Resubmissions

01-12-2024 02:42

241201-c7g3haymhp 10

01-12-2024 02:32

241201-c1k6ksykhp 10

Analysis

  • max time kernel
    53s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 02:42

General

  • Target

    64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe

  • Size

    297KB

  • MD5

    314558f9a6da39ffd12cba6c1064b3b8

  • SHA1

    2c416cbfa8aeee687534b7c0888d411c0a837c59

  • SHA256

    64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842

  • SHA512

    41fdd3cff2e4620c0dfc7adca6a985ba5af69c1e72be409ae8d206534e32e1d3d34358f3f90521f57969c3cdf391442f4dfeba2a174b3abcbe72257d36706947

  • SSDEEP

    6144:ZUL4NWKzjkaphkIOe2q4EVSh/Bw/mhMgAB:ZUsNWK3bT4EneIB

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\GVEUPPKLFU-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.4 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .GVEUPPKLFU The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/79756566b346ab9 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/79756566b346ab9

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (269) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe
    "C:\Users\Admin\AppData\Local\Temp\64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\wbem\wmic.exe
      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2764
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2700
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bb9758,0x7fef6bb9768,0x7fef6bb9778
      2⤵
        PID:2148
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:2
        2⤵
          PID:2912
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:8
          2⤵
            PID:2876
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:8
            2⤵
              PID:2932
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1512 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:1
              2⤵
                PID:2420
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:1
                2⤵
                  PID:2396
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1268 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:2
                  2⤵
                    PID:1052
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3280 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:1
                    2⤵
                      PID:1860
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:8
                      2⤵
                        PID:2156
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1172 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:1
                        2⤵
                          PID:1676
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:624
                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
                          1⤵
                          • Drops desktop.ini file(s)
                          • Enumerates connected drives
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of FindShellTrayWindow
                          PID:2440
                          • C:\Program Files (x86)\Windows Media Player\wmpshare.exe
                            "C:\Program Files (x86)\Windows Media Player\wmpshare.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2712
                        • C:\Windows\explorer.exe
                          "C:\Windows\explorer.exe"
                          1⤵
                            PID:1408
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Music\ConnectDebug.search-ms
                            1⤵
                            • Modifies registry class
                            PID:2672
                            • C:\Windows\system32\NOTEPAD.EXE
                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Music\ConnectDebug.search-ms
                              2⤵
                              • Opens file in notepad (likely ransom note)
                              PID:560

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                            Filesize

                            1KB

                            MD5

                            a266bb7dcc38a562631361bbf61dd11b

                            SHA1

                            3b1efd3a66ea28b16697394703a72ca340a05bd5

                            SHA256

                            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                            SHA512

                            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            a4595881f1e3b4f4d5e2353263a02afc

                            SHA1

                            0e4064c78ff807659b03c4a0a79630bc766ae2f7

                            SHA256

                            17afd5e9f965da94c6b853bb2cf35e295506780128a76bd83f40473e55f3e830

                            SHA512

                            1eb63d4591410b2076a8cda5f328b9d380eb5c87c0d6349a40fcb3349ce018a22f9766af4fc49069270cc6f1c3873b79208e231ea4d6c91d8766624a6844bd24

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                            Filesize

                            242B

                            MD5

                            b3b18bcc127f8da52950939217fcbda8

                            SHA1

                            a0e26663a4e7b3dfc3976818ecb63d4692792173

                            SHA256

                            4781665732752be18eca3d0e029fcc547a856fb7f6387700386930b1adb5f2de

                            SHA512

                            a4d5320ed0ddd69045f3131c5dc46322e4454c25b78009f7229723e2fe071272b877b6f41ba5e06c90a424e6bfc19c2e3b4fd6498d1e2e72695b50ad0822e327

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                            Filesize

                            215KB

                            MD5

                            2be38925751dc3580e84c3af3a87f98d

                            SHA1

                            8a390d24e6588bef5da1d3db713784c11ca58921

                            SHA256

                            1412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b

                            SHA512

                            1341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                            Filesize

                            16B

                            MD5

                            aefd77f47fb84fae5ea194496b44c67a

                            SHA1

                            dcfbb6a5b8d05662c4858664f81693bb7f803b82

                            SHA256

                            4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                            SHA512

