File name:

2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab

Full analysis: https://app.any.run/tasks/b3ad0cdc-3b08-4399-b3af-29660c8c64d8
Verdict: Malicious activity
Threats:

GandCrab is probably one of the most famous Ransomware. A Ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.

Analysis date: April 29, 2025, 23:34:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
gandcrab
ransomware
auto-reg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

D68613A2FB71463F61544834F6B7C36F

SHA1:

9A83DDE342501989F15744EB8249A27F1AE5981B

SHA256:

4253C0A28685E4A4CC939D9D4AF602BAEE50376507A011737712843A52A758BE

SSDEEP:

3072:Po/yUZDVn0qS+G7ug/4r3IdE8we0Avu5r++ygLIaa7v:4B0uG7nv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GANDCRAB mutex has been found

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
    • Changes the autorun value in the registry

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
  • SUSPICIOUS

    • Executes application which crashes

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
    • Executable content was dropped or overwritten

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
  • INFO

    • Checks supported languages

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
    • Creates files or folders in the user directory

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • WerFault.exe (PID: 7548)
      • WerFault.exe (PID: 7880)
    • Reads the machine GUID from the registry

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
    • Auto-launch of the file from Registry key

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
    • Manual execution by a user

      • rokwau.exe (PID: 7828)
    • Reads CPU info

      • 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe (PID: 7380)
      • rokwau.exe (PID: 7828)
    • Checks proxy server information

      • slui.exe (PID: 8104)
    • Reads the software policy settings

      • slui.exe (PID: 8104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:02:03 18:58:37+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 32768
InitializedDataSize: 41472
UninitializedDataSize: -
EntryPoint: 0x4af0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe werfault.exe no specs rokwau.exe werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7380"C:\Users\admin\Desktop\2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe" C:\Users\admin\Desktop\2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7548C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7380 -s 384C:\Windows\SysWOW64\WerFault.exe2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7828"C:\Users\admin\AppData\Roaming\Microsoft\rokwau.exe"C:\Users\admin\AppData\Roaming\Microsoft\rokwau.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\roaming\microsoft\rokwau.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7880C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7828 -s 424C:\Windows\SysWOW64\WerFault.exerokwau.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
8104C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
6 749
Read events
6 747
Write events
2
Delete events
0

Modification events

(PID) Process:(7380) 2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:lnpiqgshynh
Value:
"C:\Users\admin\AppData\Roaming\Microsoft\rokwau.exe"
(PID) Process:(7828) rokwau.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:mdgnksjglmj
Value:
"C:\Users\admin\AppData\Roaming\Microsoft\rokwau.exe"
Executable files
1
Suspicious files
6
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2025-04-29_d6861_aa4da9b12a648334ee7e205c64fca6a7b610bded_a588adfc_6233b161-b93b-4bba-91de-3cabc435e4b4\Report.wer
MD5:
SHA256:
7880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rokwau.exe_4f78366bca67ff84705f7dfcb970a11b4a042_020c8a57_f22106ad-4468-4c14-8e71-57d42ade6450\Report.wer
MD5:
SHA256:
7548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC8D1.tmp.WERInternalMetadata.xmlbinary
MD5:226162FDA1567B39749DAB2B8A0288C9
SHA256:7160938F8876C82CEE801EB1825A74EA6EA13FDCBE99186FB4EA7A78C67493FA
7548WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\2025-04-29_d68613a2fb71463f61544834f6b7c36f_elex_gandcrab.exe.7380.dmpbinary
MD5:B7D3F3A10F3922876E72BB7B284240A9
SHA256:5EC84AD040D9A784F1D6910404651224CCF4AD13626957D14E10A8C25C87EFA7
7880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREA93.tmp.xmlxml
MD5:DCECC7AE8FF030271C4A03C2E0D45B47
SHA256:19D2CED6DBF2F9F8C34EF86167430C34DA2D30705DF213A36C9DC544C531B09E
7548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC910.tmp.xmlxml
MD5:13802A0FA283DBCC360B4CA01CBB7EEF
SHA256:2BDE48BEDC72D7C2314FF976EF25BE3AD840DF4B724D6D2D9D2F1FE360DC26B6
7548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC834.tmp.dmpbinary
MD5:BDA33EE91CAB42B0F105A6B1081A7A62
SHA256:67D3C760B1B183BE359A2071EC61047E7A7CA23455F0D05544DACFA692E7D5A0
7880WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rokwau.exe.7828.dmpbinary
MD5:A28BDF968945344D4E33989FFFA492AD
SHA256:EC6C3590EC6A2E2CF6F9BB91887D7528467FF10FC80055C808FC5D3F85F1C4BC
7880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREA33.tmp.dmpbinary
MD5:A524E9E852AC6AF5482B21D4CA21D6FA
SHA256:A33411D996F9D028D8DBD505EE171824904AEADBAE876234F2A50F29BCC90147
7880WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREA72.tmp.WERInternalMetadata.xmlbinary
MD5:74B1245A07EE796D6DE0FF31987D4B21
SHA256:15D740A564257F761F345CD175A83B28FA61F93EA20739382F8D2B49EF4DA4A4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
104.124.11.58:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6404
RUXIMICS.exe
GET
200
104.124.11.58:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6404
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6404
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
104.124.11.58:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6404
RUXIMICS.exe
104.124.11.58:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
6404
RUXIMICS.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 104.124.11.58
  • 104.124.11.17
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info