URL:

http://topwarenhub.top/summerjam.exe

Full analysis: https://app.any.run/tasks/40fb003c-0b23-43e1-9df9-ab5d09962fe6
Verdict: Malicious activity
Threats:

GandCrab is probably one of the most famous Ransomware. A Ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.

Analysis date: December 18, 2018, 12:27:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
gandcrab
trojan
loader
Indicators:
MD5:

66D0CFEC63A4D5945B07F18418E9BBF2

SHA1:

8F8B973434EDE7EC9E29E749D68493D472E00E8D

SHA256:

0858AC7D2125446C2905A8238352E7D25C0D3B001DDCE6A2799C24DF661AF529

SSDEEP:

3:N1KKKJQ5SlONd9XPCC:CKF5SlMzX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GandCrab keys found

      • summerjam[1].exe (PID: 2532)
    • Writes file to Word startup folder

      • summerjam[1].exe (PID: 2532)
    • Actions looks like stealing of personal data

      • summerjam[1].exe (PID: 2532)
    • Application was dropped or rewritten from another process

      • summerjam[1].exe (PID: 2532)
    • Dropped file may contain instructions of ransomware

      • summerjam[1].exe (PID: 2532)
    • Deletes shadow copies

      • summerjam[1].exe (PID: 2532)
    • Renames files like Ransomware

      • summerjam[1].exe (PID: 2532)
    • Connects to CnC server

      • summerjam[1].exe (PID: 2532)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3100)
    • Changes settings of System certificates

      • summerjam[1].exe (PID: 2532)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3100)
      • iexplore.exe (PID: 2956)
    • Creates files in the program directory

      • summerjam[1].exe (PID: 2532)
    • Reads the cookies of Mozilla Firefox

      • summerjam[1].exe (PID: 2532)
    • Creates files like Ransomware instruction

      • summerjam[1].exe (PID: 2532)
    • Adds / modifies Windows certificates

      • summerjam[1].exe (PID: 2532)
    • Creates files in the user directory

      • summerjam[1].exe (PID: 2532)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3100)
      • iexplore.exe (PID: 2956)
    • Changes internet zones settings

      • iexplore.exe (PID: 2956)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 2956)
      • iexplore.exe (PID: 3100)
    • Dropped object may contain TOR URL's

      • summerjam[1].exe (PID: 2532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start iexplore.exe iexplore.exe #GANDCRAB summerjam[1].exe wmic.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2532"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\summerjam[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\summerjam[1].exe
iexplore.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\0uu90r59\summerjam[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
2956"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3004"C:\Windows\system32\wbem\wmic.exe" shadowcopy deleteC:\Windows\system32\wbem\wmic.exesummerjam[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
2147749908
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3100"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2956 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3628"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
796
Read events
698
Write events
89
Delete events
9

Modification events

(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{4FB430FD-02C0-11E9-91D7-5254004A04AF}
Value:
0
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
3
(PID) Process:(2956) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E2070C00020012000C001B002A009300
Executable files
2
Suspicious files
286
Text files
215
Unknown types
6

