Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
8d73eacdff0bfcb9da899b46c499afdb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d73eacdff0bfcb9da899b46c499afdb.exe
Resource
win10v2004-20220812-en
General
-
Target
8d73eacdff0bfcb9da899b46c499afdb.exe
-
Size
320KB
-
MD5
8d73eacdff0bfcb9da899b46c499afdb
-
SHA1
1031be5c0c0dd01db19d89e14471cef850265380
-
SHA256
adde1a9a303d82f6f9ef62e78d0bc73ed87947e68899f4c6f76c6ba4297119dc
-
SHA512
80d226eb92bff34358cf69cc2f3b67e15e75ed8cf49a5b07ab51353dbe0d228ee2e5dedbdae26b8337d5e239ff9d74fd9c85492065df6f1812f025256f5b5b29
-
SSDEEP
3072:6bRXn2p4B/51pzVyqZ5iQ88ZJmj3h2OdyC9aNhw3cvo2bDi5fBbHHD+FtW89:6b9+g/pzVwQ82Jm7h2As36CtaJHjN89
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/1456-56-0x0000000000400000-0x000000000238C000-memory.dmp family_gandcrab behavioral1/memory/1456-59-0x0000000000400000-0x000000000238C000-memory.dmp family_gandcrab behavioral1/memory/1456-60-0x00000000002E0000-0x00000000002F7000-memory.dmp family_gandcrab behavioral1/memory/1456-65-0x00000000002E0000-0x00000000002F7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8d73eacdff0bfcb9da899b46c499afdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\mtlcogbezfq = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\tcjogf.exe\"" 8d73eacdff0bfcb9da899b46c499afdb.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\P: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\S: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\V: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\X: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\Y: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\K: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\L: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\Z: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\Q: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\T: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\W: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\B: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\M: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\O: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\R: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\E: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\H: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\G: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\I: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\J: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\U: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\A: 8d73eacdff0bfcb9da899b46c499afdb.exe File opened (read-only) \??\F: 8d73eacdff0bfcb9da899b46c499afdb.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8d73eacdff0bfcb9da899b46c499afdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8d73eacdff0bfcb9da899b46c499afdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8d73eacdff0bfcb9da899b46c499afdb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 1456 8d73eacdff0bfcb9da899b46c499afdb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1380 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 26 PID 1456 wrote to memory of 1380 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 26 PID 1456 wrote to memory of 1380 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 26 PID 1456 wrote to memory of 1380 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 26 PID 1456 wrote to memory of 1404 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 28 PID 1456 wrote to memory of 1404 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 28 PID 1456 wrote to memory of 1404 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 28 PID 1456 wrote to memory of 1404 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 28 PID 1456 wrote to memory of 108 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 30 PID 1456 wrote to memory of 108 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 30 PID 1456 wrote to memory of 108 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 30 PID 1456 wrote to memory of 108 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 30 PID 1456 wrote to memory of 1664 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 32 PID 1456 wrote to memory of 1664 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 32 PID 1456 wrote to memory of 1664 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 32 PID 1456 wrote to memory of 1664 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 32 PID 1456 wrote to memory of 1172 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 34 PID 1456 wrote to memory of 1172 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 34 PID 1456 wrote to memory of 1172 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 34 PID 1456 wrote to memory of 1172 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 34 PID 1456 wrote to memory of 1840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 36 PID 1456 wrote to memory of 1840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 36 PID 1456 wrote to memory of 1840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 36 PID 1456 wrote to memory of 1840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 36 PID 1456 wrote to memory of 1964 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 38 PID 1456 wrote to memory of 1964 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 38 PID 1456 wrote to memory of 1964 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 38 PID 1456 wrote to memory of 1964 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 38 PID 1456 wrote to memory of 756 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 40 PID 1456 wrote to memory of 756 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 40 PID 1456 wrote to memory of 756 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 40 PID 1456 wrote to memory of 756 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 40 PID 1456 wrote to memory of 1724 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 42 PID 1456 wrote to memory of 1724 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 42 PID 1456 wrote to memory of 1724 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 42 PID 1456 wrote to memory of 1724 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 42 PID 1456 wrote to memory of 840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 44 PID 1456 wrote to memory of 840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 44 PID 1456 wrote to memory of 840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 44 PID 1456 wrote to memory of 840 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 44 PID 1456 wrote to memory of 700 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 46 PID 1456 wrote to memory of 700 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 46 PID 1456 wrote to memory of 700 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 46 PID 1456 wrote to memory of 700 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 46 PID 1456 wrote to memory of 836 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 48 PID 1456 wrote to memory of 836 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 48 PID 1456 wrote to memory of 836 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 48 PID 1456 wrote to memory of 836 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 48 PID 1456 wrote to memory of 692 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 50 PID 1456 wrote to memory of 692 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 50 PID 1456 wrote to memory of 692 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 50 PID 1456 wrote to memory of 692 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 50 PID 1456 wrote to memory of 1744 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 52 PID 1456 wrote to memory of 1744 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 52 PID 1456 wrote to memory of 1744 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 52 PID 1456 wrote to memory of 1744 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 52 PID 1456 wrote to memory of 2012 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 54 PID 1456 wrote to memory of 2012 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 54 PID 1456 wrote to memory of 2012 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 54 PID 1456 wrote to memory of 2012 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 54 PID 1456 wrote to memory of 1928 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 56 PID 1456 wrote to memory of 1928 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 56 PID 1456 wrote to memory of 1928 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 56 PID 1456 wrote to memory of 1928 1456 8d73eacdff0bfcb9da899b46c499afdb.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d73eacdff0bfcb9da899b46c499afdb.exe"C:\Users\Admin\AppData\Local\Temp\8d73eacdff0bfcb9da899b46c499afdb.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1380
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1404
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1172
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1840
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1724
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:840
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1352
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:952
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:436
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2000
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1488
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:288
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1956
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2032
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1804
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1644
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1496
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1604
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1152
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1272
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1768
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1332
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:552
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1304
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1824
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:668
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:808
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1760
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1476
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1924
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1516
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1464
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1572
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:632
-