Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe
-
Size
312KB
-
MD5
b3c51450bf1b6e6cac7616319cebaf8b
-
SHA1
15674b1fca8ba06d7a84241264ef755e7b8f6de9
-
SHA256
46154c596e1050d677eb6bcdabad6b42def866e1f20da50879a3d82e3d9f825a
-
SHA512
000043ea3460068d5c472efa2bd8e24100caacf7033d95f31903f38324e38a5d71c6e0f21de131ce9d6e1a8958a70e18cf50faf8d488703f7365483967da55fe
-
SSDEEP
6144:u6jtiQHr3ByVhPYDe/mZFORawnkdoo7H7MPiJT9QhrvT8vRiXdx97/uMiqa:uGTghcYaYIL7MPiJT9mP8vRiXdx97Xa
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/1080-3-0x0000000000400000-0x000000000044C000-memory.dmp family_gandcrab behavioral1/memory/1080-5-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab behavioral1/memory/1080-13-0x0000000000400000-0x000000000044C000-memory.dmp family_gandcrab behavioral1/memory/1080-15-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 Destination IP 35.205.61.67 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\forwqluafqw = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\brzxkr.exe\"" b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\K: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\R: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\S: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\T: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\W: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\X: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\Y: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\L: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\N: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\P: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\V: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\Z: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\B: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\G: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\H: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\J: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\M: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\O: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\Q: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\A: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\E: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe File opened (read-only) \??\U: b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2924 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 28 PID 1080 wrote to memory of 2924 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 28 PID 1080 wrote to memory of 2924 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 28 PID 1080 wrote to memory of 2924 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 28 PID 1080 wrote to memory of 2812 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 30 PID 1080 wrote to memory of 2812 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 30 PID 1080 wrote to memory of 2812 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 30 PID 1080 wrote to memory of 2812 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 30 PID 1080 wrote to memory of 2744 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 34 PID 1080 wrote to memory of 2744 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 34 PID 1080 wrote to memory of 2744 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 34 PID 1080 wrote to memory of 2744 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 34 PID 1080 wrote to memory of 2280 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 36 PID 1080 wrote to memory of 2280 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 36 PID 1080 wrote to memory of 2280 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 36 PID 1080 wrote to memory of 2280 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 36 PID 1080 wrote to memory of 336 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 38 PID 1080 wrote to memory of 336 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 38 PID 1080 wrote to memory of 336 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 38 PID 1080 wrote to memory of 336 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 38 PID 1080 wrote to memory of 584 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 40 PID 1080 wrote to memory of 584 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 40 PID 1080 wrote to memory of 584 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 40 PID 1080 wrote to memory of 584 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 40 PID 1080 wrote to memory of 2028 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 42 PID 1080 wrote to memory of 2028 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 42 PID 1080 wrote to memory of 2028 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 42 PID 1080 wrote to memory of 2028 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 42 PID 1080 wrote to memory of 1168 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 44 PID 1080 wrote to memory of 1168 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 44 PID 1080 wrote to memory of 1168 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 44 PID 1080 wrote to memory of 1168 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 44 PID 1080 wrote to memory of 2876 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 46 PID 1080 wrote to memory of 2876 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 46 PID 1080 wrote to memory of 2876 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 46 PID 1080 wrote to memory of 2876 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 46 PID 1080 wrote to memory of 2264 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 48 PID 1080 wrote to memory of 2264 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 48 PID 1080 wrote to memory of 2264 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 48 PID 1080 wrote to memory of 2264 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 48 PID 1080 wrote to memory of 2324 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 50 PID 1080 wrote to memory of 2324 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 50 PID 1080 wrote to memory of 2324 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 50 PID 1080 wrote to memory of 2324 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 50 PID 1080 wrote to memory of 2196 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 52 PID 1080 wrote to memory of 2196 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 52 PID 1080 wrote to memory of 2196 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 52 PID 1080 wrote to memory of 2196 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 52 PID 1080 wrote to memory of 2636 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 54 PID 1080 wrote to memory of 2636 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 54 PID 1080 wrote to memory of 2636 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 54 PID 1080 wrote to memory of 2636 1080 b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\b3c51450bf1b6e6cac7616319cebaf8b_mafia_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2924
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2812
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2280
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:336
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:584
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2028
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1168
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2264
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2324
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2196
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2636
-