Analysis Overview
SHA256
84f794bcd8201b8e2b2dc2f74a8c22604d2bc754d60491e80caddc3dd943b5a0
Threat Level: Known bad
The file 2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab was found to be: Known bad.
Malicious Activity Summary
Gandcrab Payload
UPX dump on OEP (original entry point)
Gandcrab family
Detects ransomware indicator
GandCrab payload
Gandcrab
UPX dump on OEP (original entry point)
Detects ransomware indicator
Gandcrab Payload
UPX packed file
Enumerates connected drives
Adds Run key to start application
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Checks processor information in registry
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-15 07:36
Signatures
Detects ransomware indicator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
GandCrab payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Gandcrab Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Gandcrab family
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-15 07:36
Reported
2024-06-15 07:39
Platform
win7-20240611-en
Max time kernel
148s
Max time network
152s
Command Line
Signatures
GandCrab payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gandcrab
Detects ransomware indicator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gandcrab Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dofaiisqzoe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe" | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
Enumerates connected drives
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe"
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ipv4bot.whatismyipaddress.com | udp |
| US | 8.8.8.8:53 | dns1.soprodns.ru | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
Files
memory/2980-0-0x0000000000400000-0x000000000042C000-memory.dmp
memory/2980-4-0x0000000000400000-0x000000000042C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-15 07:36
Reported
2024-06-15 07:39
Platform
win10v2004-20240508-en
Max time kernel
148s
Max time network
149s
Command Line
Signatures
GandCrab payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gandcrab
Detects ransomware indicator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gandcrab Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fgmipbehpmt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe" | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
Enumerates connected drives
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-15_6ea06cf99f1d847433ba5407c7a473ed_gandcrab.exe"
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup gandcrab.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup nomoreransom.bit dns1.soprodns.ru
C:\Windows\SysWOW64\nslookup.exe
nslookup emsisoft.bit dns1.soprodns.ru
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ipv4bot.whatismyipaddress.com | udp |
| US | 8.8.8.8:53 | dns1.soprodns.ru | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | dns1.soprodns.ru | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | gandcrab.bit | udp |
| US | 8.8.8.8:53 | dns1.soprodns.ru | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | nomoreransom.bit | udp |
| US | 8.8.8.8:53 | dns1.soprodns.ru | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
| US | 8.8.8.8:53 | emsisoft.bit | udp |
Files
memory/4712-0-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4712-4-0x0000000000400000-0x000000000042C000-memory.dmp