Resubmissions

13-01-2025 04:35

250113-e7x5tswlfz 10

13-01-2025 03:52

250113-ee43nsvjby 10

12-01-2025 15:57

250112-tealdsymgt 10

12-01-2025 15:53

250112-tbnc3s1mhn 10

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 15:53

General

  • Target

    Malware-1-master/crb.exe

  • Size

    139KB

  • MD5

    24275604649ac0abafe99b981b914fbc

  • SHA1

    818b0e3018ad27be9887e9e5f4ef1971f422652c

  • SHA256

    4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749

  • SHA512

    008ef045724963d6ae3b845a6c3de8ebb6682b0f4b8ea77c2d35e2193596b78f0092183de0a88a34f7dde4e71abbc129b2f0f00fd8469801fff66f1b8390b6c8

  • SSDEEP

    1536:JLMVCWvZ8URtqOz3d+1Qs6H9Mk2e3E2avMWC3yMgYxf6+okbdWsWjcdpKCaIxWzX:VM9ntZ3s1QJdnU2SQdf64ZZ8CaIxWec

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\QQDFUAYPNG-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.4 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .QQDFUAYPNG The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/cc65a1e1effaa1c4 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/cc65a1e1effaa1c4

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (282) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\crb.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\crb.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\wbem\wmic.exe
      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2996
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bf819a5a18a4dcccfb36b3915878f58

    SHA1

    ce3c7a2f1628eb77f5dce738cc2312d833e2e818

    SHA256

    ea775a84a86f5cf3b186d495242835149a82f6dc519586a3304751c7620ff52e

    SHA512

    b3cba014697e77ce0f162790c5266c45c9f3c992dd1cf7e8fb03f59f15c93de9c719e34567216be66b7f186866cb8b17c806c4ee45ae89b574834ae4fc7fa306

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    602e835fa17ec84ceb41027e06f00369

    SHA1

    58c09866cf75570a90f77b5b4aff2c7a639bf46f

    SHA256

    a8c572a4fb354db15b1105ec8d7a6f60cc1e6d0106e55a324cd24cf467f6ef2a

    SHA512

    7c29497bf4b7bd38aa0a782993eb447578184b8b4c21e26903d1284a8d7d50c8555f355f20fffed9d2f81600fb94213924c83eba614159bc102c8fbfcdbfa914

  • C:\Users\Admin\AppData\Local\Temp\CabC6F9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC7B7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • F:\$RECYCLE.BIN\QQDFUAYPNG-DECRYPT.txt

    Filesize

    8KB

    MD5

    7f17cc24dead42c2aa69a7a7ee5e8d63

    SHA1

    d1a5ace74d183149c67cbf60381ced3f82b15dfe

    SHA256

    7f38e7f5862f8c9e11ddf9a468a30848f1557bc93358b857c701ea19ae879a37

    SHA512

    9f78827e5e38ee7773572268f6df16ec2f588c09e530566c62eb57932d208433835577e9b771d1a6a3af54893065d0b4eb7d6ff667ba834b74d7b46c2048e90e