                            b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            363B

                            MD5

                            8ffeb558e2f0518727b388028df60c2e

                            SHA1

                            768cbf8273960e356835e7578a5fb56cee9f91de

                            SHA256

                            93f0f06d7373738ded67aee795ce8fb2e2698ebafd767b0938611b788868003c

                            SHA512

                            14e0c4ad9bd39089b1b23d11a4d0f36acdc1faf96c6df91943d274af0b7760725226b93a2e7ac6574d509221f62ce1428cb94013dfb2fc1f3fb79155d986a0c2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            924d4398e43290a9bebe3d79359b52a5

                            SHA1

                            b70842b01808e0aee630f0dcb8d2f7e95d582228

                            SHA256

                            cd81bb074a1dd3bdcb61a41b1e351856203a609a9ca5f01f07a7bdc5f954a44b

                            SHA512

                            0468a89cfb6c938b14a506764202ccdd86fbefb4b7eb99727d337a2cef46376ac4d43dae29be5232b1a3f6468279cc4a918b209c31ee065638bf6956b575d3d2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            9420146537d7702eaf3f75ef5e116dd0

                            SHA1

                            184bb54cc1dca7cd4819355c77a85261012a9a4e

                            SHA256

                            e63065741737a3a95a7e7c661856b699675ca9466bd4e4f554f0751d3163acd0

                            SHA512

                            d3a08de25930ec4aaffd798ddb2d74eae3ef2cd8e44ad1f097984a6dcc0b335f594f7e9f57c666ce40d2760ce5ed6b018ab1f6d1dd8cc6247fc0c95ae1e8500e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                            Filesize

                            16B

                            MD5

                            18e723571b00fb1694a3bad6c78e4054

                            SHA1

                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                            SHA256

                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                            SHA512

                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Temp\Cab89DA.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\Tar8A89.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • C:\Users\Admin\Music\ConnectDebug.search-ms

                            Filesize

                            384KB

                            MD5

                            9feff8e35b4484e65dd65870c920614a

                            SHA1

                            c1659cfc48d4f72b21a5d88dca3b0e0aa77211cc

                            SHA256

                            4b10a3ebf8a6ea85f25de68253d1a6d2e45ac70f6cf8cb429683186bae7f88c7

                            SHA512

                            a6d6acb1e29c2e0a5c28e23715a8f224f96b4dd77c99eabf5ea6bb13961ba49916523b742947abe3f4fa2a84ddb3fef348c931bf298aa81bdda32216c7aeaa27

                          • C:\Users\Public\Libraries\RecordedTV.library-ms

                            Filesize

                            2KB

                            MD5

                            4b666d4a4d5fc3d4233157105dc12755

                            SHA1

                            71d8c68a03ce7bccb88a10408a47fc25cd295f0d

                            SHA256

                            084a81a6eda6a3b81a0c6ffc576a951d78eb6e2cccbc8ea5ea55eda4c6ca6a73

                            SHA512

                            c3e13008ec5ff0f19f513c10d4f401ccc47a91b736f7c82fec1d1fa1238ef264e2126e9c927701359be6fdd8b8dcc36d6d746957120a53ad0c83b02dc0b7459b

                          • F:\$RECYCLE.BIN\GVEUPPKLFU-DECRYPT.txt

                            Filesize

                            8KB

                            MD5

                            e38c90a45e9f2ebf5cd1c9bdfec80dd2

                            SHA1

                            484f4fa834be9e7d48ef69a47fdd247bdeb8d7cd

                            SHA256

                            0016984fdc2aef633d6b43871958af09cbbaa1ade2d28b28374230f568f6241b

                            SHA512

                            f4eae5d33fa9ecb41990e067d4b244306b111acb76348778eddf83b92e78fbc7fd2cd704e362c70eea3eafca2bdc451a620c436f8766af503b2787df6da28c2e

                          • memory/2744-2-0x0000000000400000-0x0000000000428000-memory.dmp

                            Filesize

                            160KB

                          • memory/2744-715-0x0000000000400000-0x0000000000428000-memory.dmp

                            Filesize

                            160KB

                          • memory/2744-714-0x0000000000400000-0x000000000044F000-memory.dmp

                            Filesize

                            316KB

                          • memory/2744-713-0x0000000000230000-0x0000000000330000-memory.dmp

                            Filesize

                            1024KB

                          • memory/2744-1-0x0000000000230000-0x0000000000330000-memory.dmp

                            Filesize

                            1024KB