Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
ransomware.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ransomware.exe
Resource
win10v2004-20220812-en
General
-
Target
ransomware.exe
-
Size
4.2MB
-
MD5
b80a4735eed794b80ef2a224fdbd04d6
-
SHA1
3c7fc076336a1de52005f63499820fbef8c5055d
-
SHA256
a244fde869a19cd9810260b250888229855420021a24e28f9b56f2659c08bc32
-
SHA512
b60db6d574712916218e0eeaea4dcc0d72934b2d752d93cef40b23039b2650d270c50fc507e1e69b7906f3505d3920c19f509f0ae2249b2580eb23ebc27fa9f0
-
SSDEEP
49152:xo0QvL0/tQEUsAwKN1z9yqvY69nnF1hBELuOXTT6HLzGvcpENXMAgCDQz/SS:xo0CL0fZMjs6HLyNcpCDQ
Malware Config
Extracted
C:\RICUHFEVR-DECRYPT.txt
http://gandcrabmfe6mnef.onion/b671c6df70a61421
Signatures
-
GandCrab payload 1 IoCs
resource yara_rule behavioral2/memory/5048-137-0x0000000000400000-0x0000000000428000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 2000 TigerWarrior2.2266793134.exe -
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnregisterReceive.raw => C:\Users\Admin\Pictures\UnregisterReceive.raw.ricuhfevr wermgr.exe File opened for modification C:\Users\Admin\Pictures\BlockConvertFrom.tiff wermgr.exe File renamed C:\Users\Admin\Pictures\BlockConvertFrom.tiff => C:\Users\Admin\Pictures\BlockConvertFrom.tiff.ricuhfevr wermgr.exe File renamed C:\Users\Admin\Pictures\SplitNew.tif => C:\Users\Admin\Pictures\SplitNew.tif.ricuhfevr wermgr.exe File renamed C:\Users\Admin\Pictures\SwitchProtect.tif => C:\Users\Admin\Pictures\SwitchProtect.tif.ricuhfevr wermgr.exe File renamed C:\Users\Admin\Pictures\RestoreOut.raw => C:\Users\Admin\Pictures\RestoreOut.raw.ricuhfevr wermgr.exe File renamed C:\Users\Admin\Pictures\WritePublish.png => C:\Users\Admin\Pictures\WritePublish.png.ricuhfevr wermgr.exe File renamed C:\Users\Admin\Pictures\EnterStep.crw => C:\Users\Admin\Pictures\EnterStep.crw.ricuhfevr wermgr.exe File opened for modification C:\Users\Admin\Pictures\FormatMount.tiff wermgr.exe File renamed C:\Users\Admin\Pictures\FormatMount.tiff => C:\Users\Admin\Pictures\FormatMount.tiff.ricuhfevr wermgr.exe File renamed C:\Users\Admin\Pictures\NewCompare.crw => C:\Users\Admin\Pictures\NewCompare.crw.ricuhfevr wermgr.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\70a613c270a6142d214.lock wermgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RICUHFEVR-DECRYPT.txt wermgr.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: wermgr.exe File opened (read-only) \??\N: wermgr.exe File opened (read-only) \??\O: wermgr.exe File opened (read-only) \??\U: wermgr.exe File opened (read-only) \??\W: wermgr.exe File opened (read-only) \??\G: wermgr.exe File opened (read-only) \??\H: wermgr.exe File opened (read-only) \??\F: wermgr.exe File opened (read-only) \??\L: wermgr.exe File opened (read-only) \??\R: wermgr.exe File opened (read-only) \??\V: wermgr.exe File opened (read-only) \??\X: wermgr.exe File opened (read-only) \??\Z: wermgr.exe File opened (read-only) \??\A: wermgr.exe File opened (read-only) \??\B: wermgr.exe File opened (read-only) \??\Y: wermgr.exe File opened (read-only) \??\E: wermgr.exe File opened (read-only) \??\K: wermgr.exe File opened (read-only) \??\P: wermgr.exe File opened (read-only) \??\Q: wermgr.exe File opened (read-only) \??\S: wermgr.exe File opened (read-only) \??\T: wermgr.exe File opened (read-only) \??\I: wermgr.exe File opened (read-only) \??\J: wermgr.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\pidor.bmp" wermgr.exe -
