Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/09/2022, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
d018c0f55bf1787052ef0696561675dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d018c0f55bf1787052ef0696561675dd.exe
Resource
win10v2004-20220812-en
General
-
Target
d018c0f55bf1787052ef0696561675dd.exe
-
Size
320KB
-
MD5
d018c0f55bf1787052ef0696561675dd
-
SHA1
347ed16af2eb1d1fff11451d582ee9ef1ca09636
-
SHA256
7741d29a185a43f4697ac4b073b6897d2d1f6a2896b2e018c6ada118999caed7
-
SHA512
0eeeb0f4fed45107c24ef65d8307d75ea26760b32ec2720fe51000049b2def0b5e3a9b0b890e3f0d562d9231bf7e6eb4fc6384b58a3fddf08696e784f5b6d4a0
-
SSDEEP
3072:MbRXn2p4B/51pzVyqZ5iQ88ZJmj3h2OdyC9aNhw3cvo2bDi5fBbHHD+FtW89:Mb9+g/pzVwQ82Jm7h2As36CtaJHjN89
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/1280-56-0x0000000000400000-0x000000000238C000-memory.dmp family_gandcrab behavioral1/memory/1280-59-0x0000000000400000-0x000000000238C000-memory.dmp family_gandcrab behavioral1/memory/1280-60-0x00000000001C0000-0x00000000001D7000-memory.dmp family_gandcrab behavioral1/memory/1280-67-0x00000000001C0000-0x00000000001D7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d018c0f55bf1787052ef0696561675dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\jztvexrvkdg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\mhngrx.exe\"" d018c0f55bf1787052ef0696561675dd.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\N: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\V: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\W: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\B: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\F: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\H: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\L: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\Y: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\P: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\R: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\U: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\E: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\G: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\J: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\O: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\Z: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\A: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\I: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\K: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\Q: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\S: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\T: d018c0f55bf1787052ef0696561675dd.exe File opened (read-only) \??\X: d018c0f55bf1787052ef0696561675dd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d018c0f55bf1787052ef0696561675dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d018c0f55bf1787052ef0696561675dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier d018c0f55bf1787052ef0696561675dd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1280 d018c0f55bf1787052ef0696561675dd.exe 1280 d018c0f55bf1787052ef0696561675dd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1212 1280 d018c0f55bf1787052ef0696561675dd.exe 28 PID 1280 wrote to memory of 1212 1280 d018c0f55bf1787052ef0696561675dd.exe 28 PID 1280 wrote to memory of 1212 1280 d018c0f55bf1787052ef0696561675dd.exe 28 PID 1280 wrote to memory of 1212 1280 d018c0f55bf1787052ef0696561675dd.exe 28 PID 1280 wrote to memory of 2016 1280 d018c0f55bf1787052ef0696561675dd.exe 30 PID 1280 wrote to memory of 2016 1280 d018c0f55bf1787052ef0696561675dd.exe 30 PID 1280 wrote to memory of 2016 1280 d018c0f55bf1787052ef0696561675dd.exe 30 PID 1280 wrote to memory of 2016 1280 d018c0f55bf1787052ef0696561675dd.exe 30 PID 1280 wrote to memory of 1876 1280 d018c0f55bf1787052ef0696561675dd.exe 32 PID 1280 wrote to memory of 1876 1280 d018c0f55bf1787052ef0696561675dd.exe 32 PID 1280 wrote to memory of 1876 1280 d018c0f55bf1787052ef0696561675dd.exe 32 PID 1280 wrote to memory of 1876 1280 d018c0f55bf1787052ef0696561675dd.exe 32 PID 1280 wrote to memory of 1204 1280 d018c0f55bf1787052ef0696561675dd.exe 34 PID 1280 wrote to memory of 1204 1280 d018c0f55bf1787052ef0696561675dd.exe 34 PID 1280 wrote to memory of 1204 1280 d018c0f55bf1787052ef0696561675dd.exe 34 PID 1280 wrote to memory of 1204 1280 d018c0f55bf1787052ef0696561675dd.exe 34 PID 1280 wrote to memory of 1456 1280 d018c0f55bf1787052ef0696561675dd.exe 36 PID 1280 wrote to memory of 1456 1280 d018c0f55bf1787052ef0696561675dd.exe 36 PID 1280 wrote to memory of 1456 1280 d018c0f55bf1787052ef0696561675dd.exe 36 PID 1280 wrote to memory of 1456 1280 d018c0f55bf1787052ef0696561675dd.exe 36 PID 1280 wrote to memory of 1628 1280 d018c0f55bf1787052ef0696561675dd.exe 38 PID 1280 wrote to memory of 1628 1280 d018c0f55bf1787052ef0696561675dd.exe 38 PID 1280 wrote to memory of 1628 1280 d018c0f55bf1787052ef0696561675dd.exe 38 PID 1280 wrote to memory of 1628 1280 d018c0f55bf1787052ef0696561675dd.exe 38 PID 1280 wrote to memory of 456 1280 d018c0f55bf1787052ef0696561675dd.exe 40 PID 1280 wrote to memory of 456 1280 d018c0f55bf1787052ef0696561675dd.exe 40 PID 1280 wrote to memory of 456 1280 d018c0f55bf1787052ef0696561675dd.exe 40 PID 1280 wrote to memory of 456 