General
-
Target
RNSM00335.7z
-
Size
10.9MB
-
Sample
241111-zk5llsyrek
-
MD5
516de23b832b9ab382824d9ee7284cc5
-
SHA1
6c8bdbe461a4411a3a9e9fb55c82975d7d46c5ef
-
SHA256
78513de1a3f011868e975a9bce64cea9a520a2bd7609d862fed94ae3518f22ea
-
SHA512
f9df547b6577fffe1728b7cb100f8c1b4835b3f52304afb6021c2af228de78448cad374c1327cfd34dc4dc86d3878d87514510c5cdca4b7f39d748179331db90
-
SSDEEP
196608:YoHzR0FpxAbMJikHBxdg6j6glUoKMMD6Kk2c+7RB62mrvs2WSrqKGlrvTZz3umT/:YempxnJimB3/j6roPsB6vjs2xr7WrvFD
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00335.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\$Recycle.Bin\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/397b1f26cba10859
Targets
-
-
Target
RNSM00335.7z
-
Size
10.9MB
-
MD5
516de23b832b9ab382824d9ee7284cc5
-
SHA1
6c8bdbe461a4411a3a9e9fb55c82975d7d46c5ef
-
SHA256
78513de1a3f011868e975a9bce64cea9a520a2bd7609d862fed94ae3518f22ea
-
SHA512
f9df547b6577fffe1728b7cb100f8c1b4835b3f52304afb6021c2af228de78448cad374c1327cfd34dc4dc86d3878d87514510c5cdca4b7f39d748179331db90
-
SSDEEP
196608:YoHzR0FpxAbMJikHBxdg6j6glUoKMMD6Kk2c+7RB62mrvs2WSrqKGlrvTZz3umT/:YempxnJimB3/j6roPsB6vjs2xr7WrvFD
-
Gandcrab family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (307) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
7Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1