Drops file in Program Files directory 39 IoCs
description ioc Process File opened for modification C:\Program Files\OpenHide.php wermgr.exe File opened for modification C:\Program Files\OptimizeConvert.svg wermgr.exe File opened for modification C:\Program Files\SkipSubmit.tmp wermgr.exe File opened for modification C:\Program Files\ExpandOpen.mpg wermgr.exe File opened for modification C:\Program Files\JoinConvertTo.m1v wermgr.exe File opened for modification C:\Program Files\UninstallWatch.vsdx wermgr.exe File created C:\Program Files (x86)\RICUHFEVR-DECRYPT.txt wermgr.exe File created C:\Program Files (x86)\70a613c270a6142d214.lock wermgr.exe File created C:\Program Files\70a613c270a6142d214.lock wermgr.exe File opened for modification C:\Program Files\ExportRequest.xlsx wermgr.exe File opened for modification C:\Program Files\RegisterWrite.dwg wermgr.exe File opened for modification C:\Program Files\RestoreRepair.DVR wermgr.exe File opened for modification C:\Program Files\ResumeMount.au wermgr.exe File opened for modification C:\Program Files\SplitProtect.ex_ wermgr.exe File opened for modification C:\Program Files\SubmitUndo.mpeg wermgr.exe File created C:\Program Files\RICUHFEVR-DECRYPT.txt wermgr.exe File opened for modification C:\Program Files\BlockApprove.TTS wermgr.exe File opened for modification C:\Program Files\EnableConfirm.MTS wermgr.exe File opened for modification C:\Program Files\ExpandRevoke.TTS wermgr.exe File opened for modification C:\Program Files\InvokeUnprotect.xlt wermgr.exe File opened for modification C:\Program Files\RequestEnable.edrwx wermgr.exe File opened for modification C:\Program Files\SuspendEdit.3gp2 wermgr.exe File opened for modification C:\Program Files\ExportPop.DVR-MS wermgr.exe File opened for modification C:\Program Files\HideSwitch.reg wermgr.exe File opened for modification C:\Program Files\InvokeUninstall.mhtml wermgr.exe File opened for modification C:\Program Files\ProtectCopy.dwfx wermgr.exe File opened for modification C:\Program Files\SuspendPop.php wermgr.exe File opened for modification C:\Program Files\WatchDisable.vsdm wermgr.exe File opened for modification C:\Program Files\PopEnable.xls wermgr.exe File opened for modification C:\Program Files\SearchOptimize.ttf wermgr.exe File opened for modification C:\Program Files\ApproveRegister.asx wermgr.exe File opened for modification C:\Program Files\DisconnectPing.html wermgr.exe File opened for modification C:\Program Files\EnterInvoke.aiff wermgr.exe File opened for modification C:\Program Files\LimitReceive.xltx wermgr.exe File opened for modification C:\Program Files\PopInvoke.dwg wermgr.exe File opened for modification C:\Program Files\PushProtect.xml wermgr.exe File opened for modification C:\Program Files\FindReset.mp2v wermgr.exe File opened for modification C:\Program Files\ResolveEnter.mpg wermgr.exe File opened for modification C:\Program Files\ResumeEnable.wmv wermgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wermgr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5048 wermgr.exe 5048 wermgr.exe 5048 wermgr.exe 5048 wermgr.