Resubmissions

17-01-2025 20:14

250117-yz7h3s1qfw 10

17-01-2025 20:12

250117-yy9l2sslcr 10

17-01-2025 17:25

250117-vy9p9sxpez 10

17-01-2025 17:21

250117-vw8eesyjfp 10

17-01-2025 14:16

250117-rk9ass1rhk 10

17-01-2025 14:12

250117-rhv1ds1lds 10

16-01-2025 12:52

250116-p4et7a1mez 10

16-01-2025 12:50

250116-p29xjssjep 10

Analysis

  • max time kernel
    430s
  • max time network
    434s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-01-2025 12:50

General

  • Target

    Malware-1-master/crb.exe

  • Size

    139KB

  • MD5

    24275604649ac0abafe99b981b914fbc

  • SHA1

    818b0e3018ad27be9887e9e5f4ef1971f422652c

  • SHA256

    4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749

  • SHA512

    008ef045724963d6ae3b845a6c3de8ebb6682b0f4b8ea77c2d35e2193596b78f0092183de0a88a34f7dde4e71abbc129b2f0f00fd8469801fff66f1b8390b6c8

  • SSDEEP

    1536:JLMVCWvZ8URtqOz3d+1Qs6H9Mk2e3E2avMWC3yMgYxf6+okbdWsWjcdpKCaIxWzX:VM9ntZ3s1QJdnU2SQdf64ZZ8CaIxWec

Malware Config

Extracted

Path

C:\$Recycle.Bin\XRKDGHCGAU-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0.4 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .XRKDGHCGAU The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/7f2c7f81cfe878c3 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- lAQAAH4dk1RlSixZI3q1uM9w4nXJC4FgiLucn4Wrija3WRDlZl+a1/cOHcfJbsOQOqO2sud5McmrqvTEz9DlZjVPvrOq+b/86W0FScQKwehGpHID6g/xL51xe1bsjt4xGYP9zGrzVfmMqFx2S1JcadrxYWe4pmRD+iezb7QOhX91R66kn6hBzA9qHcDKEL2wbtrDZrDVZJnRSnwtl84Jeb94ziBrUAN4VUaJrfWQCxsJdpm98B6+3IjIXITIUlOw+v0rm/pQldqkPCQlWKMKhe0d63R0cOnc92ekmOzEsfOhZpmphtAcmTx6BPO4YMtKejKQEIlEqEdf/c8NLaq6NsOGNX3vWDUxxZRYZL88Q4xlsxvXFkpYbjwcS7juAmqw3VCOeXLL8Lu+hIsSRPh/cYrGrHq1v+Hf6Ccostg6t+/W+cirFprZgf4UXps5Rgo+xdLOLoEaZliTidRn7kKbbGfG84NfXbawagw+Y9iyJ/ZFmpw8YFO6bBPSWlR+vfFR13nIEeK4+oRnMwjNnHtsEXxOKJud36ag1TfXGo3NRuWSdjPPM4VkLO8D2ZPEhzOY9qcjGZOKidCDH59FOnZ6to9tMZfr6fdPQg/CeTMoWCXjRXs86pDpwxqLtYEyRfUIXraX238xAYxAGSvp8X7t+YcXmYAqdVmxyo8e3CcsPrnDsiZEhb+VhUfb75fIBH4dV+Y//McxaSrwI8GuMGmf0X13nsjYbchOI2pNty82QltwHbSOfn55W19X+0NawlTY6jSHj+m/uYjGaNbMMr4Djc4Uh2731btjYLs/WdwubccD0BMvJ8GCe7iSI+mPs3E1eHqGWww3dt3tiBY0qEHp0IF441uiP91B6xEHjbHzghvAp2LWrnfQdlxC7QWk2CaAxrXeiTvnbun7mho6bJXgf1aLTToRj6eY1r8YaOyvgwNS9ieEsPJvtsCxzONZD/XqfoBVZA03aCgSmDkLl79SEYj3euEjW2T9fXwfPxnfjDSv2Umeuy5/YOpx4T4wWbkTajTfLQTvwa3kkbprUj1aOnb2EEH0ZUpQelNO2D1fPNXPeecChvGoT1oNHgR5kVnh2hpAaPisGV4Nh1tmEnDQPIrAfKSD6z08awNHF4azIST98glcFaSezwOsrWGjJdAoyrJRKVyCfiFZ0FAwd8qCQE+DGiOhOZfF2AnyTUnAVpGKSLuUhZ/SfuWmwhg6fYq69ThCt8A2UGnDSYKLo3W7VWX80a6582rld3WpoxjUUU94k6ymE3V1mvQAO51R0pQkbkDEqehrOzBvklhxr0lmemUOYBSB5x3NXwhDtR+pw3GO5ebANIy20E0PBKawrdiaPk3dCBHr4+yY5E2x/w7f4+dTKJtUKlfQ6PokvAkduAjisbrbip60b4LLV3U8iM+qordz7YWuWP+VfutkPvP9pxRjD3hqOkKAxuLKUz5wivn5qFUP45x/EYPQSR/cLFlLHZtcFkGna2bpQOuuYSaZeA80pnhE9L7Z4aoj4fH0G6HWyjbP5SiqLHPFUCfOhhkncEO4+0mVbOTjAa+jpzZ4QJlWiOzEg78KGbCt4qgQqQz2hYQg2WzWJc2TXpfsMZ1mNvawNl0/JUQxixWRA4HLIp7w80TiG10ftDgxW6/eLDeDhGmYOEBYXwYCWl/a7Zmv4SGLeST3gctrMUlY8+IFHg+fYPlim0pHP7QZtHgEUmJziH+FtkFJyH8YTesAbRRFJSR3CIQNSQBLYQ0pUoaieM8XRdPKauxiF4AeU11OBsTA8BHDFgCB5yRBabTHo1gChv6+iurypxgslYTMNaJF8oi+YGLytIwlgfUN6WCiWJUvgnGmY+MtrLVup4T6THAVkUBqq71y7Irx0MY1HLOe4tu/BxklXFUfGMAaTyrLBKwLTZbVnUPmq1IXTuAIj92NejvXhwJnT+U2dpkyyngxXLHhoPAVpvILo48fFoJz7KYORnpp2Kru+11nM1hmLfZA+UMKNYeqVN6Pamqw6Z79nKkP1ZRyyFI8HuFSSUpEcGlqZWTN6+wBg6DA4kZTgQOR8T3rpg4Ppr1U/r6ICmAnjQvq0P4p5PpTnB+qNo/dLCGiTYAP565CpP/lgZHFzrahxBIRm4DLsjC1Zrz658BJa4ELMRE5lm/2QjwfoeYTNIegLlxmYrVizBOW09vABIBAZYu6HdyxRFcO3ou81C14uTdvsIo/M2r8uSZyoNQZonMzrls9UGraS/j2Xfmm/boaYqDbTouUEzc= ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/7f2c7f81cfe878c3

