| File name: | 1.bin |
| Full analysis: | https://app.any.run/tasks/918ee3cd-37d4-4095-ab08-9edca362e839 |
| Verdict: | Malicious activity |
| Threats: | GandCrab is probably one of the most famous Ransomware. A Ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost. |
| Analysis date: | January 18, 2019, 02:26:22 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | E387BD817E9B7F02FA9C2511CC345F12 |
| SHA1: | 98B3EC47B64198E3604C738F8C1F4753E0AFA8C7 |
| SHA256: | 39514226B71AEBBE775AA14627C716973282CBA201532DF3F820A209D87F6DF9 |
| SSDEEP: | 3072:06scOhLLGEdJT5GBQ8eTgeOJnflLfe1ndzo9cLvJkXky6GHBTfFhTWkCvaTdmGlB:0ccLLGEsC7v4c1ndzhe0IdfJC6BtZtb |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:07:26 02:54:11+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 65536 |
| InitializedDataSize: | 307200 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x5072 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.45.8.4 |
| ProductVersionNumber: | 7.32.568.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (British) |
| CharacterSet: | Unicode |
| FileVersion: | 1.0.8.39 |
| ProductVersion: | 1.0.8.39 |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 26-Jul-2017 00:54:11 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000F0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 26-Jul-2017 00:54:11 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0000FEDB | 0x00010000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.54749 |
.rdata | 0x00011000 | 0x0000411E | 0x00004200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.17141 |
.data | 0x00016000 | 0x0001D2DC | 0x0001B800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.73542 |
.rsrc | 0x00034000 | 0x00028BCA | 0x00028C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.29617 |
.reloc | 0x0005D000 | 0x00001AE0 | 0x00001C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.66732 |
KERNEL32.dll |
Title | Ordinal | Address |
|---|---|---|
156966 | 0x00000000 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2676 | "C:\Users\admin\AppData\Local\Temp\1.bin.exe" | C:\Users\admin\AppData\Local\Temp\1.bin.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2696 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3640 | "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete | C:\Windows\system32\wbem\wmic.exe | 1.bin.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\ex_data\data |
| Operation: | write | Name: | ext |
Value: 2E0062007200630079006F000000 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\keys_data\data |
| Operation: | write | Name: | public |
Value: 0602000000A40000525341310008000001000100C3F3B152B750B0BF42757BDA7D53A803ACADA89352F1298B656BC47BD7A6F9589D6EF6FB6AA3811E9EF432F1A153A854CF598DDF9D4EE4C9F3450482117299DB1933455773D2360D4947770D2284BD82EB3CB26B8AB2F8739FA952B0BCCEC4EA7D63D83E863450A1B2601548C2B571DD364B49D3D4513D16294D7A51B8F854573A056853988A9BF5DDB0580F06E5E536D4EB1EC6B2DD0269A3D02E99088C59865A5361DDD75CCCB4FF056DEF01D86CDF54D9069D458CFF72258AAFE6CDE8A7F1127DBBEF28BEA2D0D57EF6C5D42EE93A1792FFE2F6518DD847F765B46D2248065FA46570E1BF37DA36CF5C3590CD863951C724B133665AAD7B8923F2947612BC | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\keys_data\data |
| Operation: | write | Name: | private |
Value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| |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (2676) 1.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2676 | 1.bin.exe | C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\boot.sdi | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\Winre.wim.brcyo | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\Winre.wim | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{05ed3515-06b3-48f6-8cf2-bf24b1bf0727}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{16d74681-6bc3-4c44-97f0-8b8dfefe2355}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{38e8535f-27d0-4352-aa3a-ce4178930102}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{3cc0f82b-873a-4e59-b89f-689fbdf88af9}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\BRCYO-DECRYPT.txt | text | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{5c4beaff-a038-4df7-9b35-072a18f8e3d6}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 2676 | 1.bin.exe | C:\BRCYO-DECRYPT.txt | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2676 | 1.bin.exe | GET | 301 | 138.201.162.99:80 | http://www.kakaocorp.link/ | DE | html | 162 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2676 | 1.bin.exe | 138.201.162.99:80 | www.kakaocorp.link | Hetzner Online GmbH | DE | malicious |
2676 | 1.bin.exe | 138.201.162.99:443 | www.kakaocorp.link | Hetzner Online GmbH | DE | malicious |
Domain | IP | Reputation |
|---|---|---|
www.kakaocorp.link |
| malicious |