Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 06:35
Behavioral task
behavioral1
Sample
2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe
-
Size
80KB
-
MD5
256e8c835e8e059ab67da6cd5349640c
-
SHA1
d120a5bb81253f34915788fe69840ff8774aa9f9
-
SHA256
8f5e10f3de6c82b91b81b7fe3d8443092272bdc835fd31adfa3827cca8f324da
-
SHA512
1efeb435082c4136d9531f29baceb411d75d14df6fe907c5a2cbe19ee1bb4037dc3ad35a74dc7ebf4b9aff2e6cc86b1073cbdd07f1d5de4dc17814173a11178b
-
SSDEEP
1536:G55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rb:sMSjOnrmBTMqqDL2/mr3IdE8we0Avu5X
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\uhteebecyab = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe" 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\O: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\U: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\B: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\H: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\Q: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\R: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\Z: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\A: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\J: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\M: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\N: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\P: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\T: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\V: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\W: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\I: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\L: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\S: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\X: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\Y: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\E: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\G: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4308 3828 cmd.exe 92 PID 3828 wrote to memory of 4308 3828 cmd.exe 92 PID 3828 wrote to memory of 4308 3828 cmd.exe 92 PID 1216 wrote to memory of 4816 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 95 PID 1216 wrote to memory of 4816 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 95 PID 1216 wrote to memory of 4816 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 95 PID 1216 wrote to memory of 828 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 105 PID 1216 wrote to memory of 828 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 105 PID 1216 wrote to memory of 828 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 105 PID 1216 wrote to memory of 4312 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 107 PID 1216 wrote to memory of 4312 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 107 PID 1216 wrote to memory of 4312 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 107 PID 1216 wrote to memory of 5068 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 110 PID 1216 wrote to memory of 5068 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 110 PID 1216 wrote to memory of 5068 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 110 PID 1216 wrote to memory of 5192 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 119 PID 1216 wrote to memory of 5192 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 119 PID 1216 wrote to memory of 5192 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 119 PID 1216 wrote to memory of 4336 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 121 PID 1216 wrote to memory of 4336 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 121 PID 1216 wrote to memory of 4336 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 121 PID 1216 wrote to memory of 804 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 124 PID 1216 wrote to memory of 804 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 124 PID 1216 wrote to memory of 804 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 124 PID 1216 wrote to memory of 4688 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 126 PID 1216 wrote to memory of 4688 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 126 PID 1216 wrote to memory of 4688 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 126 PID 1216 wrote to memory of 4692 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 128 PID 1216 wrote to memory of 4692 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 128 PID 1216 wrote to memory of 4692 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 128 PID 1216 wrote to memory of 1872 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 130 PID 1216 wrote to memory of 1872 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 130 PID 1216 wrote to memory of 1872 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 130 PID 1216 wrote to memory of 4488 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 132 PID 1216 wrote to memory of 4488 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 132 PID 1216 wrote to memory of 4488 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 132 PID 1216 wrote to memory of 4620 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 134 PID 1216 wrote to memory of 4620 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 134 PID 1216 wrote to memory of 4620 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 134 PID 1216 wrote to memory of 2592 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 136 PID 1216 wrote to memory of 2592 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 136 PID 1216 wrote to memory of 2592 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 136 PID 1216 wrote to memory of 1660 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 138 PID 1216 wrote to memory of 1660 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 138 PID 1216 wrote to memory of 1660 1216 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 138
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4312
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:5192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4336
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exeC:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe2⤵
- Checks processor information in registry
PID:4308
-