYPT.txt 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe File created C:\Program Files\f517991df5179efc612.lock 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Checks processor information in registry329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Suspicious behavior: EnumeratesProcesses329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Reported IOCs
pid process 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe -
Suspicious use of AdjustPrivilegeToken329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exewmic.exevssvc.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe Token: SeIncreaseQuotaPrivilege 1960 wmic.exe Token: SeSecurityPrivilege 1960 wmic.exe Token: SeTakeOwnershipPrivilege 1960 wmic.exe Token: SeLoadDriverPrivilege 1960 wmic.exe Token: SeSystemProfilePrivilege 1960 wmic.exe Token: SeSystemtimePrivilege 1960 wmic.exe Token: SeProfSingleProcessPrivilege 1960 wmic.exe Token: SeIncBasePriorityPrivilege 1960 wmic.exe Token: SeCreatePagefilePrivilege 1960 wmic.exe Token: SeBackupPrivilege 1960 wmic.exe Token: SeRestorePrivilege 1960 wmic.exe Token: SeShutdownPrivilege 1960 wmic.exe Token: SeDebugPrivilege 1960 wmic.exe Token: SeSystemEnvironmentPrivilege 1960 wmic.exe Token: SeRemoteShutdownPrivilege 1960 wmic.exe Token: SeUndockPrivilege 1960 wmic.exe Token: SeManageVolumePrivilege 1960 wmic.exe Token: 33 1960 wmic.exe Token: 34 1960 wmic.exe Token: 35 1960 wmic.exe Token: 36 1960 wmic.exe Token: SeIncreaseQuotaPrivilege 1960 wmic.exe Token: SeSecurityPrivilege 1960 wmic.exe Token: SeTakeOwnershipPrivilege 1960 wmic.exe Token: SeLoadDriverPrivilege 1960 wmic.exe Token: SeSystemProfilePrivilege 1960 wmic.exe Token: SeSystemtimePrivilege 1960 wmic.exe Token: SeProfSingleProcessPrivilege 1960 wmic.exe Token: SeIncBasePriorityPrivilege 1960 wmic.exe Token: SeCreatePagefilePrivilege 1960 wmic.exe Token: SeBackupPrivilege 1960 wmic.exe Token: SeRestorePrivilege 1960 wmic.exe Token: SeShutdownPrivilege 1960 wmic.exe Token: SeDebugPrivilege 1960 wmic.exe Token: SeSystemEnvironmentPrivilege 1960 wmic.exe Token: SeRemoteShutdownPrivilege 1960 wmic.exe Token: SeUndockPrivilege 1960 wmic.exe Token: SeManageVolumePrivilege 1960 wmic.exe Token: 33 1960 wmic.exe Token: 34 1960 wmic.exe Token: 35 1960 wmic.exe Token: 36 1960 wmic.exe Token: SeBackupPrivilege 200 vssvc.exe Token: SeRestorePrivilege 200 vssvc.exe Token: SeAuditPrivilege 200 vssvc.exe -
Suspicious use of WriteProcessMemory329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe
Reported IOCs
description pid process target process PID 348 wrote to memory of 1960 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe wmic.exe PID 348 wrote to memory of 1960 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe wmic.exe PID 348 wrote to memory of 1960 348 329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe wmic.exe
-
C:\Users\Admin\AppData\Local\Temp\329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe"C:\Users\Admin\AppData\Local\Temp\329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.sample.exe"Modifies extensions of user filesDrops startup fileEnumerates connected drivesSets desktop wallpaper using registryDrops file in Program Files directoryChecks processor information in registrySuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy deleteSuspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeSuspicious use of AdjustPrivilegeToken
-
memory/1960-114-0x0000000000000000-mapping.dmp