| File name: | malware.exe |
| Full analysis: | https://app.any.run/tasks/47ddac92-bc77-4384-adf0-8cb6da2db70e |
| Verdict: | Malicious activity |
| Threats: | GandCrab is probably one of the most famous Ransomware. A Ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost. |
| Analysis date: | July 20, 2023, 14:17:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 35D03057D02E656FFE148BBB2523E0C7 |
| SHA1: | 3FF49986FD966A3157BE5B82B5FD02575E99E4BC |
| SHA256: | B535D4DC180F666DE891979E5D9D090C27D1EB0F252423C0B1911F1F0B9FC5B2 |
| SSDEEP: | 3072:x3iPmbqzPrLd+9zUhGed8tzm0OofBB61pqnevTglfap0PBNe8mFNTXaCm:x3iRLXd+9wEedAzNOoJB9nevT8CqEFN |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| CharacterSet: | Unknown (77B0) |
|---|---|
| LanguageCode: | Unknown (3436) |
| FileSubtype: | - |
| ObjectFileType: | VxD |
| FileOS: | Unknown (0x588891) |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 12.0.0.0 |
| FileVersionNumber: | 11.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x4955 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 110080 |
| CodeSize: | 147456 |
| LinkerVersion: | 10 |
| PEType: | PE32 |
| ImageFileCharacteristics: | Executable, 32-bit |
| TimeStamp: | 2017:05:12 01:51:11+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 12-May-2017 01:51:11 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000F0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 12-May-2017 01:51:11 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00023F95 | 0x00024000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.58057 |
.rdata | 0x00025000 | 0x0000652A | 0x00006600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.85165 |
.data | 0x0002C000 | 0x000040A8 | 0x00002200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.20509 |
.rsrc | 0x00031000 | 0x0000F450 | 0x0000F600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.45224 |
.reloc | 0x00041000 | 0x00001D2C | 0x00001E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.82363 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 2.86432 | 184 | UNKNOWN | UNKNOWN | RT_VERSION |
199 | 4.07191 | 23560 | UNKNOWN | UNKNOWN | RT_BITMAP |
201 | 6.21639 | 29736 | UNKNOWN | UNKNOWN | RT_BITMAP |
234 | 5.96011 | 5072 | UNKNOWN | UNKNOWN | RT_BITMAP |
1235 | 4.99297 | 2720 | UNKNOWN | UNKNOWN | RT_BITMAP |
ADVAPI32.dll |
KERNEL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1580 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2492 | "C:\Program Files\Notepad++\updater\gup.exe" -v7.91 | C:\Program Files\Notepad++\updater\GUP.exe | notepad++.exe | ||||||||||||
User: admin Company: Don HO don.h@free.fr Integrity Level: MEDIUM Description: WinGup for Notepad++ Exit code: 4294967295 Version: 5.11 Modules
| |||||||||||||||
| 2852 | "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete | C:\Windows\System32\wbem\WMIC.exe | — | malware.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 2147749908 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2892 | "C:\Windows\explorer.exe" | C:\Windows\explorer.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3588 | "C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Downloads\KRAB-DECRYPT.txt" | C:\Program Files\Notepad++\notepad++.exe | explorer.exe | ||||||||||||
User: admin Company: Don HO don.h@free.fr Integrity Level: MEDIUM Description: Notepad++ : a free (GNU) source code editor Exit code: 0 Version: 7.91 Modules
| |||||||||||||||
| 4052 | "C:\Users\admin\Desktop\malware.exe" | C:\Users\admin\Desktop\malware.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 4600000047010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (4052) malware.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1580) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{AC937D25-B615-4205-BB48-654BA316074B}\{66B7EE32-9FD6-46A2-8B87-22C2FDCDB325} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1580) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{AC937D25-B615-4205-BB48-654BA316074B} |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4052 | malware.exe | C:\Users\admin\AppData\Local\VirtualStore\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\MSOCache\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\Users\admin\AppData\Roaming\Adobe\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\Users\admin\AppData\Roaming\Adobe\Acrobat\DC\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\Users\admin\.oracle_jre_usage\KRAB-DECRYPT.txt | binary | |
MD5:96E2807F5AAC20FFB171ACE14BC30A72 | SHA256:9E6F03AB44EE572DCA68480B8F28937922430CF00CFBEBC0B7CA283993613DF1 | |||
| 4052 | malware.exe | C:\Users\admin\AppData\Roaming\Adobe\Acrobat\DC\JSCache\GlobData.KRAB | binary | |
MD5:C4212656728008B20AC0EC60C42DC491 | SHA256:C188E4D4C34BDB99CF02FFD4DA75F0171697A9B75D5FD13ED65690C09B19DFAB | |||
| 4052 | malware.exe | C:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp.KRAB | binary | |
MD5:F9BD8587339F058E1AC19E926955EC75 | SHA256:FA7585F34B05E42B0293CE8340644F493375EBF7B9FE4925FDFC1AD60EE64E45 | |||
| 4052 | malware.exe | C:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamp | binary | |
MD5:F9BD8587339F058E1AC19E926955EC75 | SHA256:FA7585F34B05E42B0293CE8340644F493375EBF7B9FE4925FDFC1AD60EE64E45 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4052 | malware.exe | GET | — | 15.188.254.247:80 | http://www.macartegrise.eu/ | FR | — | — | malicious |
4052 | malware.exe | GET | 403 | 204.11.56.48:80 | http://www.billerimpex.com/ | VG | html | 272 b | whitelisted |
4052 | malware.exe | GET | 200 | 52.222.161.89:80 | http://s.ss2.us/r.crl | US | der | 486 b | whitelisted |
4052 | malware.exe | GET | 200 | 8.241.121.254:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fa041034f11a9f30 | US | compressed | 4.70 Kb | whitelisted |
4052 | malware.exe | POST | — | 204.11.56.48:80 | http://www.billerimpex.com/uploads/tmp/dehemo.png | VG | — | — | whitelisted |
4052 | malware.exe | GET | 200 | 13.32.6.222:80 | http://crl.r2m01.amazontrust.com/r2m01.crl | US | binary | 311 Kb | suspicious |
4052 | malware.exe | POST | 301 | 15.188.254.247:80 | http://www.macartegrise.eu/data/image/hekerufuhe.jpg | FR | — | — | malicious |
4052 | malware.exe | GET | 200 | 108.156.50.196:80 | http://crl.rootca1.amazontrust.com/rootca1.crl | US | der | 651 b | whitelisted |
4052 | malware.exe | GET | — | 107.178.223.183:80 | http://www.poketeg.com/ | US | — | — | malicious |
4052 | malware.exe | POST | — | 104.155.138.21:80 | http://www.poketeg.com/news/assets/dezumo.gif | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3204 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4052 | malware.exe | 15.188.254.247:443 | www.macartegrise.eu | AMAZON-02 | FR | unknown |
4052 | malware.exe | 15.188.254.247:80 | www.macartegrise.eu | AMAZON-02 | FR | unknown |
4052 | malware.exe | 8.253.95.121:80 | ctldl.windowsupdate.com | LEVEL3 | US | suspicious |
4052 | malware.exe | 108.156.0.68:80 | o.ss2.us | AMAZON-02 | US | unknown |
4052 | malware.exe | 52.222.161.89:80 | s.ss2.us | AMAZON-02 | US | unknown |
4052 | malware.exe | 8.253.204.120:80 | ctldl.windowsupdate.com | LEVEL3 | US | suspicious |
4052 | malware.exe | 18.66.17.210:80 | ocsp.rootca1.amazontrust.com | — | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.billerimpex.com |
| whitelisted |
www.macartegrise.eu |
| malicious |
ctldl.windowsupdate.com |
| whitelisted |
o.ss2.us |
| whitelisted |
s.ss2.us |
| whitelisted |
ocsp.rootg2.amazontrust.com |
| whitelisted |
ocsp.rootca1.amazontrust.com |
| shared |
crl.rootca1.amazontrust.com |
| whitelisted |
ocsp.r2m01.amazontrust.com |
| whitelisted |
crl.r2m01.amazontrust.com |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
4052 | malware.exe | Malware Command and Control Activity Detected | ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity |
4052 | malware.exe | Malware Command and Control Activity Detected | ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity |
Process | Message |
|---|---|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
|
notepad++.exe | VerifyLibrary: certificate revocation checking is disabled
|
notepad++.exe | ED255D9151912E40DF048A56288E969A8D0DAFA3
|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
|
notepad++.exe | VerifyLibrary: certificate revocation checking is disabled
|
notepad++.exe | ED255D9151912E40DF048A56288E969A8D0DAFA3
|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\plugins\Config\nppPluginList.dll
|
notepad++.exe | VerifyLibrary: certificate revocation checking is disabled
|
notepad++.exe | ED255D9151912E40DF048A56288E969A8D0DAFA3
|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
|