Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2023 14:53
Behavioral task
behavioral1
Sample
cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe
-
Size
73KB
-
MD5
cc60a92a0a6afa54e1aa8fc0aaa02c02
-
SHA1
9346f5672b900c14dadf6fb454ab63c375c54d44
-
SHA256
9c1096ae2a2ea89d68da77cfd17064544a17b17c614e4f077731b35ee2230aaa
-
SHA512
b3cb208f7e1aa6eed5ef3cb7756d442e3293088b2505f4efeb1cead5c7ef7ba193cf41690a58b896f3b83a852aa755156fa98d1ea50b72062c751163aafdabf6
-
SSDEEP
1536:egSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:eMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qnsuhiuopyy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe" cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\P: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\R: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\U: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\B: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\E: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\J: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\M: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\I: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\S: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\T: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\Y: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\G: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\H: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\N: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\X: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\V: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\W: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\Z: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\A: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\K: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\L: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe File opened (read-only) \??\Q: cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2016 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 87 PID 2880 wrote to memory of 2016 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 87 PID 2880 wrote to memory of 2016 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 87 PID 2880 wrote to memory of 400 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 89 PID 2880 wrote to memory of 400 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 89 PID 2880 wrote to memory of 400 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 89 PID 2880 wrote to memory of 2372 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 93 PID 2880 wrote to memory of 2372 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 93 PID 2880 wrote to memory of 2372 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 93 PID 2880 wrote to memory of 3540 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 96 PID 2880 wrote to memory of 3540 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 96 PID 2880 wrote to memory of 3540 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 96 PID 2880 wrote to memory of 2760 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 98 PID 2880 wrote to memory of 2760 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 98 PID 2880 wrote to memory of 2760 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 98 PID 2880 wrote to memory of 2144 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 100 PID 2880 wrote to memory of 2144 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 100 PID 2880 wrote to memory of 2144 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 100 PID 2880 wrote to memory of 2208 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 102 PID 2880 wrote to memory of 2208 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 102 PID 2880 wrote to memory of 2208 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 102 PID 2880 wrote to memory of 4448 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 104 PID 2880 wrote to memory of 4448 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 104 PID 2880 wrote to memory of 4448 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 104 PID 2880 wrote to memory of 4976 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 106 PID 2880 wrote to memory of 4976 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 106 PID 2880 wrote to memory of 4976 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 106 PID 2880 wrote to memory of 5112 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 108 PID 2880 wrote to memory of 5112 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 108 PID 2880 wrote to memory of 5112 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 108 PID 2880 wrote to memory of 532 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 110 PID 2880 wrote to memory of 532 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 110 PID 2880 wrote to memory of 532 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 110 PID 2880 wrote to memory of 4960 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 112 PID 2880 wrote to memory of 4960 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 112 PID 2880 wrote to memory of 4960 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 112 PID 2880 wrote to memory of 2828 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 114 PID 2880 wrote to memory of 2828 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 114 PID 2880 wrote to memory of 2828 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 114 PID 2880 wrote to memory of 2648 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 116 PID 2880 wrote to memory of 2648 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 116 PID 2880 wrote to memory of 2648 2880 cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe"C:\Users\Admin\AppData\Local\Temp\cc60a92a0a6afa54e1aa8fc0aaa02c02_gandcrab_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:400
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2372
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2760
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2144
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2208
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4448
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:5112
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:532
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2648
-