Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 21:43

General

  • Target

    ransomwares/GandCrab/GandCrab.exe

  • Size

    424KB

  • MD5

    95557a29de4b70a25ce62a03472be684

  • SHA1

    5baabf2869278e60d4c4f236b832bffddd6cf969

  • SHA256

    49b769536224f160b6087dc866edf6445531c6136ab76b9d5079ce622b043200

  • SHA512

    79b78cf77926e0d8b424ad9984f72d4461c7d9e7af58c4e2af32fa7c58cc445c534228b0709b87f5e35e1c8793b3d028dc60787151d852b8524023d08b57f103

  • SSDEEP

    6144:/UGV83D35bJrqV2L/E0tA+j16kUef5Nj1mB9WjEw0tzMV:qvmVe9h1qEtkBzw0tQ

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\HJTDTAUU-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.3 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE WILL BE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .HJTDTAUU The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/d6d9280033ea2bf6 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/d6d9280033ea2bf6

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (265) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransomwares\GandCrab\GandCrab.exe
    "C:\Users\Admin\AppData\Local\Temp\ransomwares\GandCrab\GandCrab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\wermgr.exe
      "C:\Windows\System32\wermgr.exe"
      2⤵
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b2f2ad28a92ac2bb933386db9faff26

    SHA1

    82dd6fd475e0409d98d398ba20b24812a5fd18f6

    SHA256

    6a80614cf40dbb657e074275417cf0a6c09ce4804834b7c041e1edb814596adc

    SHA512

    a2204086368125d2dfff8a07503e9102a21bb782babfbc3ee21c780ad8be922432761fdd90c79d8dca090a5b3f224f26037be304a4f5b586c665b6da7aa2c867

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1384694c06c2dc6b529dd462be0e471a

    SHA1

    2c9f6bdeb18943a3f4b19e634030fb7dd182ea18

    SHA256

    accd8a26ea45d7f11c2bc77e8826a182344b0017c4fed54ebd6d96ad7ddb6436

    SHA512

    e59838177885be56296d07eee634366b1dac2ec11cc7e58ae46ccd91f124f39cccac0fe8bec00f00aefd5fce3ea63ef950d248f01ee12b5745341f88e4f9bae2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    522ca23beac20a33a4b2b09c8715aeed

    SHA1

    3d345f86553c3682461a45de90cb22b49e14cb3f

    SHA256

    156210bf0fbab41f454376e087fc1ba4843f4eba1200fca819b70d4d93bceedd

    SHA512

    4c75b413f8e924a7ea821e2fd8e83e9f3fbe9a934916ebab70da8452c6f8c80b1c5ab89fd80ff6de58fa9d8e19a8ff2501cbeb2d0465a5f8c1be9d638ff74da9

  • C:\Users\Admin\AppData\Local\Temp\Cab4F79.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar50D7.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • F:\$RECYCLE.BIN\HJTDTAUU-DECRYPT.txt

    Filesize

    8KB

    MD5

    4c06796f3a92c571b468cf839b4e53c9

    SHA1

    297165a36c5d81e58d6c693338c979f0b7c5cd83

    SHA256

    676e22288006711806bc0668bdbffb787cca5261892683ddc8cf30719199e1d5

    SHA512

    7421cf5d3d325caed01a12795c4ec25ee89e5aa1a5a0fb8e6396e1096c9e1e57510ca85feaae3d8b5d785026424c414492013e121d4c41e1ac1afee54636f6da

  • memory/1720-0-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2356-714-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB