General
-
Target
RNSM00341.7z
-
Size
4.7MB
-
Sample
241110-vp6l9azre1
-
MD5
89d6fd75828e74fc7447e9a0c5c88fd8
-
SHA1
2a50e26fa610d0782d88cd932dea6a75d680fc16
-
SHA256
d65ee752bb8afda85bf33265285ea298d1ed91ac0b863a34c1dda243dfb52762
-
SHA512
3668a93ba0186d8f9b9afa894652417a81117f1cc53b88ad1b1f353293d4e63770cf5b5df1e16756366c995d648291ecb428e2203c6ffd25154b8cd4c0639bfd
-
SSDEEP
98304:35Vodvxpy8/z2MeKGsWrj6ovnuW++kaWYKjOkzVjeBP8CEWlt:pVodvH/z2AGsWf6suraXfkZj6Pa2
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00341.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\$Recycle.Bin\SPYBQEEUUQ-DECRYPT.txt
http://gandcrabmfe6mnef.onion/fd44af66fa291bc9
Targets
-
-
Target
RNSM00341.7z
-
Size
4.7MB
-
MD5
89d6fd75828e74fc7447e9a0c5c88fd8
-
SHA1
2a50e26fa610d0782d88cd932dea6a75d680fc16
-
SHA256
d65ee752bb8afda85bf33265285ea298d1ed91ac0b863a34c1dda243dfb52762
-
SHA512
3668a93ba0186d8f9b9afa894652417a81117f1cc53b88ad1b1f353293d4e63770cf5b5df1e16756366c995d648291ecb428e2203c6ffd25154b8cd4c0639bfd
-
SSDEEP
98304:35Vodvxpy8/z2MeKGsWrj6ovnuW++kaWYKjOkzVjeBP8CEWlt:pVodvH/z2AGsWf6suraXfkZj6Pa2
-
Gandcrab family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (126) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1