Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-09-2022 21:30
Static task
static1
Behavioral task
behavioral1
Sample
0aa705e527e09af6efefc9a512707d17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0aa705e527e09af6efefc9a512707d17.exe
Resource
win10v2004-20220812-en
General
-
Target
0aa705e527e09af6efefc9a512707d17.exe
-
Size
320KB
-
MD5
0aa705e527e09af6efefc9a512707d17
-
SHA1
550420ae3a52dfd7b710ca1a15c623db24f1131f
-
SHA256
415cd8268a08158590ab882374355b5295b0587e5f270716736727b047d38dcc
-
SHA512
a3c2ed6393e891b43df554b2c080e8b694fabb1dae52e0980744f5d0f4ab38fdcb637cd35870b987ec264d231ebe629de4b1c8378b17891d05bcc6d6317f8e9c
-
SSDEEP
3072:4bRXn2p4B/51pzVyqZ5iQ88ZJmj3h2OdyC9aNhw3cvo2bDi5fBbHHD+FtW89:4b9+g/pzVwQ82Jm7h2As36CtaJHjN89
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/828-56-0x0000000000400000-0x000000000238C000-memory.dmp family_gandcrab behavioral1/memory/828-59-0x0000000000400000-0x000000000238C000-memory.dmp family_gandcrab behavioral1/memory/828-60-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab behavioral1/memory/828-66-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0aa705e527e09af6efefc9a512707d17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fpipjvtbjvo = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\yldclb.exe\"" 0aa705e527e09af6efefc9a512707d17.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\J: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\Q: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\W: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\Y: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\X: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\P: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\R: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\S: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\T: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\V: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\K: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\L: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\N: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\A: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\B: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\E: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\F: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\I: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\O: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\G: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\M: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\U: 0aa705e527e09af6efefc9a512707d17.exe File opened (read-only) \??\Z: 0aa705e527e09af6efefc9a512707d17.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 0aa705e527e09af6efefc9a512707d17.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0aa705e527e09af6efefc9a512707d17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0aa705e527e09af6efefc9a512707d17.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 828 0aa705e527e09af6efefc9a512707d17.exe 828 0aa705e527e09af6efefc9a512707d17.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 828 wrote to memory of 856 828 0aa705e527e09af6efefc9a512707d17.exe 27 PID 828 wrote to memory of 856 828 0aa705e527e09af6efefc9a512707d17.exe 27 PID 828 wrote to memory of 856 828 0aa705e527e09af6efefc9a512707d17.exe 27 PID 828 wrote to memory of 856 828 0aa705e527e09af6efefc9a512707d17.exe 27 PID 828 wrote to memory of 1556 828 0aa705e527e09af6efefc9a512707d17.exe 29 PID 828 wrote to memory of 1556 828 0aa705e527e09af6efefc9a512707d17.exe 29 PID 828 wrote to memory of 1556 828 0aa705e527e09af6efefc9a512707d17.exe 29 PID 828 wrote to memory of 1556 828 0aa705e527e09af6efefc9a512707d17.exe 29 PID 828 wrote to memory of 1528 828 0aa705e527e09af6efefc9a512707d17.exe 31 PID 828 wrote to memory of 1528 828 0aa705e527e09af6efefc9a512707d17.exe 31 PID 828 wrote to memory of 1528 828 0aa705e527e09af6efefc9a512707d17.exe 31 PID 828 wrote to memory of 1528 828 0aa705e527e09af6efefc9a512707d17.exe 31 PID 828 wrote to memory of 1180 828 0aa705e527e09af6efefc9a512707d17.exe 33 PID 828 wrote to memory of 1180 828 0aa705e527e09af6efefc9a512707d17.exe 33 PID 828 wrote to memory of 1180 828 0aa705e527e09af6efefc9a512707d17.exe 33 PID 828 wrote to memory of 1180 828 0aa705e527e09af6efefc9a512707d17.exe 33 PID 828 wrote to memory of 1612 828 0aa705e527e09af6efefc9a512707d17.exe 35 PID 828 wrote to memory of 1612 828 0aa705e527e09af6efefc9a512707d17.exe 35 PID 828 wrote to memory of 1612 828 0aa705e527e09af6efefc9a512707d17.exe 35 PID 828 wrote to memory of 1612 828 0aa705e527e09af6efefc9a512707d17.exe 35 PID 828 wrote to memory of 1100 828 0aa705e527e09af6efefc9a512707d17.exe 37 PID 828 wrote to memory of 1100 828 0aa705e527e09af6efefc9a512707d17.exe 37 PID 828 wrote to memory of 1100 828 0aa705e527e09af6efefc9a512707d17.exe 37 PID 828 wrote to memory of 1100 828 0aa705e527e09af6efefc9a512707d17.exe 37 PID 828 wrote to memory of 2012 828 0aa705e527e09af6efefc9a512707d17.exe 39 PID 828 wrote to memory of 2012 828 0aa705e527e09af6efefc9a512707d17.exe 39 PID 828 wrote to memory of 2012 828 0aa705e527e09af6efefc9a512707d17.exe 39 PID 828 wrote to memory of 2012 828 0aa705e527e09af6efefc9a512707d17.exe 39 PID 828 wrote