Resubmissions

02-12-2024 11:09

241202-m871esxnap 10

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 11:09

General

  • Target

    b82b65ace1731fe2d694512fcd448895_JaffaCakes118.exe

  • Size

    8.0MB

  • MD5

    b82b65ace1731fe2d694512fcd448895

  • SHA1

    c6de94da7152e237c1f0b36264b14deb32e85ce2

  • SHA256

    85639d9a1900703f2ffbf076d28925ea8d5fe4537098fa82dd96cb8eb21d2911

  • SHA512

    70bcfc8449ae913ae1e81f90fcb49ce05076b18d495683f101a4353719b3917451e8d507c701790805f6f1484ce6e12935e2dd7a8f1fabb5192492a19ec93564

  • SSDEEP

    196608:6CKhIwvgsb87DwQiiFFL4an2L/dfXaI+fVcZ2/:RC3Stl4LL/ZaI

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-4177215427-74451935-3209572229-1000\VGUCMIIYE-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.4 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .VGUCMIIYE The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/baff8cd57d0122e | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/baff8cd57d0122e

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (261) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 24 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 43 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 52 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b82b65ace1731fe2d694512fcd448895_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b82b65ace1731fe2d694512fcd448895_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Roaming\cexplorer.exe
      "C:\Users\Admin\AppData\Roaming\cexplorer.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\is-2273G.tmp\cexplorer.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-2273G.tmp\cexplorer.tmp" /SL5="$80192,6397385,121344,C:\Users\Admin\AppData\Roaming\cexplorer.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP-
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe
          "C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" /trialregister
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:2632
        • C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe
          "C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" /replaceexplorer
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies registry class
          PID:2260
        • C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe
          "C:\Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe" /update
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          PID:896
        • C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe
          "C:\Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe" /update
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:1952
    • C:\Users\Admin\AppData\Roaming\update.exe
      "C:\Users\Admin\AppData\Roaming\update.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Chameleon Explorer\ExplorerHelper32.dll_new

    Filesize

    786KB

    MD5

    dd5ce4d765edd75eba6f311e6e0ea10a

    SHA1

    9ea7f6516e5ad0755b74463d427055f63ed1a664

    SHA256

    64b7f8f70a7b037d10da72eaa769078b7e4d1ac8964c5eae5515d373e816ed6d

    SHA512

    d2782310df7cc533cc9ffaf5c1903d5bc6a500c3bbe48148c1339fb5de19c835e4a8c765da1b80b3744ea231353f76f22ba4e04c78a3d950d7ee291d6eab2216

  • C:\Program Files (x86)\Chameleon Explorer\ExplorerHelper64.dll_new

    Filesize

    1.2MB

    MD5

    de5f74ef4e17b2dc8ad69a3e9b8d22c7

    SHA1

    42df8fedc56761041bce47b84bd4e68ee75448d2

    SHA256

    b89a6a57b48be10103825440d2157f2c4a56e4c6b79ad13f729429cd5393bf32

    SHA512

    515e9b498d8cd9bb03f8d9758e891d073627dfd6fb0b931650a47d6e53722aa6e1cc3caff8c0e64f4721ad2abef7a81ef4e7b49952d3c8fc325deb5bba6b3314

  • C:\Program Files (x86)\Chameleon Explorer\Folder.dll_new

    Filesize

    750KB

    MD5

    fb76f4f533203e40ce30612a47171f94

    SHA1

    304ba296c77a93ddb033d52578fcc147397db981

    SHA256

    3de05f18ffe9fda589a45ea539a464e58a30f70d59d71444b018064cf831c4a6

    SHA512

    a416a6d6efbbd69209e1867f12b9d1d11b21160f6dfe07c510b43112c22c317f805c67dd9402744a6c7e1541f6b3a061c49942fe28fa70f74aea670ba9c71995

  • C:\Program Files (x86)\Chameleon Explorer\Folder64.dll_new

    Filesize

    1.2MB

    MD5

    96f92c8368c1e922692f399db96da1eb

    SHA1

    1a91d68f04256ef3bc1022beb616ba65271bd914

    SHA256

    161408b86eed7c4d9a5882aa00df3f8765ed28fa4fd9aab2c9b3dceadbd527f9

    SHA512

    b3d3fb2d78fe2df864f0e07a8bc1610ee9d65251957e0495a34c1631895293590e0fca965ec9deb160f48a4e09a2feabd3bff6fb9a0c22888a941e308de39d14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    5adef5bd2b590d5cc1e32f507759b24b

    SHA1

    080badacd7e4d4f432d8cebe7aff125cac2b1013

    SHA256

    c8d195a35e0735d439cb8b20abb5e5e3bd047ef6458a1689eb61d9b24fdf56f2

    SHA512

    291990fb8a076761a0ed49fd094022d12ef6a8a6dab1509a0a738d2e0ad5d605ca4725ab54b82cdc05d77f1ee50ce5347eb76d157318724ae6bb9ea338eb38f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f24ccd5dafb54b20fc3fa94af95ac02

    SHA1

    0dc12d295a8b9a91fea60e58c96ddf22f0789351

    SHA256

    c5c2fb09ff8fc9ec769e37308301b7325bf77625283186ec83731d4408c49d5f

    SHA512

    4830f81317f97087e36ca32d632185808681e2476118cfe8318f4ef76af4325b79f025200dbaf3e426808e8a93ad8242127cc191daf8105cfa307417c304e41c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8bd3eeb193301cd46e23192811f4b2f8

