Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 18:25

General

  • Target

    2025-01-22_061434105c7bdd8b9ad322f68d8b61e4_gandcrab.exe

  • Size

    70KB

  • MD5

    061434105c7bdd8b9ad322f68d8b61e4

  • SHA1

    2034fad127f0c3c061b09d9098717013a6b3060c

  • SHA256

    260172c3f585ec0fa0a8454cb1d318eb9748e1b6652c3a3cb1076009398bc4be

  • SHA512

    88b48b70e9214c47471bf2c9a106297d1b09238f0a1f30b317854a58754ff3c3ed26688ad894cff5682a943b9549b7011309f6abf0bab30ffc8b82b639b1771d

  • SSDEEP

    1536:8ZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:Dd5BJHMqqDL2/Ovvdr

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-22_061434105c7bdd8b9ad322f68d8b61e4_gandcrab.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-22_061434105c7bdd8b9ad322f68d8b61e4_gandcrab.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads