Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2023 18:27
Behavioral task
behavioral1
Sample
1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe
-
Size
73KB
-
MD5
1f7a09d6d9c643b1edacd90ef6584f84
-
SHA1
c9a4724f7672cef2f38ee24ba978aca092eed1ef
-
SHA256
5b9d2e14605137cd8f59b18fc8411bf00e663dc331ceeef039427665888e72f4
-
SHA512
3412fe264d1f16b80ad5895e118a5e9b12bb4f2c5133b4795f92a4ee3f1f4bdc1dd7dee756f7b8458a55ec5a66dc554d3f3269a4a2516d05898229a084efde32
-
SSDEEP
1536:GgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:GMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ibapkadovit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe" 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\L: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\M: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\O: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\B: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\I: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\W: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\Z: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\A: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\K: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\Q: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\S: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\U: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\X: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\T: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\V: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\E: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\G: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\J: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\N: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\P: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\R: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe File opened (read-only) \??\Y: 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4996 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 82 PID 4648 wrote to memory of 4996 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 82 PID 4648 wrote to memory of 4996 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 82 PID 4648 wrote to memory of 3948 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 91 PID 4648 wrote to memory of 3948 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 91 PID 4648 wrote to memory of 3948 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 91 PID 4648 wrote to memory of 412 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 94 PID 4648 wrote to memory of 412 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 94 PID 4648 wrote to memory of 412 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 94 PID 4648 wrote to memory of 1976 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 96 PID 4648 wrote to memory of 1976 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 96 PID 4648 wrote to memory of 1976 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 96 PID 4648 wrote to memory of 5012 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 98 PID 4648 wrote to memory of 5012 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 98 PID 4648 wrote to memory of 5012 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 98 PID 4648 wrote to memory of 4056 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 100 PID 4648 wrote to memory of 4056 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 100 PID 4648 wrote to memory of 4056 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 100 PID 4648 wrote to memory of 2936 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 102 PID 4648 wrote to memory of 2936 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 102 PID 4648 wrote to memory of 2936 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 102 PID 4648 wrote to memory of 2920 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 104 PID 4648 wrote to memory of 2920 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 104 PID 4648 wrote to memory of 2920 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 104 PID 4648 wrote to memory of 2660 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 106 PID 4648 wrote to memory of 2660 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 106 PID 4648 wrote to memory of 2660 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 106 PID 4648 wrote to memory of 3360 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 108 PID 4648 wrote to memory of 3360 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 108 PID 4648 wrote to memory of 3360 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 108 PID 4648 wrote to memory of 3692 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 110 PID 4648 wrote to memory of 3692 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 110 PID 4648 wrote to memory of 3692 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 110 PID 4648 wrote to memory of 2944 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 112 PID 4648 wrote to memory of 2944 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 112 PID 4648 wrote to memory of 2944 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 112 PID 4648 wrote to memory of 1208 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 114 PID 4648 wrote to memory of 1208 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 114 PID 4648 wrote to memory of 1208 4648 1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe"C:\Users\Admin\AppData\Local\Temp\1f7a09d6d9c643b1edacd90ef6584f84_gandcrab_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4996
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:412
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:5012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2936
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2920
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2660
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3360
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1208
-