1280 d018c0f55bf1787052ef0696561675dd.exe 40 PID 1280 wrote to memory of 1736 1280 d018c0f55bf1787052ef0696561675dd.exe 42 PID 1280 wrote to memory of 1736 1280 d018c0f55bf1787052ef0696561675dd.exe 42 PID 1280 wrote to memory of 1736 1280 d018c0f55bf1787052ef0696561675dd.exe 42 PID 1280 wrote to memory of 1736 1280 d018c0f55bf1787052ef0696561675dd.exe 42 PID 1280 wrote to memory of 1432 1280 d018c0f55bf1787052ef0696561675dd.exe 44 PID 1280 wrote to memory of 1432 1280 d018c0f55bf1787052ef0696561675dd.exe 44 PID 1280 wrote to memory of 1432 1280 d018c0f55bf1787052ef0696561675dd.exe 44 PID 1280 wrote to memory of 1432 1280 d018c0f55bf1787052ef0696561675dd.exe 44 PID 1280 wrote to memory of 1528 1280 d018c0f55bf1787052ef0696561675dd.exe 46 PID 1280 wrote to memory of 1528 1280 d018c0f55bf1787052ef0696561675dd.exe 46 PID 1280 wrote to memory of 1528 1280 d018c0f55bf1787052ef0696561675dd.exe 46 PID 1280 wrote to memory of 1528 1280 d018c0f55bf1787052ef0696561675dd.exe 46 PID 1280 wrote to memory of 568 1280 d018c0f55bf1787052ef0696561675dd.exe 48 PID 1280 wrote to memory of 568 1280 d018c0f55bf1787052ef0696561675dd.exe 48 PID 1280 wrote to memory of 568 1280 d018c0f55bf1787052ef0696561675dd.exe 48 PID 1280 wrote to memory of 568 1280 d018c0f55bf1787052ef0696561675dd.exe 48 PID 1280 wrote to memory of 780 1280 d018c0f55bf1787052ef0696561675dd.exe 50 PID 1280 wrote to memory of 780 1280 d018c0f55bf1787052ef0696561675dd.exe 50 PID 1280 wrote to memory of 780 1280 d018c0f55bf1787052ef0696561675dd.exe 50 PID 1280 wrote to memory of 780 1280 d018c0f55bf1787052ef0696561675dd.exe 50 PID 1280 wrote to memory of 888 1280 d018c0f55bf1787052ef0696561675dd.exe 52 PID 1280 wrote to memory of 888 1280 d018c0f55bf1787052ef0696561675dd.exe 52 PID 1280 wrote to memory of 888 1280 d018c0f55bf1787052ef0696561675dd.exe 52 PID 1280 wrote to memory of 888 1280 d018c0f55bf1787052ef0696561675dd.exe 52 PID 1280 wrote to memory of 692 1280 d018c0f55bf1787052ef0696561675dd.exe 54 PID 1280 wrote to memory of 692 1280 d018c0f55bf1787052ef0696561675dd.exe 54 PID 1280 wrote to memory of 692 1280 d018c0f55bf1787052ef0696561675dd.exe 54 PID 1280 wrote to memory of 692 1280 d018c0f55bf1787052ef0696561675dd.exe 54 PID 1280 wrote to memory of 1608 1280 d018c0f55bf1787052ef0696561675dd.exe 56 PID 1280 wrote to memory of 1608 1280 d018c0f55bf1787052ef0696561675dd.exe 56 PID 1280 wrote to memory of 1608 1280 d018c0f55bf1787052ef0696561675dd.exe 56 PID 1280 wrote to memory of 1608 1280 d018c0f55bf1787052ef0696561675dd.exe 56 PID 1280 wrote to memory of 1652 1280 d018c0f55bf1787052ef0696561675dd.exe 58 PID 1280 wrote to memory of 1652 1280 d018c0f55bf1787052ef0696561675dd.exe 58 PID 1280 wrote to memory of 1652 1280 d018c0f55bf1787052ef0696561675dd.exe 58 PID 1280 wrote to memory of 1652 1280 d018c0f55bf1787052ef0696561675dd.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\d018c0f55bf1787052ef0696561675dd.exe"C:\Users\Admin\AppData\Local\Temp\d018c0f55bf1787052ef0696561675dd.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1212
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1204
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1456
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1628
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:456
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1432
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:568
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:780
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1608
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1240
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1292
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:912
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1548
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1064
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:268
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:884
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:632
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1404
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1412
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:840
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:868
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1672
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1952
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:396
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:808
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1096
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1264
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1760
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1288
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1536
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1880
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:880
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1092
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1668
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1132
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:776
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1644
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1488
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2004
-