Resubmissions

01-07-2024 11:04

240701-m6eabs1dmq 10

01-07-2024 10:46

240701-mvbeaszgmr 10

Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 11:04

Errors

Reason
Machine shutdown

General

  • Target

    2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe

  • Size

    97KB

  • MD5

    bd7ee23b22fb3423107a0df21e5ce168

  • SHA1

    7ebb5d065468d4f977d51dc0b981dce0c2e1424b

  • SHA256

    506c50d25574a836a380c4cf9371282554f9636c9ad37e1c3456390487af417c

  • SHA512

    5e0092f6bc4321a97a97fe5f3cdbb0a53ea0d9161b03e6143cbcc3a12b5796c03e50c1bb6e8d1cccc7b3694c6f0024dd7f9c707c20f4e5597782113c1bf0a6fe

  • SSDEEP

    1536:3ZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAlMqqU+2bbbAV2/S2LNmHkf:/BounVyFHkMqqDL2/LgHkctc

Malware Config

Signatures

  • GandCrab payload 5 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\nslookup.exe
      nslookup nomoreransom.coin dns1.soprodns.ru
      2⤵
        PID:1704
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup nomoreransom.bit dns1.soprodns.ru
        2⤵
          PID:1484
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup gandcrab.bit dns2.soprodns.ru
          2⤵
            PID:4416
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup nomoreransom.coin dns2.soprodns.ru
            2⤵
              PID:4808
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup nomoreransom.bit dns2.soprodns.ru
              2⤵
                PID:2176
            • C:\Windows\System32\rundll32.exe
              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              1⤵
                PID:1372
              • C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe
                "C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe"
                1⤵
                • Checks processor information in registry
                PID:808
              • C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe
                "C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe"
                1⤵
                • Checks processor information in registry
                PID:2104
              • C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe
                "C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe"
                1⤵
                • Checks processor information in registry
                PID:1404
              • C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe
                "C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe"
                1⤵
                • Checks processor information in registry
                PID:1520
              • C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe
                "C:\Users\Admin\AppData\Local\Temp\2024-07-01_bd7ee23b22fb3423107a0df21e5ce168_gandcrab.exe"
                1⤵
                • Checks processor information in registry
                PID:3488
              • C:\Windows\system32\LogonUI.exe
                "LogonUI.exe" /flags:0x4 /state0:0xa39ae855 /state1:0x41c64e6d
                1⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of SetWindowsHookEx
                PID:3276

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              2
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/808-5-0x000000000F430000-0x000000000F44B000-memory.dmp
                Filesize

                108KB

              • memory/2104-6-0x000000000F430000-0x000000000F44B000-memory.dmp
                Filesize

                108KB

              • memory/2356-0-0x000000000F430000-0x000000000F44B000-memory.dmp
                Filesize

                108KB

              • memory/2356-4-0x000000000F430000-0x000000000F44B000-memory.dmp
                Filesize

                108KB

              • memory/2356-7-0x000000000F430000-0x000000000F44B000-memory.dmp
                Filesize

                108KB