Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 15:03
Behavioral task
behavioral1
Sample
8ad1e7e01d7947exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8ad1e7e01d7947exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8ad1e7e01d7947exeexeexeex.exe
-
Size
145KB
-
MD5
8ad1e7e01d7947544a56b2f333a0d471
-
SHA1
c0e3c05b728fa2421ef475bfbb25fa003c20056b
-
SHA256
9dd1935fcac2161ef8dc46b31ae921529cddd9eefa3585549a56224aa27e6786
-
SHA512
f186611d10c4c723c3a9679f1c72af02cde2245f9efef476749fc1d3bd711d90b335b2ccfc07ce4baee53fd16c3c9629e053a82b910021ecac3b968794a0a99d
-
SSDEEP
3072:BYHVHd2NCMqqDL2/mr3IdE8we0Avu5r++ygLIaagvdCjRv9OtN:ByOqqDL64vdGREz
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/1832-136-0x0000000000400000-0x0000000000428000-memory.dmp family_gandcrab behavioral2/memory/1832-140-0x0000000000400000-0x0000000000428000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 8ad1e7e01d7947exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\skmodfrgaam = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ad1e7e01d7947exeexeexeex.exe" 8ad1e7e01d7947exeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\I: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\Q: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\Z: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\V: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\B: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\E: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\L: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\N: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\P: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\S: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\G: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\W: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\X: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\T: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\U: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\H: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\J: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\K: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\M: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\O: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\R: 8ad1e7e01d7947exeexeexeex.exe File opened (read-only) \??\Y: 8ad1e7e01d7947exeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8ad1e7e01d7947exeexeexeex.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8ad1e7e01d7947exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8ad1e7e01d7947exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1832 8ad1e7e01d7947exeexeexeex.exe 1832 8ad1e7e01d7947exeexeexeex.exe 1832 8ad1e7e01d7947exeexeexeex.exe 1832 8ad1e7e01d7947exeexeexeex.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4432 1832 8ad1e7e01d7947exeexeexeex.exe 84 PID 1832 wrote to memory of 4432 1832 8ad1e7e01d7947exeexeexeex.exe 84 PID 1832 wrote to memory of 4432 1832 8ad1e7e01d7947exeexeexeex.exe 84 PID 1832 wrote to memory of 3352 1832 8ad1e7e01d7947exeexeexeex.exe 86 PID 1832 wrote to memory of 3352 1832 8ad1e7e01d7947exeexeexeex.exe 86 PID 1832 wrote to memory of 3352 1832 8ad1e7e01d7947exeexeexeex.exe 86 PID 1832 wrote to memory of 4156 1832 8ad1e7e01d7947exeexeexeex.exe 88 PID 1832 wrote to memory of 4156 1832 8ad1e7e01d7947exeexeexeex.exe 88 PID 1832 wrote to memory of 4156 1832 8ad1e7e01d7947exeexeexeex.exe 88 PID 1832 wrote to memory of 656 1832 8ad1e7e01d7947exeexeexeex.exe 93 PID 1832 wrote to memory of 656 1832 8ad1e7e01d7947exeexeexeex.exe 93 PID 1832 wrote to memory of 656 1832 8ad1e7e01d7947exeexeexeex.exe 93 PID 1832 wrote to memory of 1848 1832 8ad1e7e01d7947exeexeexeex.exe 95 PID 1832 wrote to memory of 1848 1832 8ad1e7e01d7947exeexeexeex.exe 95 PID 1832 wrote to memory of 1848 1832 8ad1e7e01d7947exeexeexeex.exe 95 PID 1832 wrote to memory of 224 1832 8ad1e7e01d7947exeexeexeex.exe 97 PID 1832 wrote to memory of 224 1832 8ad1e7e01d7947exeexeexeex.exe 97 PID 1832 wrote to memory of 224 1832 8ad1e7e01d7947exeexeexeex.exe 97 PID 1832 wrote to memory of 2096 1832 8ad1e7e01d7947exeexeexeex.exe 99 PID 1832 wrote to memory of 2096 1832 8ad1e7e01d7947exeexeexeex.exe 99 PID 1832 wrote to memory of 2096 1832 8ad1e7e01d7947exeexeexeex.exe 99 PID 1832 wrote to memory of 4516 1832 8ad1e7e01d7947exeexeexeex.exe 101 PID 1832 wrote to memory of 4516 1832 8ad1e7e01d7947exeexeexeex.exe 101 PID 1832 wrote to memory of 4516 1832 8ad1e7e01d7947exeexeexeex.exe 101 PID 1832 wrote to memory of 3004 1832 8ad1e7e01d7947exeexeexeex.exe 103 PID 1832 wrote to memory of 3004 1832 8ad1e7e01d7947exeexeexeex.exe 103 PID 1832 wrote to memory of 3004 1832 8ad1e7e01d7947exeexeexeex.exe 103 PID 1832 wrote to memory of 1452 1832 8ad1e7e01d7947exeexeexeex.exe 105 PID 1832 wrote to memory of 1452 1832 8ad1e7e01d7947exeexeexeex.exe 105 PID 1832 wrote to memory of 1452 1832 8ad1e7e01d7947exeexeexeex.exe 105 PID 1832 wrote to memory of 3728 1832 8ad1e7e01d7947exeexeexeex.exe 107 PID 1832 wrote to memory of 3728 1832 8ad1e7e01d7947exeexeexeex.exe 107 PID 1832 wrote to memory of 3728 1832 8ad1e7e01d7947exeexeexeex.exe 107 PID 1832 wrote to memory of 3084 1832 8ad1e7e01d7947exeexeexeex.exe 109 PID 1832 wrote to memory of 3084 1832 8ad1e7e01d7947exeexeexeex.exe 109 PID 1832 wrote to memory of 3084 1832 8ad1e7e01d7947exeexeexeex.exe 109 PID 1832 wrote to memory of 3452 1832 8ad1e7e01d7947exeexeexeex.exe 111 PID 1832 wrote to memory of 3452 1832 8ad1e7e01d7947exeexeexeex.exe 111 PID 1832 wrote to memory of 3452 1832 8ad1e7e01d7947exeexeexeex.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ad1e7e01d7947exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8ad1e7e01d7947exeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4432
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3352
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4156
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:656
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:224
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2096
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4516
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1452
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3084
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3452
-