Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe
-
Size
91KB
-
MD5
9c59dda483facf2ffc068442e0dfe91d
-
SHA1
8151fec10267140e71a20f2a348d7b125cd7f4b8
-
SHA256
6e85c16717cd78817d56611151b9180eb06ca48268244a649eaf30de6e16bc87
-
SHA512
838dde099a696a6c327dcad0718bf1dd01fd2d2a35a438b1fe1576cfe32c2e9188b4c1a3a480f7dd1c4dd683ffaf9bc931e4b8b379d9cacc3b120b03c1e61a2c
-
SSDEEP
1536:WGdg6A8xXaHuX39Ev8hGijIa7DdfQZblriWU8BFXOsWjcdS6ItKT0S:JZqCZjIGmrLrJItKT0S
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/ca083b2b468e870
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (278) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe -
Drops startup file 2 IoCs
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\KRAB-DECRYPT.txt 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\468ef9d468e87041b.lock 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exedescription ioc process File opened (read-only) \??\R: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\T: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\X: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\Z: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\H: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\L: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\J: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\M: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\P: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\Q: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\U: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\W: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\G: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\I: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\N: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\B: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\K: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\O: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\S: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\V: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\Y: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\A: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened (read-only) \??\E: 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe -
Drops file in Program Files directory 21 IoCs
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exedescription ioc process File opened for modification C:\Program Files\StartUnblock.bmp 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File created C:\Program Files (x86)\468ef9d468e87041b.lock 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\AddShow.jfif 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\DismountUnlock.xml 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\MeasureWatch.pcx 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File created C:\Program Files\468ef9d468e87041b.lock 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\ClearImport.scf 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\DismountRedo.tiff 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\GrantBlock.zip 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\SearchSync.mp4 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\WaitDebug.mpp 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File created C:\Program Files (x86)\KRAB-DECRYPT.txt 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File created C:\Program Files\KRAB-DECRYPT.txt 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\MountBlock.wmv 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\PublishUpdate.tif 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\RemoveResize.rm 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\RepairStart.wpl 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\SaveJoin.gif 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\StepPing.ods 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\WriteConvert.hta 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe File opened for modification C:\Program Files\InstallSkip.easmx 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4000 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exepid process 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
wmic.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2660 wmic.exe Token: SeSecurityPrivilege 2660 wmic.exe Token: SeTakeOwnershipPrivilege 2660 wmic.exe Token: SeLoadDriverPrivilege 2660 wmic.exe Token: SeSystemProfilePrivilege 2660 wmic.exe Token: SeSystemtimePrivilege 2660 wmic.exe Token: SeProfSingleProcessPrivilege 2660 wmic.exe Token: SeIncBasePriorityPrivilege 2660 wmic.exe Token: SeCreatePagefilePrivilege 2660 wmic.exe Token: SeBackupPrivilege 2660 wmic.exe Token: SeRestorePrivilege 2660 wmic.exe Token: SeShutdownPrivilege 2660 wmic.exe Token: SeDebugPrivilege 2660 wmic.exe Token: SeSystemEnvironmentPrivilege 2660 wmic.exe Token: SeRemoteShutdownPrivilege 2660 wmic.exe Token: SeUndockPrivilege 2660 wmic.exe Token: SeManageVolumePrivilege 2660 wmic.exe Token: 33 2660 wmic.exe Token: 34 2660 wmic.exe Token: 35 2660 wmic.exe Token: 36 2660 wmic.exe Token: SeIncreaseQuotaPrivilege 2660 wmic.exe Token: SeSecurityPrivilege 2660 wmic.exe Token: SeTakeOwnershipPrivilege 2660 wmic.exe Token: SeLoadDriverPrivilege 2660 wmic.exe Token: SeSystemProfilePrivilege 2660 wmic.exe Token: SeSystemtimePrivilege 2660 wmic.exe Token: SeProfSingleProcessPrivilege 2660 wmic.exe Token: SeIncBasePriorityPrivilege 2660 wmic.exe Token: SeCreatePagefilePrivilege 2660 wmic.exe Token: SeBackupPrivilege 2660 wmic.exe Token: SeRestorePrivilege 2660 wmic.exe Token: SeShutdownPrivilege 2660 wmic.exe Token: SeDebugPrivilege 2660 wmic.exe Token: SeSystemEnvironmentPrivilege 2660 wmic.exe Token: SeRemoteShutdownPrivilege 2660 wmic.exe Token: SeUndockPrivilege 2660 wmic.exe Token: SeManageVolumePrivilege 2660 wmic.exe Token: 33 2660 wmic.exe Token: 34 2660 wmic.exe Token: 35 2660 wmic.exe Token: 36 2660 wmic.exe Token: SeBackupPrivilege 3892 vssvc.exe Token: SeRestorePrivilege 3892 vssvc.exe Token: SeAuditPrivilege 3892 vssvc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.execmd.exedescription pid process target process PID 3148 wrote to memory of 2660 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe wmic.exe PID 3148 wrote to memory of 2660 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe wmic.exe PID 3148 wrote to memory of 2660 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe wmic.exe PID 3148 wrote to memory of 4164 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe cmd.exe PID 3148 wrote to memory of 4164 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe cmd.exe PID 3148 wrote to memory of 4164 3148 2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe cmd.exe PID 4164 wrote to memory of 4000 4164 cmd.exe timeout.exe PID 4164 wrote to memory of 4000 4164 cmd.exe timeout.exe PID 4164 wrote to memory of 4000 4164 cmd.exe timeout.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe"1⤵
- Checks computer location settings
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -c 5 & del "C:\Users\Admin\AppData\Local\Temp\2024-06-19_9c59dda483facf2ffc068442e0dfe91d_gandcrab_karagany.exe" /f /q2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout -c 53⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\KRAB-DECRYPT.txtFilesize
7KB
MD55d0e763c09873f733486c7a8f6a8b264
SHA17169d5ea5da89cb5fcfa333ecb0ef2f2a67113d7
SHA25692fbe5d43b21d44f05d0eba0799f91128fc6350bdd241d820753db15f86a40c4
SHA51293b9857e93b82d101f8f04244b86d008b7996d3c959a08b1e884a5ecd9f4c90dbd14c7377dc3fc77b0a8c1baa4fa1ee0adc40b603806443b322d9300ae557a95