Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 13:37

General

  • Target

    41b007b09b3da5bf2f1e6bf34d7ca6c1_JaffaCakes118.exe

  • Size

    589KB

  • MD5

    41b007b09b3da5bf2f1e6bf34d7ca6c1

  • SHA1

    1c1b84e1cf1576f8d5c9622aad42def01c48a493

  • SHA256

    9f44eaf881e2e145794a360aca1cdd2e9ac2e020e59b1829ea8f92d4fd3eebd0

  • SHA512

    50347bc41495d893c1c71fdb0b36bb2a56d672d7af9c3ad0dcc8cfd334ead9c96c849863afaeb3d555924de61a79febc5a39e6ba2b965c4289b2c96ab2584ec3

  • SSDEEP

    12288:MUiTFXMfffP5dgVHYPT4m90rrYQp48+0I6O4lNh7vaqFaFmSiyyjKF:MUihXy/YClF6O4HhBd8F

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-481678230-3773327859-3495911762-1000\KRAB-DECRYPT.txt

Ransom Note
---= GANDCRAB V4 =--- Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .KRAB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/2b8272202ce8c9a7 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/2b8272202ce8c9a7

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (275) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\41b007b09b3da5bf2f1e6bf34d7ca6c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41b007b09b3da5bf2f1e6bf34d7ca6c1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\41b007b09b3da5bf2f1e6bf34d7ca6c1_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\41b007b09b3da5bf2f1e6bf34d7ca6c1_JaffaCakes118.exe
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1644
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f38aab9e31308f41aba31198f9ecbbf

    SHA1

    827d421a5288ab0e7e918236083581bcf327072b

    SHA256

    c40b23ee765bde3ac3745730e44a1228a78394ac76b63f2492873005e250e400

    SHA512

    2bb5740f95e827996de3bfd32b0ad089f23294ad4a45500948e3394e595dd1436638aa4ce92354936ead130a20166adc357ed4f68042bb254f3a8d0d5e8e5607

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0790d30ccdb0c14f2704b448a6849fe5

    SHA1

    3a0f169dc1cc3163876e30489a0d66b3be930157

    SHA256

    aa5e1106f15375173cff481dba0c3bc22c90cb075b7d941832cad57dc594b11b

    SHA512

    5c7e41661adb07dcab4c2fd826d546e16b3bf705e4de76f42b42ba86ac8565d487f1b4bcb8ce7b5dc1f0be9b731eb1d8e5533d22df5ceead277c38d5f9750de5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c14178eb1bcc9a349177808f29981a89

    SHA1

    1fd61b57892ca2a97c0aa4275701ac90b3148454

    SHA256

    1818f6ea1b28ca9e0ad079c2b6a0e21776170ab7f94b5316da84281bf538e803

    SHA512

    b80d1ec20a6fb01ddb11c500e4d325c63cc6a34b8163e37747778e2a565904444e812e0853be006fc2f796ea3b2aadfb22bfb53757b63211d7f76e078c370c12

  • C:\Users\Admin\AppData\Local\Temp\Cab254.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2A5.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • F:\$RECYCLE.BIN\S-1-5-21-481678230-3773327859-3495911762-1000\KRAB-DECRYPT.txt

    Filesize

    8KB

    MD5

    4f3ad000e5041a07445e56d15bdbee58

    SHA1

    73086d2e724ae05fad14e204fde9139e22572c54

    SHA256

    79420949a7d3fdb2fe4bc590405edfecb2e26520fef8d986748d4f3145c6e8bb

    SHA512

    eb08b3cf004c55b2798c041d2d17537fa98f28968567190763d3ae530ae73c3177e938844e5309233a42ab53f7a7bca52d5c3e3a86bc38051acf87c1e46b1f91

  • memory/1292-984-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2288-0-0x00000000003E0000-0x00000000003F0000-memory.dmp

    Filesize

    64KB

  • memory/2288-1-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/2288-2-0x00000000003E0000-0x00000000003F0000-memory.dmp

    Filesize

    64KB