Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 18:27
Behavioral task
behavioral1
Sample
o.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
o.exe
Resource
win10v2004-20220901-en
General
-
Target
o.exe
-
Size
183KB
-
MD5
07fadb006486953439ce0092651fd7a6
-
SHA1
e42431d37561cc695de03b85e8e99c9e31321742
-
SHA256
d77378dcc42b912e514d3bd4466cdda050dda9b57799a6c97f70e8489dd8c8d0
-
SHA512
5b09a07371bb5350b22c78aa3e7e673ba61ce72a964e072749a4633e2c15f416c05953cc6e6f6c586df010aa7f2c9c0ab87a014e4f732e5fdb2d58778a1fb437
-
SSDEEP
3072:Ealy19emgKe0QuYS3UmWuDTEltI3S/7IarDrjCgrQp0M7W:EaqxxDwx/7IS40MS
Malware Config
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
o.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\AddNew.tiff o.exe File renamed C:\Users\Admin\Pictures\AddNew.tiff => C:\Users\Admin\Pictures\AddNew.tiff.jcvph o.exe File renamed C:\Users\Admin\Pictures\HideConnect.crw => C:\Users\Admin\Pictures\HideConnect.crw.jcvph o.exe File renamed C:\Users\Admin\Pictures\MoveDismount.tif => C:\Users\Admin\Pictures\MoveDismount.tif.jcvph o.exe File renamed C:\Users\Admin\Pictures\PublishEnable.raw => C:\Users\Admin\Pictures\PublishEnable.raw.jcvph o.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
o.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation o.exe -
Drops startup file 2 IoCs
Processes:
o.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\JCVPH-DECRYPT.html o.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\77a858d477a85f3d30.lock o.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
o.exedescription ioc process File opened (read-only) \??\I: o.exe File opened (read-only) \??\O: o.exe File opened (read-only) \??\S: o.exe File opened (read-only) \??\V: o.exe File opened (read-only) \??\Y: o.exe File opened (read-only) \??\A: o.exe File opened (read-only) \??\B: o.exe File opened (read-only) \??\H: o.exe File opened (read-only) \??\K: o.exe File opened (read-only) \??\P: o.exe File opened (read-only) \??\R: o.exe File opened (read-only) \??\T: o.exe File opened (read-only) \??\W: o.exe File opened (read-only) \??\F: o.exe File opened (read-only) \??\G: o.exe File opened (read-only) \??\Q: o.exe File opened (read-only) \??\U: o.exe File opened (read-only) \??\X: o.exe File opened (read-only) \??\Z: o.exe File opened (read-only) \??\E: o.exe File opened (read-only) \??\J: o.exe File opened (read-only) \??\N: o.exe File opened (read-only) \??\L: o.exe File opened (read-only) \??\M: o.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
o.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\pidor.bmp" o.exe -
Drops file in Program Files directory 16 IoCs
Processes:
o.exedescription ioc process File created C:\Program Files\77a858d477a85f3d30.lock o.exe File opened for modification C:\Program Files\MoveRepair.jtx o.exe File opened for modification C:\Program Files\RestoreResume.mpp o.exe File opened for modification C:\Program Files\SendDisconnect.MTS o.exe File opened for modification C:\Program Files\UseResolve.midi o.exe File created C:\Program Files (x86)\77a858d477a85f3d30.lock o.exe File created C:\Program Files\JCVPH-DECRYPT.html o.exe File opened for modification C:\Program Files\ImportInvoke.odp o.exe File opened for modification C:\Program Files\ShowAssert.tmp o.exe File opened for modification C:\Program Files\UnpublishClose.easmx o.exe File opened for modification C:\Program Files\UnregisterPublish.dib o.exe File created C:\Program Files (x86)\JCVPH-DECRYPT.html o.exe File opened for modification C:\Program Files\OutConvert.ppsx o.exe File opened for modification C:\Program Files\TestUnpublish.ini o.exe File opened for modification C:\Program Files\UndoWrite.xlsb o.exe File opened for modification C:\Program Files\RedoRestart.vstm o.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
o.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier o.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
o.exepid process 2412 o.exe 2412 o.exe 2412 o.exe 2412 o.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
wmic.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 3324 wmic.exe Token: SeSecurityPrivilege 3324 wmic.exe Token: SeTakeOwnershipPrivilege 3324 wmic.exe Token: SeLoadDriverPrivilege 3324 wmic.exe Token: SeSystemProfilePrivilege 3324 wmic.exe Token: SeSystemtimePrivilege 3324 wmic.exe Token: SeProfSingleProcessPrivilege 3324 wmic.exe Token: SeIncBasePriorityPrivilege 3324 wmic.exe Token: SeCreatePagefilePrivilege 3324 wmic.exe Token: SeBackupPrivilege 3324 wmic.exe Token: SeRestorePrivilege 3324 wmic.exe Token: SeShutdownPrivilege 3324 wmic.exe Token: SeDebugPrivilege 3324 wmic.exe Token: SeSystemEnvironmentPrivilege 3324 wmic.exe Token: SeRemoteShutdownPrivilege 3324 wmic.exe Token: SeUndockPrivilege 3324 wmic.exe Token: SeManageVolumePrivilege 3324 wmic.exe Token: 33 3324 wmic.exe Token: 34 3324 wmic.exe Token: 35 3324 wmic.exe Token: 36 3324 wmic.exe Token: SeIncreaseQuotaPrivilege 3324 wmic.exe Token: SeSecurityPrivilege 3324 wmic.exe Token: SeTakeOwnershipPrivilege 3324 wmic.exe Token: SeLoadDriverPrivilege 3324 wmic.exe Token: SeSystemProfilePrivilege 3324 wmic.exe Token: SeSystemtimePrivilege 3324 wmic.exe Token: SeProfSingleProcessPrivilege 3324 wmic.exe Token: SeIncBasePriorityPrivilege 3324 wmic.exe Token: SeCreatePagefilePrivilege 3324 wmic.exe Token: SeBackupPrivilege 3324 wmic.exe Token: SeRestorePrivilege 3324 wmic.exe Token: SeShutdownPrivilege 3324 wmic.exe Token: SeDebugPrivilege 3324 wmic.exe Token: SeSystemEnvironmentPrivilege 3324 wmic.exe Token: SeRemoteShutdownPrivilege 3324 wmic.exe Token: SeUndockPrivilege 3324 wmic.exe Token: SeManageVolumePrivilege 3324 wmic.exe Token: 33 3324 wmic.exe Token: 34 3324 wmic.exe Token: 35 3324 wmic.exe Token: 36 3324 wmic.exe Token: SeBackupPrivilege 232 vssvc.exe Token: SeRestorePrivilege 232 vssvc.exe Token: SeAuditPrivilege 232 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
o.exedescription pid process target process PID 2412 wrote to memory of 3324 2412 o.exe wmic.exe PID 2412 wrote to memory of 3324 2412 o.exe wmic.exe PID 2412 wrote to memory of 3324 2412 o.exe wmic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\o.exe"C:\Users\Admin\AppData\Local\Temp\o.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:232