File name:

2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab

Full analysis: https://app.any.run/tasks/3af0ff17-ee16-4479-81ff-8a97aa5fc211
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 24, 2025, 16:42:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
grandcrab
ransomware
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

0D54C331DCE2A76FF5F8EBCB8D35FF18

SHA1:

DDC1AFB60C1F6FED73B0777CF8565B0C6C5E347E

SHA256:

5674E690FB2640C036485FAE0E7A468813129786BEACBE4F209BC8CC861393D9

SSDEEP:

768:4m5MpFvK8LmFDEuE0umZhfH+dRehemCMG5W/UMlaxvKop2hKjeT2FvpDcziq/pEP:gpF3mBbfedUhemCMGg/iZaqvtEU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GRANDCRAB mutex has been found

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Changes the autorun value in the registry

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Reads security settings of Internet Explorer

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Executes application which crashes

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Checks for external IP

      • svchost.exe (PID: 2196)
  • INFO

    • Creates files or folders in the user directory

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
      • WerFault.exe (PID: 4452)
    • Checks supported languages

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Reads the machine GUID from the registry

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Reads CPU info

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Reads the computer name

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
    • Checks proxy server information

      • 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe (PID: 4620)
      • slui.exe (PID: 4008)
    • Reads the software policy settings

      • slui.exe (PID: 4008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:03:04 18:10:15+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 34304
InitializedDataSize: 36352
UninitializedDataSize: -
EntryPoint: 0x4b20
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe svchost.exe werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4008C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4452C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4620 -s 1372C:\Windows\SysWOW64\WerFault.exe2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4620"C:\Users\admin\Desktop\2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe" C:\Users\admin\Desktop\2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
5 502
Read events
5 501
Write events
1
Delete events
0

Modification events

(PID) Process:(4620) 2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:beerztcieoy
Value:
"C:\Users\admin\AppData\Roaming\Microsoft\mynaac.exe"
Executable files
1
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2025-03-24_0d54c_3b1b3d126d5473d1b7ea6fefbed8d432256dee6_c15891a1_e1ea678b-36c7-426a-a00c-ef0f682970ec\Report.wer
MD5:
SHA256:
4452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDBBD.tmp.WERInternalMetadata.xmlbinary
MD5:D702A0364AD5A2681DF3DC8649E6C507
SHA256:CA72E5490F4B1A785A8F58F074C784542434610309E519DC99A7A1D1936BFFAF
4452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDAB2.tmp.dmpbinary
MD5:B46947C183419FFA5F85CA990563D47B
SHA256:571A40693B9C287B913CA58F059A9EB4B5EAA9411B0F13CBA3F666C379E0B6BC
4452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDBFC.tmp.xmlxml
MD5:5F8D71197273A9D4A7A2FFACF1438A3D
SHA256:B80CB93E9DAD3F05866A6E5183AC683053E2715FC4C52D4ED9AE39D69393D480
4452WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\2025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exe.4620.dmpbinary
MD5:0144E2C8B0730D1A5B5391F0F83DE695
SHA256:68678BD987B8184E518D04B175EB7A13F952716D6E4256B38B5F105A2B4AE26E
46202025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\0f5007522459c86e95ffcc62f32308f1_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:D898504A722BFF1524134C6AB6A5EAA5
SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
46202025-03-24_0d54c331dce2a76ff5f8ebcb8d35ff18_gandcrab.exeC:\Users\admin\AppData\Roaming\Microsoft\mynaac.exeexecutable
MD5:98CCFE7677D63C1196A5326F03A00EFB
SHA256:3FEF69B499F2274DB2DA8A5CCBCB79E9137B18544777D6041CF9257640CC07DB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
30
DNS requests
10
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
52.149.20.212:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
7000
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7000
SIHClient.exe
GET
200
23.48.23.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7000
SIHClient.exe
GET
200
23.48.23.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
7000
SIHClient.exe
GET
200
23.48.23.155:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
7000
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7000
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
GET
200
13.85.23.206:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1452
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4008
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4988
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7000
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7000
SIHClient.exe
23.48.23.155:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 172.217.16.142
whitelisted
ipv4bot.whatismyipaddress.com
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.73
  • 40.126.31.128
  • 20.190.159.128
  • 40.126.31.71
  • 40.126.31.3
  • 20.190.159.64
  • 20.190.159.0
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
crl.microsoft.com
  • 23.48.23.155
  • 23.48.23.171
  • 23.48.23.174
  • 23.48.23.175
  • 23.48.23.163
  • 23.48.23.176
  • 23.48.23.177
  • 23.48.23.173
  • 23.48.23.160
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (whatismyipaddress .com)
No debug info