Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 16:10

General

  • Target

    f911b2567d89d3815c94a586068d3b52e9ecb7171092ca66d08fdd07c11017bf.exe

  • Size

    310KB

  • MD5

    8b46f5a79932a9e20df7ad6d484bd87e

  • SHA1

    8fb2d33c51991d0782398c85f62f1281afc056a8

  • SHA256

    f911b2567d89d3815c94a586068d3b52e9ecb7171092ca66d08fdd07c11017bf

  • SHA512

    ec17bcbdac8faedda88d8e5d4bfb883eefb559d06cc9f2298c1117e164e9822f5c6f13b11ad2de76db5ab09169a98684da118992497a61b7095c6f6007e122f5

  • SSDEEP

    6144:vruoInmmPWPhCqkNZ9+INEQpcsoD5W+fusZh:LImIftNEbd5fu0h

Malware Config

Signatures

  • GandCrab payload 4 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f911b2567d89d3815c94a586068d3b52e9ecb7171092ca66d08fdd07c11017bf.exe
    "C:\Users\Admin\AppData\Local\Temp\f911b2567d89d3815c94a586068d3b52e9ecb7171092ca66d08fdd07c11017bf.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup carder.bit ns1.wowservers.ru
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2228
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup ransomware.bit ns2.wowservers.ru
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2708
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup carder.bit ns2.wowservers.ru
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2808
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup ransomware.bit ns1.wowservers.ru
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2732
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup carder.bit ns1.wowservers.ru
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2176
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup ransomware.bit ns2.wowservers.ru
      2⤵
        PID:2624
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup carder.bit ns2.wowservers.ru
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2844
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup ransomware.bit ns1.wowservers.ru
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2612
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup carder.bit ns1.wowservers.ru
        2⤵
        • System Location Discovery: System Language Discovery
        PID:892
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup ransomware.bit ns2.wowservers.ru
        2⤵
          PID:272
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup carder.bit ns2.wowservers.ru
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2360
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup ransomware.bit ns1.wowservers.ru
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1724
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup carder.bit ns1.wowservers.ru
          2⤵
          • System Location Discovery: System Language Discovery
          PID:940
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup ransomware.bit ns2.wowservers.ru
          2⤵
            PID:908
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup carder.bit ns2.wowservers.ru
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1668
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.wowservers.ru
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1016
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup carder.bit ns1.wowservers.ru
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1984
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.wowservers.ru
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2660
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup carder.bit ns2.wowservers.ru
            2⤵
              PID:2784
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup ransomware.bit ns1.wowservers.ru
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2872
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup carder.bit ns1.wowservers.ru
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2232
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup ransomware.bit ns2.wowservers.ru
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1404
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup carder.bit ns2.wowservers.ru
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2972
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup ransomware.bit ns1.wowservers.ru
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1480
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup carder.bit ns1.wowservers.ru
              2⤵
                PID:672
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup ransomware.bit ns2.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:448
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup carder.bit ns2.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2112
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup ransomware.bit ns1.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:748
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup carder.bit ns1.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:112
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup ransomware.bit ns2.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1000
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup carder.bit ns2.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1632
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup ransomware.bit ns1.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:544
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup carder.bit ns1.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:952
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup ransomware.bit ns2.wowservers.ru
                2⤵
                • System Location Discovery: System Language Discovery
                PID:788
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup carder.bit ns2.wowservers.ru
                2⤵
                  PID:992
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2436
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2484
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2180
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2300
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2988
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1972
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1880
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2432
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2840
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2452
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2864
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2740
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2316
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2604
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2664
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns2.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2324
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2184
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup carder.bit ns1.wowservers.ru
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1112
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup ransomware.bit ns2.wowservers.ru
                  2⤵
                    PID:1980
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup carder.bit ns2.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2064
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup ransomware.bit ns1.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2036
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup carder.bit ns1.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1672
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup ransomware.bit ns2.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1364
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup carder.bit ns2.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1920
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup ransomware.bit ns1.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2952
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup carder.bit ns1.wowservers.ru
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2260
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup ransomware.bit ns2.wowservers.ru
                    2⤵
                      PID:2640
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup carder.bit ns2.wowservers.ru
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:484
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup ransomware.bit ns1.wowservers.ru
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1608
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup carder.bit ns1.wowservers.ru
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1196
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup ransomware.bit ns2.wowservers.ru
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2920
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup carder.bit ns2.wowservers.ru
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2308
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup ransomware.bit ns1.wowservers.ru
                      2⤵
                        PID:688
                      • C:\Windows\SysWOW64\nslookup.exe
                        nslookup carder.bit ns1.wowservers.ru
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1652
                      • C:\Windows\SysWOW64\nslookup.exe
                        nslookup ransomware.bit ns2.wowservers.ru
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:612
                      • C:\Windows\SysWOW64\nslookup.exe
                        nslookup carder.bit ns2.wowservers.ru
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2424
                      • C:\Windows\SysWOW64\nslookup.exe
                        nslookup ransomware.bit ns1.wowservers.ru
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1516

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1548-1-0x0000000001460000-0x0000000001560000-memory.dmp

                      Filesize

                      1024KB

                    • memory/1548-2-0x0000000000400000-0x000000000042C000-memory.dmp

                      Filesize

                      176KB

                    • memory/1548-3-0x0000000000400000-0x00000000012D3000-memory.dmp

                      Filesize

                      14.8MB

                    • memory/1548-6-0x0000000000400000-0x00000000012D3000-memory.dmp

                      Filesize

                      14.8MB

                    • memory/1548-4-0x00000000003B0000-0x00000000003C7000-memory.dmp

                      Filesize

                      92KB

                    • memory/1548-12-0x0000000001460000-0x0000000001560000-memory.dmp

                      Filesize

                      1024KB

                    • memory/1548-13-0x0000000000400000-0x000000000042C000-memory.dmp

                      Filesize

                      176KB