Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 06:39
Behavioral task
behavioral1
Sample
2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe
-
Size
80KB
-
MD5
256e8c835e8e059ab67da6cd5349640c
-
SHA1
d120a5bb81253f34915788fe69840ff8774aa9f9
-
SHA256
8f5e10f3de6c82b91b81b7fe3d8443092272bdc835fd31adfa3827cca8f324da
-
SHA512
1efeb435082c4136d9531f29baceb411d75d14df6fe907c5a2cbe19ee1bb4037dc3ad35a74dc7ebf4b9aff2e6cc86b1073cbdd07f1d5de4dc17814173a11178b
-
SSDEEP
1536:G55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rb:sMSjOnrmBTMqqDL2/mr3IdE8we0Avu5X
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ahpkyrzpnhl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe" 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\I: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\O: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\E: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\M: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\P: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\Q: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\R: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\T: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\X: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\J: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\K: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\L: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\N: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\U: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\V: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\W: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\Z: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\A: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\B: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\G: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\S: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe File opened (read-only) \??\Y: 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4456 wrote to memory of 6140 4456 cmd.exe 87 PID 4456 wrote to memory of 6140 4456 cmd.exe 87 PID 4456 wrote to memory of 6140 4456 cmd.exe 87 PID 760 wrote to memory of 1728 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 88 PID 760 wrote to memory of 1728 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 88 PID 760 wrote to memory of 1728 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 88 PID 760 wrote to memory of 4328 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 90 PID 760 wrote to memory of 4328 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 90 PID 760 wrote to memory of 4328 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 90 PID 760 wrote to memory of 3068 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 92 PID 760 wrote to memory of 3068 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 92 PID 760 wrote to memory of 3068 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 92 PID 760 wrote to memory of 4968 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 95 PID 760 wrote to memory of 4968 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 95 PID 760 wrote to memory of 4968 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 95 PID 760 wrote to memory of 6008 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 97 PID 760 wrote to memory of 6008 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 97 PID 760 wrote to memory of 6008 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 97 PID 760 wrote to memory of 5296 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 99 PID 760 wrote to memory of 5296 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 99 PID 760 wrote to memory of 5296 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 99 PID 760 wrote to memory of 5676 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 101 PID 760 wrote to memory of 5676 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 101 PID 760 wrote to memory of 5676 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 101 PID 760 wrote to memory of 4732 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 103 PID 760 wrote to memory of 4732 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 103 PID 760 wrote to memory of 4732 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 103 PID 760 wrote to memory of 5940 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 105 PID 760 wrote to memory of 5940 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 105 PID 760 wrote to memory of 5940 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 105 PID 760 wrote to memory of 3052 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 107 PID 760 wrote to memory of 3052 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 107 PID 760 wrote to memory of 3052 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 107 PID 760 wrote to memory of 816 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 109 PID 760 wrote to memory of 816 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 109 PID 760 wrote to memory of 816 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 109 PID 760 wrote to memory of 6056 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 111 PID 760 wrote to memory of 6056 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 111 PID 760 wrote to memory of 6056 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 111 PID 760 wrote to memory of 3048 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 113 PID 760 wrote to memory of 3048 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 113 PID 760 wrote to memory of 3048 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 113 PID 760 wrote to memory of 6044 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 115 PID 760 wrote to memory of 6044 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 115 PID 760 wrote to memory of 6044 760 2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:6008
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:5296
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:5676
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:5940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:6056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:6044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exeC:\Users\Admin\AppData\Local\Temp\2025-04-11_256e8c835e8e059ab67da6cd5349640c_elex_gandcrab_rhadamanthys.exe2⤵
- Checks processor information in registry
PID:6140
-