to memory of 1888 828 0aa705e527e09af6efefc9a512707d17.exe 41 PID 828 wrote to memory of 1888 828 0aa705e527e09af6efefc9a512707d17.exe 41 PID 828 wrote to memory of 1888 828 0aa705e527e09af6efefc9a512707d17.exe 41 PID 828 wrote to memory of 1888 828 0aa705e527e09af6efefc9a512707d17.exe 41 PID 828 wrote to memory of 1184 828 0aa705e527e09af6efefc9a512707d17.exe 43 PID 828 wrote to memory of 1184 828 0aa705e527e09af6efefc9a512707d17.exe 43 PID 828 wrote to memory of 1184 828 0aa705e527e09af6efefc9a512707d17.exe 43 PID 828 wrote to memory of 1184 828 0aa705e527e09af6efefc9a512707d17.exe 43 PID 828 wrote to memory of 548 828 0aa705e527e09af6efefc9a512707d17.exe 45 PID 828 wrote to memory of 548 828 0aa705e527e09af6efefc9a512707d17.exe 45 PID 828 wrote to memory of 548 828 0aa705e527e09af6efefc9a512707d17.exe 45 PID 828 wrote to memory of 548 828 0aa705e527e09af6efefc9a512707d17.exe 45 PID 828 wrote to memory of 1604 828 0aa705e527e09af6efefc9a512707d17.exe 47 PID 828 wrote to memory of 1604 828 0aa705e527e09af6efefc9a512707d17.exe 47 PID 828 wrote to memory of 1604 828 0aa705e527e09af6efefc9a512707d17.exe 47 PID 828 wrote to memory of 1604 828 0aa705e527e09af6efefc9a512707d17.exe 47 PID 828 wrote to memory of 1552 828 0aa705e527e09af6efefc9a512707d17.exe 49 PID 828 wrote to memory of 1552 828 0aa705e527e09af6efefc9a512707d17.exe 49 PID 828 wrote to memory of 1552 828 0aa705e527e09af6efefc9a512707d17.exe 49 PID 828 wrote to memory of 1552 828 0aa705e527e09af6efefc9a512707d17.exe 49 PID 828 wrote to memory of 2028 828 0aa705e527e09af6efefc9a512707d17.exe 51 PID 828 wrote to memory of 2028 828 0aa705e527e09af6efefc9a512707d17.exe 51 PID 828 wrote to memory of 2028 828 0aa705e527e09af6efefc9a512707d17.exe 51 PID 828 wrote to memory of 2028 828 0aa705e527e09af6efefc9a512707d17.exe 51 PID 828 wrote to memory of 1460 828 0aa705e527e09af6efefc9a512707d17.exe 53 PID 828 wrote to memory of 1460 828 0aa705e527e09af6efefc9a512707d17.exe 53 PID 828 wrote to memory of 1460 828 0aa705e527e09af6efefc9a512707d17.exe 53 PID 828 wrote to memory of 1460 828 0aa705e527e09af6efefc9a512707d17.exe 53 PID 828 wrote to memory of 1544 828 0aa705e527e09af6efefc9a512707d17.exe 55 PID 828 wrote to memory of 1544 828 0aa705e527e09af6efefc9a512707d17.exe 55 PID 828 wrote to memory of 1544 828 0aa705e527e09af6efefc9a512707d17.exe 55 PID 828 wrote to memory of 1544 828 0aa705e527e09af6efefc9a512707d17.exe 55 PID 828 wrote to memory of 932 828 0aa705e527e09af6efefc9a512707d17.exe 57 PID 828 wrote to memory of 932 828 0aa705e527e09af6efefc9a512707d17.exe 57 PID 828 wrote to memory of 932 828 0aa705e527e09af6efefc9a512707d17.exe 57 PID 828 wrote to memory of 932 828 0aa705e527e09af6efefc9a512707d17.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aa705e527e09af6efefc9a512707d17.exe"C:\Users\Admin\AppData\Local\Temp\0aa705e527e09af6efefc9a512707d17.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:856
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1556
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1100
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1184
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:548
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1604
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1552
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2028
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1460
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:932
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1352
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1452
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1808
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1588
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1096
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:936
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1640
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1396
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2032
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2008
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1680
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1548
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1436
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1832
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:556
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1204
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1596
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:288
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1912
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1464
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1504
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1920
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1708
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:552
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1144
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:516
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1236
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1368
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1676
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1280
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1964
-