Resubmissions
25/03/2025, 15:17
250325-spj25s1qz4 1007/02/2025, 02:05
250207-ch85pavlcw 1005/02/2025, 09:52
250205-lv9resspek 1004/02/2025, 01:46
250204-b63gdasncq 10Analysis
-
max time kernel
110s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe
Resource
win11-20250314-en
General
-
Target
2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe
-
Size
219KB
-
MD5
24065b8ee2f59431f5d227cf619d7965
-
SHA1
523be526b80b0216bf1fe46dfb9391cf3f0576a0
-
SHA256
7f61eda7f9a77d6a594354ef8fbe92ad8f5aff8a696468a80c47ea3e9f640826
-
SHA512
b01f878d2507211606bb02cecd386b2d8cfd2922ede94fadb8199826f4174d0406cfb4f77d822022a55b5f5971c89a52604b22086f34e8c078f358aceb737621
-
SSDEEP
3072:7ZMTthZ1HyTpSmJhbE0sYVQYAfF0Cq3KXB4mKVTNp4qYNu5nm+5XBNMYEmZ:7ZMLtmJ2056790CqivKVjnYNsB
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/8b67ffb2aa568937
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (277) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\KRAB-DECRYPT.txt 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\aa568edbaa568932511.lock 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\T: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\X: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\G: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\L: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\U: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\W: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\B: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\H: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\J: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\S: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\V: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\Y: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\E: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\N: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\P: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\Q: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\R: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\Z: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\A: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\I: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\K: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened (read-only) \??\M: 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File created C:\Program Files\aa568edbaa568932511.lock 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\ExitUse.svg 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\FormatUnprotect.bin 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\JoinResume.wvx 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\LimitPop.mht 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\UnpublishMerge.mpeg 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\aa568edbaa568932511.lock 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\CloseProtect.docx 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\CompletePush.ttc 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\MeasureSearch.wmv 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\OpenRepair.xml 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\RestoreUnprotect.xht 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\KRAB-DECRYPT.txt 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files\KRAB-DECRYPT.txt 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\UseBackup.ogg 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\aa568edbaa568932511.lock 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\BackupEdit.xhtml 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\ConnectSave.ogg 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\SkipFormat.ini 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\SplitMove.dib 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\SplitStop.nfo 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\UnpublishRestore.easmx 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\ConfirmUnprotect.html 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\TraceDeny.zip 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\KRAB-DECRYPT.txt 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\KRAB-DECRYPT.txt 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\EnterUnprotect.vb 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\GroupResolve.docx 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\InstallReset.ps1xml 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\PublishSet.M2V 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\KRAB-DECRYPT.txt 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\aa568edbaa568932511.lock 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\DisconnectRevoke.mid 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\UnblockSelect.jpg 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\UnregisterComplete.aiff 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\aa568edbaa568932511.lock 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\AddRead.M2T 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\ConvertFromDisconnect.mpg 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\GetWatch.rtf 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\HideSet.vsd 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\RegisterStep.xla 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe File opened for modification C:\Program Files\SuspendExit.pps 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe 2036 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1488 wmic.exe Token: SeSecurityPrivilege 1488 wmic.exe Token: SeTakeOwnershipPrivilege 1488 wmic.exe Token: SeLoadDriverPrivilege 1488 wmic.exe Token: SeSystemProfilePrivilege 1488 wmic.exe Token: SeSystemtimePrivilege 1488 wmic.exe Token: SeProfSingleProcessPrivilege 1488 wmic.exe Token: SeIncBasePriorityPrivilege 1488 wmic.exe Token: SeCreatePagefilePrivilege 1488 wmic.exe Token: SeBackupPrivilege 1488 wmic.exe Token: SeRestorePrivilege 1488 wmic.exe Token: SeShutdownPrivilege 1488 wmic.exe Token: SeDebugPrivilege 1488 wmic.exe Token: SeSystemEnvironmentPrivilege 1488 wmic.exe Token: SeRemoteShutdownPrivilege 1488 wmic.exe Token: SeUndockPrivilege 1488 wmic.exe Token: SeManageVolumePrivilege 1488 wmic.exe Token: 33 1488 wmic.exe Token: 34 1488 wmic.exe Token: 35 1488 wmic.exe Token: SeIncreaseQuotaPrivilege 1488 wmic.exe Token: SeSecurityPrivilege 1488 wmic.exe Token: SeTakeOwnershipPrivilege 1488 wmic.exe Token: SeLoadDriverPrivilege 1488 wmic.exe Token: SeSystemProfilePrivilege 1488 wmic.exe Token: SeSystemtimePrivilege 1488 wmic.exe Token: SeProfSingleProcessPrivilege 1488 wmic.exe Token: SeIncBasePriorityPrivilege 1488 wmic.exe Token: SeCreatePagefilePrivilege 1488 wmic.exe Token: SeBackupPrivilege 1488 wmic.exe Token: SeRestorePrivilege 1488 wmic.exe Token: SeShutdownPrivilege 1488 wmic.exe Token: SeDebugPrivilege 1488 wmic.exe Token: SeSystemEnvironmentPrivilege 1488 wmic.exe Token: SeRemoteShutdownPrivilege 1488 wmic.exe Token: SeUndockPrivilege 1488 wmic.exe Token: SeManageVolumePrivilege 1488 wmic.exe Token: 33 1488 wmic.exe Token: 34 1488 wmic.exe Token: 35 1488 wmic.exe Token: SeBackupPrivilege 2600 vssvc.exe Token: SeRestorePrivilege 2600 vssvc.exe Token: SeAuditPrivilege 2600 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1488 2036 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe 31 PID 2036 wrote to memory of 1488 2036 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe 31 PID 2036 wrote to memory of 1488 2036 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe 31 PID 2036 wrote to memory of 1488 2036 2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exeC:\Users\Admin\AppData\Local\Temp\2025-02-04_24065b8ee2f59431f5d227cf619d7965_mafia.exe bcdedit /set shutdown /r /f /t 21⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD54ff4eb4d8cc68e5a38a98285b0281e6d
SHA12d72b50e8db5ee9b006e91bbeff6803f05468651
SHA25657bb7d429ef39917f32a13a4225153f89f57ae681c561ded7446fbcea161777e
SHA512a4266b27be3fe052c1e3b8bb79d3d34692a99fe54d1cd34cc4070ae730e5696a62d080449e9bd1869da35c1bc87fc25282868e14b0a0288f70317aabe64896ce