Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 07:39

General

  • Target

    2024-04-18_5e0d51633af39456376cb9ade0220936_gandcrab.exe

  • Size

    70KB

  • MD5

    5e0d51633af39456376cb9ade0220936

  • SHA1

    b695d5c790a2a4e0d23ed22610fd0ed833c514c2

  • SHA256

    b1d023d8834959f297b84f83ff4bc09e63ad9576ecb1b11eaf1f63de5fc3cf71

  • SHA512

    99838bbcf8b6a1f42a23d3743317b62568f25bf23b369748de1ea9c4f9db4dd26920a701309d4f671c863b0c876c14f9e7ab2c33c5dd781421ce886b4f6f61e6

  • SSDEEP

    1536:kZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:7d5BJHMqqDL2/Ovvdr

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_5e0d51633af39456376cb9ade0220936_gandcrab.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_5e0d51633af39456376cb9ade0220936_gandcrab.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2800

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads