Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    14/12/2023, 01:47

General

  • Target

    putty.exe

  • Size

    218KB

  • MD5

    b29bfe0978cdeab5a09b8ab31eadbaf1

  • SHA1

    9c930ee306446556d22b5469a8c5943a56e7197f

  • SHA256

    2f022dacd013c10da72759a20cf7392637460f983d59631ebf636328d0f977ee

  • SHA512

    7f721aa07a073117575e7fe4cd10228f2da1c31ef6df32fbf0722577616998d476aef415f7b29be7ddd0384270f4c66f8021ac06da469799ebe739e6f667d71b

  • SSDEEP

    3072:/SAzTSCFUvN/0Lz/2rir+HrBNBB50FO+7Vcx8BBjlIGOPA2EeHOz3ctJ:6MFUaP/2ZVzJ+Jcx8xN2EEOzct

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-1514849007-2165033493-4114354048-1000\KRAB-DECRYPT.txt

Ransom Note
---= GANDCRAB V4 =--- Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .KRAB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/5d5212de55099b66 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- wfKD6iudumBkmpL8IRr4U4exEVaoOXLtwDwmOrT1y1YWvOiWMx5GYaRdvZZZTphRvXYd7npWobfYTGCHhh5qBJzzs9MC7736UkGSDDniUJJG8/LFF//kmGmoAZAGLo2j5/wd2UrxMJK+iqKhTkS3ArgAxrZOOOiXrbnhbWMkLHQnbYuWlMClYZxYU6SDxpopRo5r292AV1KIZBZV4APBuUHcKSIr2MWMI0O1MKIP2IpKLE2TS5wLmpQodXZhP6M/UPrO1sZzkDbgjYlAG3g8l65nVd0/CBUxKQ7KDJYrtX0vSmnFXg/ykfgtJNiwqfCnqbr85+Bi5rEmkU3B4uKl/2Q2RetzGt5YaVqDBi7tpBGEEd8bpycE4oG4b6a1Y8ZyGoyp2Q2iuJRzTRoqGlPQJIAJppFrwNIoDBPOnKw+A+5ZALufjGEwg7NrKg3qxA9Kxg72Zi/pCBFK3vDLNeah1w4ZLXRgRl+KCjmo1jngAX95mSffmizzQU1nmrIqlsew6HIMVY3pdDfwfAscdcBnP3FNhn9WQ3XC06ZCEvXtdUj8BYRMbJH0HpoOar+NRZwP9okRV/rusrPFzMX9P3YBh9gzrewdRb9tHf+DbmDW4OIcXpReLdQq9FxhO1LL2u9gwWmeLQ4zxgtafmr5TWEPiWMEkrI= ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/5d5212de55099b66

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (290) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 41 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\putty.exe
    "C:\Users\Admin\AppData\Local\Temp\putty.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\wbem\wmic.exe
      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2564
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e243f7db92fd297a6c8d2681c2194fa

    SHA1

    86e4fa35165b313774b659a70e914d2b6938ad97

    SHA256

    fb7389848cb6ce92d0f471c772af61a7a57deb371b4522942bfd32c6815b82fa

    SHA512

    7f4d33f99dcf5e6db8e76b73e852a9830f263e4da4c81d00dcff3af41d751170e9a0604150c6849872797e7fcd74b458e02c677bd36f74de0cb50284aa147344

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4759e61e0f3c107254c925fdb7f605b

    SHA1

    ee16f360b9481cf90f6de4430480da14ad081389

    SHA256

    a182c8530256e14dba38e7b732db830afa9a19bbddbe8f8ca7eaa8355d8c1b8e

    SHA512

    4ea567240aa6259a7a9337a6918954b381ce80048a1f925a6abaef37f407a4adb5cc3a237d91d65f9928923e2dd1b1aed30cec50a70b69992867e5db2f63b40a

  • C:\Users\Admin\AppData\Local\Temp\Cab13B2.tmp

    Filesize

    45KB

    MD5

    dc38d629e51926a750b443772d7c8c65

    SHA1

    2868765523e76b2e6706f18ecb665f4631a00d00

    SHA256

    21a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883

    SHA512

    beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4

  • C:\Users\Admin\AppData\Local\Temp\Tar13C4.tmp

    Filesize

    42KB

    MD5

    211fc8b3a0106643d2a5b60a8403c440

    SHA1

    345732c62b9778f1986498901d0b22b1ca643664

    SHA256

    80b0c500aa3a248fff2c4b10436932f7de7d4b0999fd875a1f83b3f524ff0759

    SHA512

    65e9642139cd0c4e7e838722e5a1371f72d431cfbd129b836d75b44a7116381971e2c71876f5473acf68ed48846aab1d2ba1eb11ab03b22703ad4c881911e9fc

  • F:\$RECYCLE.BIN\S-1-5-21-1514849007-2165033493-4114354048-1000\KRAB-DECRYPT.txt

    Filesize

    8KB

    MD5

    14a5cbae4240106de3f9855ddc6dc0ed

    SHA1

    d52828eb7571abf5f1c5767ddee0f4916b06fe56

    SHA256

    a71f22f095ca733dd3f598fde8f1230955eec5acfb491a6ac5612b2b63ed362c

    SHA512

    382d7d212182bc10bb15a9a8934eaafe951d449a422a6b8eac9f3f11d91c238bb26e869c99ad0d236c4f50aad1adcfed3bfdef680f5c83e97ad56e6e59145de8

  • memory/1956-0-0x0000000000220000-0x0000000000231000-memory.dmp

    Filesize

    68KB

  • memory/1956-2-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1956-1-0x0000000000220000-0x0000000000231000-memory.dmp

    Filesize

    68KB

  • memory/1956-951-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1956-953-0x0000000000220000-0x0000000000231000-memory.dmp

    Filesize

    68KB