Analysis

  • max time kernel
    844s
  • max time network
    844s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 13:44

General

  • Target

    cryptmod2.exe

  • Size

    532KB

  • MD5

    6d497a11457912bff6d4b92b5e383037

  • SHA1

    d8e41fdc4acc037ac3f4155321b62e9e14fd9220

  • SHA256

    f6e4a44a1c6bd6a79041746337fbba4e725abb70afb48d676a60dd3ba0c5c65f

  • SHA512

    1f72e2b6182debbb0a46ee08d944cf67b6cc19f89be6e614b27b4bd7156865f32db56c6eac1f619a84072afb126e30537759382e7a299d04ac347efffa8af78a

  • SSDEEP

    12288:T0HVVyZ0fNuTJHLvpkMPrQ4YVZq3Yu8/Cv9qFe4K:TKHcTFLvprs4YVcIu8sl4K

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\ODSWC-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.4 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .ODSWC The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/4634d3d6159b2403 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- wfKD6iudumBkmpL8IRr4U4exEVaoOXLtwDwmOrT1y1YWvOiWMx5GYaRdvZZfTpxRq3YT7npWrLfXTHSHhh5qBJzzs9MC7736UkGSDDniUJJG8/LFF//kmGmoAZAGLo2j5/wd2UrxMJK+iqKhTkS3ArgAxrZOOOiXrbnhbWMkLHQnbYuWlMClYZxYU6SDxpopRo5r292AV1KIZBZV4APBuUHcKSIr2MWMI0O1MKIP2IpKLE2TS5wLmpQodXZhP6M/UPrO1sZzkDbgjYlAG3g8l65nVd0/CBUxKQ7KDJYrtX0vSmnFXg/ykfgtJNiwqfCnqbr85+Bi57F0kUvB5OLw/2U2ResgGtpYaVqKBnXtrxHSEdkboicE4oG4b6a1Y8ZyGoyp2Q2iuJRzTRoqGlPQJIAJppFrwNIoDBPOnKw+A+5ZALufjGEwg7NrKg3qxA9Kxg73ZivpDxFN3vzLMear1wIZLXRgRl+KCjmo1jngAX95mSffmizzQU1nmrIqlsew6HIMVY3pdDfwfAscdcBnP3FNhn9WQ3XC06ZCEvXtdUj8BYRMbJHzHp0Oar+NRZwP9okRV/rusrPFzMP9PXYFh9gzrewdRb9tHf+DbmDW4OIcXpVeLdQr9FxhPlLL2u9gwWmeLQ4zxgtafmr5TWEPiWMEkrI= ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/4634d3d6159b2403

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (267) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cryptmod2.exe
    "C:\Users\Admin\AppData\Local\Temp\cryptmod2.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\wbem\wmic.exe
      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2072
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout -c 5 & del "C:\Users\Admin\AppData\Local\Temp\cryptmod2.exe" /f /q
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\timeout.exe
        timeout -c 5
        3⤵
        • Delays execution with timeout.exe
        PID:780
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7752cc2a9ce251b476146fc0b038efaa

    SHA1

    5c41f1530509c6da294aebf8e6a8356712e24301

    SHA256

    dcb0bbbd041ed4cc623ecfd7fcd5d4d649ce8bf7f37eb25f3964488e5826a517

    SHA512

    40607423247321078ef28ac9f6d28ddff0d79d48c6ed985e40039ee043deef6da43548773224881c918c6cbd2595a8de8dea84a6a541b3651a754473dd3ae596

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7b6ecc521b57bc0ecb8b198b53cc2a95

    SHA1

    abf116d9c9fd350122b58755d9822824f41c5fd4

    SHA256

    a8174d34e83acaae5d1fd36247cfa1f6d89a85507a47afbf2281242ab3c3684b

    SHA512

    a906d2cba859c3a811d43549556fe58526b9f2c6ba3b99f333d6d27d3df40a3bd5086cf7ea4d378c004e3c89b2214a2f9e7d49c83c7931ca417f759ffa8e7b11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4accd9cb96549b31397d83fe71463f6c

    SHA1

    7096558b07d9f5dd3ba07c94a0528032e5513220

    SHA256

    ed4d2ba7b5b7713af9ba6a2e4a2092076f8d32ea6c4ddf3f21bf161794b96aa3

    SHA512

    d4daa8f158ddb4d17371607047e1629034761fd30090ef40ce44f23ac1444513ac386e1658d34eba42973a262c7ebfc9994cd1d863edf8721c01875d0ac28110

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a60bcd79bac4c91cfef1784638f88dec

    SHA1

    fe15e6f1ebccbfb779d0a19bbe15498a7c1c9ca3

    SHA256

    4b06a50e4b12a0072524579ad9496594dd9c7f44e93fa299ac3dc27a76e748cd

    SHA512

    9990c92d88f2a11d612b009cbfc396fec3dd106f8b3e71cdb2b4f028b6634eff99ee295646bc10834c148a9feff31bfcf478eac0251ff6e8f3a73569d2218f97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    0769b93883fc4955ed0567b17eb81353

    SHA1

    36afee2fbadcbf1a7e4408648b73b7f8567326bd

    SHA256

    588d3f1256a8613e028cba32102c23d8387f7a4ce1ff1b2809a2c1d430916efe

    SHA512

    402c68585c724d05cbccbe1898c7e8058a9d99f0c97e17b613b3781fafce96a997c6572900e704cd13909932483cd79cfc7fe9679e87f7302c164ac76d897ee7

  • C:\Users\Admin\AppData\Local\Temp\Cab96A6.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9788.tmp
    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • F:\$RECYCLE.BIN\S-1-5-21-2297530677-1229052932-2803917579-1000\ODSWC-DECRYPT.txt
    Filesize

    8KB

    MD5

    50e709e65643a8fae256b2c0a9c0db00

    SHA1

    a77b6d2200a15f19f7dc7fdee0c8c8f458eb6b37

    SHA256

    6b27deb94414f2571dc09307834b2da9944a45f6d90357ed0f5a326635822e31

    SHA512

    292b3a0e1ef2e32f0af9928d419700f41b8bc9463558df5ae55778478e051bfc7550aab5c192c638c47d1ee191aec86ae49a8f1a909b9482fbbc7d2332de9522

  • memory/2932-4-0x0000000000170000-0x000000000017C000-memory.dmp
    Filesize

    48KB

  • memory/2932-726-0x0000000000400000-0x0000000000489000-memory.dmp
    Filesize

    548KB

  • memory/2932-698-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/2932-5-0x0000000000400000-0x0000000000489000-memory.dmp
    Filesize

    548KB

  • memory/2932-0-0x0000000000170000-0x000000000017C000-memory.dmp
    Filesize

    48KB

  • memory/2932-3-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/2932-2-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/2932-1-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB