Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 11:10
Behavioral task
behavioral1
Sample
8ad1e7e01d7947exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
8ad1e7e01d7947exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8ad1e7e01d7947exeexeexeex.exe
-
Size
145KB
-
MD5
8ad1e7e01d7947544a56b2f333a0d471
-
SHA1
c0e3c05b728fa2421ef475bfbb25fa003c20056b
-
SHA256
9dd1935fcac2161ef8dc46b31ae921529cddd9eefa3585549a56224aa27e6786
-
SHA512
f186611d10c4c723c3a9679f1c72af02cde2245f9efef476749fc1d3bd711d90b335b2ccfc07ce4baee53fd16c3c9629e053a82b910021ecac3b968794a0a99d
-
SSDEEP
3072:BYHVHd2NCMqqDL2/mr3IdE8we0Avu5r++ygLIaagvdCjRv9OtN:ByOqqDL64vdGREz
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/3900-133-0x0000000000400000-0x0000000000428000-memory.dmp family_gandcrab behavioral2/memory/3900-137-0x0000000000400000-0x0000000000428000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 8ad1e7e01d7947exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kkjrjfxufbr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ad1e7e01d7947exeexeexeex.exe" 8ad1e7e01d7947exeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\S: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\Q: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\R: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\W: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\E: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\H: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\J: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\O: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\T: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\V: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\X: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\Y: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\A: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\K: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\N: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\P: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\U: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\Z: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\B: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\I: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\L: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\M: 8ad1e7e01d7947exeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8ad1e7e01d7947exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8ad1e7e01d7947exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8ad1e7e01d7947exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3900 8ad1e7e01d7947exeexeexeex.exe 3900 8ad1e7e01d7947exeexeexeex.exe 3900 8ad1e7e01d7947exeexeexeex.exe 3900 8ad1e7e01d7947exeexeexeex.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3900 wrote to memory of 1112 3900 8ad1e7e01d7947exeexeexeex.exe 83 PID 3900 wrote to memory of 1112 3900 8ad1e7e01d7947exeexeexeex.exe 83 PID 3900 wrote to memory of 1112 3900 8ad1e7e01d7947exeexeexeex.exe 83 PID 3900 wrote to memory of 4336 3900 8ad1e7e01d7947exeexeexeex.exe 85 PID 3900 wrote to memory of 4336 3900 8ad1e7e01d7947exeexeexeex.exe 85 PID 3900 wrote to memory of 4336 3900 8ad1e7e01d7947exeexeexeex.exe 85 PID 3900 wrote to memory of 3712 3900 8ad1e7e01d7947exeexeexeex.exe 87 PID 3900 wrote to memory of 3712 3900 8ad1e7e01d7947exeexeexeex.exe 87 PID 3900 wrote to memory of 3712 3900 8ad1e7e01d7947exeexeexeex.exe 87 PID 3900 wrote to memory of 1404 3900 8ad1e7e01d7947exeexeexeex.exe 91 PID 3900 wrote to memory of 1404 3900 8ad1e7e01d7947exeexeexeex.exe 91 PID 3900 wrote to memory of 1404 3900 8ad1e7e01d7947exeexeexeex.exe 91 PID 3900 wrote to memory of 1740 3900 8ad1e7e01d7947exeexeexeex.exe 94 PID 3900 wrote to memory of 1740 3900 8ad1e7e01d7947exeexeexeex.exe 94 PID 3900 wrote to memory of 1740 3900 8ad1e7e01d7947exeexeexeex.exe 94 PID 3900 wrote to memory of 3564 3900 8ad1e7e01d7947exeexeexeex.exe 96 PID 3900 wrote to memory of 3564 3900 8ad1e7e01d7947exeexeexeex.exe 96 PID 3900 wrote to memory of 3564 3900 8ad1e7e01d7947exeexeexeex.exe 96 PID 3900 wrote to memory of 3308 3900 8ad1e7e01d7947exeexeexeex.exe 98 PID 3900 wrote to memory of 3308 3900 8ad1e7e01d7947exeexeexeex.exe 98 PID 3900 wrote to memory of 3308 3900 8ad1e7e01d7947exeexeexeex.exe 98 PID 3900 wrote to memory of 696 3900 8ad1e7e01d7947exeexeexeex.exe 100 PID 3900 wrote to memory of 696 3900 8ad1e7e01d7947exeexeexeex.exe 100 PID 3900 wrote to memory of 696 3900 8ad1e7e01d7947exeexeexeex.exe 100 PID 3900 wrote to memory of 2152 3900 8ad1e7e01d7947exeexeexeex.exe 102 PID 3900 wrote to memory of 2152 3900 8ad1e7e01d7947exeexeexeex.exe 102 PID 3900 wrote to memory of 2152 3900 8ad1e7e01d7947exeexeexeex.exe 102 PID 3900 wrote to memory of 3424 3900 8ad1e7e01d7947exeexeexeex.exe 104 PID 3900 wrote to memory of 3424 3900 8ad1e7e01d7947exeexeexeex.exe 104 PID 3900 wrote to memory of 3424 3900 8ad1e7e01d7947exeexeexeex.exe 104 PID 3900 wrote to memory of 4736 3900 8ad1e7e01d7947exeexeexeex.exe 106 PID 3900 wrote to memory of 4736 3900 8ad1e7e01d7947exeexeexeex.exe 106 PID 3900 wrote to memory of 4736 3900 8ad1e7e01d7947exeexeexeex.exe 106 PID 3900 wrote to memory of 2620 3900 8ad1e7e01d7947exeexeexeex.exe 108 PID 3900 wrote to memory of 2620 3900 8ad1e7e01d7947exeexeexeex.exe 108 PID 3900 wrote to memory of 2620 3900 8ad1e7e01d7947exeexeexeex.exe 108 PID 3900 wrote to memory of 4976 3900 8ad1e7e01d7947exeexeexeex.exe 110 PID 3900 wrote to memory of 4976 3900 8ad1e7e01d7947exeexeexeex.exe 110 PID 3900 wrote to memory of 4976 3900 8ad1e7e01d7947exeexeexeex.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ad1e7e01d7947exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8ad1e7e01d7947exeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1112
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4336
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3712
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1404
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1740
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3308
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:696
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2152
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3424
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2620
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4976
-