Dropped files

PID
Process
Filename
Type
2956iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
MD5:
SHA256:
2956iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2956iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF37E930B3BDD8E85F.TMP
MD5:
SHA256:
2532summerjam[1].exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp
MD5:
SHA256:
2956iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018121820181219\index.datdat
MD5:
SHA256:
3100iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012018121820181219\index.datdat
MD5:
SHA256:
2956iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{4FB430FE-02C0-11E9-91D7-5254004A04AF}.datbinary
MD5:
SHA256:
2532summerjam[1].exeC:\Users\admin\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobData
MD5:
SHA256:
2956iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\summerjam[1].exeexecutable
MD5:
SHA256:
2532summerjam[1].exeC:\Users\admin\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobSettings
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
44
DNS requests
23
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2532
summerjam[1].exe
GET
136.243.13.215:80
http://www.holzbock.biz/
DE
suspicious
2532
summerjam[1].exe
GET
301
83.138.82.107:80
http://www.swisswellness.com/
DE
whitelisted
2532
summerjam[1].exe
GET
302
192.185.159.253:80
http://www.pizcam.com/
US
malicious
2532
summerjam[1].exe
GET
212.59.186.61:80
http://www.hotelweisshorn.com/
CH
malicious
2532
summerjam[1].exe
GET
301
83.166.138.7:80
http://www.whitepod.com/
CH
whitelisted
2532
summerjam[1].exe
GET
301
80.244.187.247:80
http://www.hotelfarinet.com/
GB
malicious
2532
summerjam[1].exe
GET
301
104.24.23.22:80
http://www.belvedere-locarno.com/
US
shared
2532
summerjam[1].exe
GET
78.46.77.98:80
http://www.2mmotorsport.biz/
DE
suspicious
2532
summerjam[1].exe
POST
78.46.77.98:80
http://www.2mmotorsport.biz/content/images/fuseru.png
DE
suspicious
2532
summerjam[1].exe
GET
200
74.220.215.73:80
http://www.bizziniinfissi.com/
US
html
6.96 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2532
summerjam[1].exe
104.24.23.22:443
www.belvedere-locarno.com
Cloudflare Inc
US
shared
2956
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3100
iexplore.exe
203.91.116.53:80
topwarenhub.top
G-Mobile Corporation
MN
malicious
2532
summerjam[1].exe
78.46.77.98:80
www.2mmotorsport.biz
Hetzner Online GmbH
DE
suspicious
2532
summerjam[1].exe
217.26.53.161:80
www.haargenau.biz
Hostpoint AG
CH
malicious
2532
summerjam[1].exe
74.220.215.73:80
www.bizziniinfissi.com
Unified Layer
US
malicious
2532
summerjam[1].exe
136.243.13.215:80
www.holzbock.biz
Hetzner Online GmbH
DE
suspicious
2532
summerjam[1].exe
138.201.162.99:80
www.fliptray.biz
Hetzner Online GmbH
DE
malicious
2532
summerjam[1].exe
138.201.162.99:443
www.fliptray.biz
Hetzner Online GmbH
DE
malicious
2532
summerjam[1].exe
192.185.159.253:80
www.pizcam.com
CyrusOne LLC
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
topwarenhub.top
  • 203.91.116.53
  • 89.17.225.163
  • 85.187.48.16
  • 194.204.25.137
  • 46.238.18.157
  • 95.140.195.178
  • 188.254.142.85
  • 95.158.162.200
  • 213.6.58.250
  • 89.47.94.113
malicious
www.2mmotorsport.biz
  • 78.46.77.98
unknown
www.haargenau.biz
  • 217.26.53.161
unknown
www.bizziniinfissi.com
  • 74.220.215.73
malicious
www.holzbock.biz
  • 136.243.13.215
unknown
www.fliptray.biz
  • 138.201.162.99
malicious
www.pizcam.com
  • 192.185.159.253
unknown
www.swisswellness.com
  • 83.138.82.107
whitelisted
www.hotelweisshorn.com
  • 212.59.186.61
unknown

Threats

PID
Process
Class
Message
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
3100
iexplore.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3100
iexplore.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
3100
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3100
iexplore.exe
Misc activity
ET INFO Possible EXE Download From Suspicious TLD
2532
summerjam[1].exe
A Network Trojan was detected
ET TROJAN [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity
2532
summerjam[1].exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/GandCrab Ransomware CnC Activity
2532
summerjam[1].exe
A Network Trojan was detected
ET POLICY Data POST to an image file (gif)
2532
summerjam[1].exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/GandCrab Ransomware CnC Activity
2532
summerjam[1].exe
A Network Trojan was detected
ET POLICY Data POST to an image file (gif)
No debug info