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1920 wmic.exe Token: SeSecurityPrivilege 1920 wmic.exe Token: SeTakeOwnershipPrivilege 1920 wmic.exe Token: SeLoadDriverPrivilege 1920 wmic.exe Token: SeSystemProfilePrivilege 1920 wmic.exe Token: SeSystemtimePrivilege 1920 wmic.exe Token: SeProfSingleProcessPrivilege 1920 wmic.exe Token: SeIncBasePriorityPrivilege 1920 wmic.exe Token: SeCreatePagefilePrivilege 1920 wmic.exe Token: SeBackupPrivilege 1920 wmic.exe Token: SeRestorePrivilege 1920 wmic.exe Token: SeShutdownPrivilege 1920 wmic.exe Token: SeDebugPrivilege 1920 wmic.exe Token: SeSystemEnvironmentPrivilege 1920 wmic.exe Token: SeRemoteShutdownPrivilege 1920 wmic.exe Token: SeUndockPrivilege 1920 wmic.exe Token: SeManageVolumePrivilege 1920 wmic.exe Token: 33 1920 wmic.exe Token: 34 1920 wmic.exe Token: 35 1920 wmic.exe Token: 36 1920 wmic.exe Token: SeIncreaseQuotaPrivilege 1920 wmic.exe Token: SeSecurityPrivilege 1920 wmic.exe Token: SeTakeOwnershipPrivilege 1920 wmic.exe Token: SeLoadDriverPrivilege 1920 wmic.exe Token: SeSystemProfilePrivilege 1920 wmic.exe Token: SeSystemtimePrivilege 1920 wmic.exe Token: SeProfSingleProcessPrivilege 1920 wmic.exe Token: SeIncBasePriorityPrivilege 1920 wmic.exe Token: SeCreatePagefilePrivilege 1920 wmic.exe Token: SeBackupPrivilege 1920 wmic.exe Token: SeRestorePrivilege 1920 wmic.exe Token: SeShutdownPrivilege 1920 wmic.exe Token: SeDebugPrivilege 1920 wmic.exe Token: SeSystemEnvironmentPrivilege 1920 wmic.exe Token: SeRemoteShutdownPrivilege 1920 wmic.exe Token: SeUndockPrivilege 1920 wmic.exe Token: SeManageVolumePrivilege 1920 wmic.exe Token: 33 1920 wmic.exe Token: 34 1920 wmic.exe Token: 35 1920 wmic.exe Token: 36 1920 wmic.exe Token: SeBackupPrivilege 4704 vssvc.exe Token: SeRestorePrivilege 4704 vssvc.exe Token: SeAuditPrivilege 4704 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 660 wrote to memory of 2000 660 ransomware.exe 83 PID 660 wrote to memory of 2000 660 ransomware.exe 83 PID 660 wrote to memory of 2000 660 ransomware.exe 83 PID 2000 wrote to memory of 5048 2000 TigerWarrior2.2266793134.exe 88 PID 2000 wrote to memory of 5048 2000 TigerWarrior2.2266793134.exe 88 PID 2000 wrote to memory of 5048 2000 TigerWarrior2.2266793134.exe 88 PID 2000 wrote to memory of 5048 2000 TigerWarrior2.2266793134.exe 88 PID 2000 wrote to memory of 5048 2000 TigerWarrior2.2266793134.exe 88 PID 5048 wrote to memory of 1920 5048 wermgr.exe 93 PID 5048 wrote to memory of 1920 5048 wermgr.exe 93 PID 5048 wrote to memory of 1920 5048 wermgr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ransomware.exe"C:\Users\Admin\AppData\Local\Temp\ransomware.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\TigerWarrior2.2266793134.exeC:\Users\Admin\AppData\Local\Temp\TigerWarrior2.2266793134.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\System32\wermgr.exe"3⤵
- Modifies extensions of user files
- Drops startup file
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD523966228f4f52120ae3057c158c327f0
SHA102b6a200b1ac97cd854caba4e3a9a6593ef7c675
SHA256db53a5dd001f4827b017584f1e826e5605e881f3af22153f1e1daa4ca231b2ff
SHA512f4ae14bd4faf8e2efd98e8af18bdf950a2ed5cec4940d37c861bc16fdbc4d679f9b9de7dc24e0859e544e41e3e50a3914d83ebe3f40fb3a3d5c7cc2cdb695552
-
Filesize
712KB
MD523966228f4f52120ae3057c158c327f0
SHA102b6a200b1ac97cd854caba4e3a9a6593ef7c675
SHA256db53a5dd001f4827b017584f1e826e5605e881f3af22153f1e1daa4ca231b2ff
SHA512f4ae14bd4faf8e2efd98e8af18bdf950a2ed5cec4940d37c861bc16fdbc4d679f9b9de7dc24e0859e544e41e3e50a3914d83ebe3f40fb3a3d5c7cc2cdb695552