    SHA1

    5527298b24aeab5c2f416afa613778035276a1cb

    SHA256

    b6a90dd4eeb4c58eef27227fb3a0ba48e90d1122beb2c9767080f6f7dfde932f

    SHA512

    461a933f24675ec4f6c75f620a46445ae2d0e84b44f9b30ff895e8ded1cfaae7cb0bbef50cb06315fd394e3d21f4b05bea763f063995143066d4e011c3231be9

  • C:\Users\Admin\AppData\Local\Temp\CabF24B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6B25.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • F:\$RECYCLE.BIN\S-1-5-21-4177215427-74451935-3209572229-1000\VGUCMIIYE-DECRYPT.txt

    Filesize

    8KB

    MD5

    f69cc5c6c8862bc12f9c2bc0d978ff84

    SHA1

    88e83131b9f1dbb0652f147e5552681593b6aecd

    SHA256

    7f4c5df8bd2d52832eabcf60f06c8504d3a6cacf910cd2c3c97c79e469dddcf6

    SHA512

    a016714e417360e552f618c2ca018627a2bfd55f60f1d1c45aa68ff0f081bc1615e5b3d83c93db388a65e155984b470c18c5729dc4fd5dcfe8b755f0a3140b05

  • \Program Files (x86)\Chameleon Explorer\ChameleonExplorer.exe

    Filesize

    14.4MB

    MD5

    92a3d0847fc622b31f2d0c273a676c0e

    SHA1

    e642d694367cc98a8863d87fec82e4cf940eb48a

    SHA256

    9a9923c08d3fc5937b6ed189e20cf416482a079bc0c898c4ed75329e0ee3ae89

    SHA512

    01d13fd9a0dd52bc2e3f17af7a999682201c99ecf7218bca254a4944a483fd1dec2a3e6d59def501a024ad760b849787902ecb55bd33d23fa9651c0a7689cd1c

  • \Program Files (x86)\Chameleon Explorer\ChameleonFolder.exe

    Filesize

    4.4MB

    MD5

    5b0ae3fac33c08145dca4a9c272ebc34

    SHA1

    940f504d835fc254602953495320bb92456177b9

    SHA256

    137723bdd388f6e5a50b7942eff02f4cc70e6b86d8650a41f9e8956ea1e4de3b

    SHA512

    015ffc133ad3a6937222bbc057f68b60abfe22b900b5e7c4e6ca3ec7dc6b09abaf54b595f00fa9212f370da8531af1ac5fc52b39953e1f685e81c66d1ec61f8a

  • \Program Files (x86)\Chameleon Explorer\ChameleonFolder64.exe

    Filesize

    143KB

    MD5

    246aaa95abddfd76f9166a2daa9f2d73

    SHA1

    0467fa8567b71f6e3a54d152d9ea77121c627798

    SHA256

    3f6880605a97ffb9b14cd97419a40cb2ea6cefd616e417fe538031d633fb93b9

    SHA512

    fe2042e9ce22be3e6e6fe1b324290aedbc155c55c0ede63ccf44a0eea10ce9f626c7553c40b24d917e5a4a8fb70513b33d698f7def5091a50831fa0529e8e669

  • \Users\Admin\AppData\Local\Temp\is-2273G.tmp\cexplorer.tmp

    Filesize

    1.1MB

    MD5

    729bc0108bcd7ec083dfa83d7a4577f2

    SHA1

    0b4efa5e1764b4ce3e3ae601c8655c7bb854a973

    SHA256

    b1c68b1582ebb5f465512a0b834ccac095460b29136b6c7eea0475612bf16b49

    SHA512

    49c83533ce88d346651d59d855cff18190328795401c1277f4e3d32ff34f207d2c35f026785aa6c4a85624d88bf8c927654907faf50db1d57447730d9d6ac44c

  • \Users\Admin\AppData\Roaming\cexplorer.exe

    Filesize

    6.5MB

    MD5

    d8388140b196952bc419141fa07ac0c9

    SHA1

    71e6f4a14964c39a9b827479ffe90ec07b9145e3

    SHA256

    6d77ff618ac5c4306dea8f34e66092e146f172570e88a3ac05166068e5a4abd6

    SHA512

    4f8e089eba0cc90af09321cc83297cf763b9899cb65cd1ebd44697866e7458fa5ba1f3ace9e6cf7875c92fa5ac7d7fe85ff3a4af0c6f659b1849c03bba674e22

  • \Users\Admin\AppData\Roaming\update.exe

    Filesize

    356KB

    MD5

    73497313a18a4e8ef6fcc7810a5f4637

    SHA1

    beafc036b2baea46e618982615d3422ab2994920

    SHA256

    3538d4438f167ad175116729425ce8a11f46b54d1a4b3827967b12782ddeb1dc

    SHA512

    57ea5e6de79fdc23be150f6dc5c996e03447990560d208e13f7403453eef03fdc56efd448649d4773fd6cd6f109b1f2b3f3656ddb164945aa572ad3de4d53da2

  • memory/896-830-0x0000000000400000-0x0000000000A39000-memory.dmp

    Filesize

    6.2MB

  • memory/1880-851-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1880-15-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1880-832-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1880-18-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/1952-846-0x0000000000400000-0x0000000001438000-memory.dmp

    Filesize

    16.2MB

  • memory/1952-833-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2192-78-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2192-852-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2260-801-0x0000000000400000-0x0000000001438000-memory.dmp

    Filesize

    16.2MB

  • memory/2632-647-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2632-792-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2632-796-0x0000000000400000-0x0000000001438000-memory.dmp

    Filesize

    16.2MB

  • memory/2632-648-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2632-793-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2632-795-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2632-794-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/3012-850-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/3012-791-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/3012-24-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB