| File name: | TempapD94.exe |
| Full analysis: | https://app.any.run/tasks/ca8a1d2c-f2fc-47be-9d17-40bb232c3b81 |
| Verdict: | Malicious activity |
| Threats: | GandCrab is probably one of the most famous Ransomware. A Ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost. |
| Analysis date: | January 22, 2019, 17:00:40 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
| MD5: | 00F3D45620137DD1E201928F2F29684B |
| SHA1: | 1B242DE8C66DFED046CFDC192735BB3C9609F7D1 |
| SHA256: | CC5B33769EB64D0AC4216884FB1F9DDF0B113B0DA6C0AEE8DD4FC0C71C2C598F |
| SSDEEP: | 3072:z98YmG41WRtMH2Qp2ibwXvFSWUa9LZTdXyg/WHCs6JzYuAhyIaU5HF+ekx:zBB832AqFSWUqLZ0SWH/numvakl+ekx |
| .exe | | | UPX compressed Win32 Executable (64.2) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.6) |
| .exe | | | Win32 Executable (generic) (10.6) |
| .exe | | | Generic Win/DOS Executable (4.7) |
| .exe | | | DOS Executable Generic (4.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2018:02:26 09:55:26+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 159744 |
| InitializedDataSize: | 28672 |
| UninitializedDataSize: | 184320 |
| EntryPoint: | 0x54cb0 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x004f |
| FileFlags: | (none) |
| FileOS: | Unknown (0x40534) |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Unknown (457A) |
| CharacterSet: | Unknown (A56B) |
| FileVersion: | 2.4.6.9 |
| InternalName: | japefeve.exe |
| LegalCopyright: | Copyright (C) 2018, terarica |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 26-Feb-2018 08:55:26 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000F8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 26-Feb-2018 08:55:26 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
UPX0 | 0x00001000 | 0x0002D000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
UPX1 | 0x0002E000 | 0x00027000 | 0x00027000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.77021 |
.rsrc | 0x00055000 | 0x00007000 | 0x00007000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.55113 |
ADVAPI32.dll |
GDI32.dll |
KERNEL32.DLL |
SHELL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2820 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3112 | "C:\Users\admin\AppData\Local\Temp\TempapD94.exe" | C:\Users\admin\AppData\Local\Temp\TempapD94.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3864 | "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete | C:\Windows\system32\wbem\wmic.exe | TempapD94.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\ex_data\data |
| Operation: | write | Name: | ext |
Value: 2E0064007A0067006D006E00760077006F0075000000 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\keys_data\data |
| Operation: | write | Name: | public |
Value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| |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\keys_data\data |
| Operation: | write | Name: | private |
Value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| |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TempapD94_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TempapD94_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TempapD94_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TempapD94_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3112) TempapD94.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TempapD94_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3112 | TempapD94.exe | C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\boot.sdi | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\Winre.wim.dzgmnvwou | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{05ed3515-06b3-48f6-8cf2-bf24b1bf0727}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\Winre.wim | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{16d74681-6bc3-4c44-97f0-8b8dfefe2355}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{38e8535f-27d0-4352-aa3a-ce4178930102}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{3cc0f82b-873a-4e59-b89f-689fbdf88af9}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\DZGMNVWOU-DECRYPT.txt | text | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\System Volume Information\SPP\OnlineMetadataCache\{5c4beaff-a038-4df7-9b35-072a18f8e3d6}_OnDiskSnapshotProp | — | |
MD5:— | SHA256:— | |||
| 3112 | TempapD94.exe | C:\$Recycle.Bin\DZGMNVWOU-DECRYPT.txt | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3112 | TempapD94.exe | GET | 301 | 138.201.162.99:80 | http://www.kakaocorp.link/ | DE | html | 162 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3112 | TempapD94.exe | 138.201.162.99:80 | www.kakaocorp.link | Hetzner Online GmbH | DE | malicious |
3112 | TempapD94.exe | 138.201.162.99:443 | www.kakaocorp.link | Hetzner Online GmbH | DE | malicious |
Domain | IP | Reputation |
|---|---|---|
www.kakaocorp.link |
| malicious |