Signatures

  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (337) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\crb.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\crb.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Windows\SysWOW64\wbem\wmic.exe
      "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout -c 5 & del "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\crb.exe" /f /q
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Windows\SysWOW64\timeout.exe
        timeout -c 5
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:4624
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\XRKDGHCGAU-DECRYPT.txt

    Filesize

    8KB

    MD5

    fdca213a8deddf82df32fecd1b9f4dce

    SHA1

    3a743eff8e37b626cf64b92910b44faf1db5a8e4

    SHA256

    b76d59e4a1da3e9ca03de28b479e9131d84b5ac6d9122c5e735c85b64bf26200

    SHA512

    cea7268933554bf8fec052d91ca76d408790ee7c36d9aaf8685671b26b8b205ee923d9f2c615249f8665d7663477de55349568cbfcb19481b421ce7b4a1ddf7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3F45CFC395459D7C5D5E6E2DBAC3A186

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3F45CFC395459D7C5D5E6E2DBAC3A186

    Filesize

    414B

    MD5

    e6436f0c62b49c62cd63f683b8e73258

    SHA1

    946758874780978bee7855e05ad99d70e44f7da4

    SHA256

    bf4d3625be803c6ca4cdbb924e0418966a33ab5714c284723733dadbdc3a39e0

    SHA512

    783d8caed96c15a0dd741062b77097ac104e5d3c8634b5afa50eaf4307a0013831b3d07798a8cef80965efbffbf9630f5b85e5fa51047361ce72e87ff8699f64