Windows
Analysis Report
BUgAyPXboK.exe
Overview
General Information
Detection
Gandcrab
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Snort IDS alert for network traffic
Contains functionality to determine the online IP of the system
Found Tor onion address
Uses nslookup.exe to query domains
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Queries information about the installed CPU (vendor, model number etc)
Drops PE files
Found evaded block containing many API calls
Contains functionality to enumerate device drivers
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
BUgAyPXboK.exe (PID: 868 cmdline:
"C:\Users\ user\Deskt op\BUgAyPX boK.exe" MD5: DDE91B6947D2B726E5BB8F5852CECB76) nslookup.exe (PID: 5424 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 1576 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5276 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5356 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5360 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4876 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5796 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6128 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5224 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5572 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2912 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 1572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4228 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2464 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 3244 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 3824 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2208 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 4628 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2852 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 2608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4628 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 2688 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4908 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 1908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 3096 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 1964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 644 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 1676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5964 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 4772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4064 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2360 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 4856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5728 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5940 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
ykbxzh.exe (PID: 5500 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \ykbxzh.ex e" MD5: EE7A320AB14366D36D44CDC33B5E8238)
ykbxzh.exe (PID: 4784 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \ykbxzh.ex e" MD5: EE7A320AB14366D36D44CDC33B5E8238)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
| |
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Click to see the 13 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.68.8.8.859531532026737 08/31/22-23:45:39.973829 |
SID: | 2026737 |
Source Port: | 59531 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.854507532829500 08/31/22-23:44:51.051028 |
SID: | 2829500 |
Source Port: | 54507 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.856433532026737 08/31/22-23:45:05.669170 |
SID: | 2026737 |
Source Port: | 56433 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.859724532026737 08/31/22-23:45:37.047109 |
SID: | 2026737 |
Source Port: | 59724 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.859626532026737 08/31/22-23:45:09.130817 |
SID: | 2026737 |
Source Port: | 59626 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.860383532829500 08/31/22-23:45:54.073595 |
SID: | 2829500 |
Source Port: | 60383 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.856298532026737 08/31/22-23:44:46.383892 |
SID: | 2026737 |
Source Port: | 56298 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.864965532829500 08/31/22-23:44:45.948752 |
SID: | 2829500 |
Source Port: | 64965 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.862224532829500 08/31/22-23:44:36.753658 |
SID: | 2829500 |
Source Port: | 62224 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.861613532829500 08/31/22-23:43:46.602572 |
SID: | 2829500 |
Source Port: | 61613 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.856363532026737 08/31/22-23:44:42.471272 |
SID: | 2026737 |
Source Port: | 56363 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.856507532829500 08/31/22-23:45:51.692352 |
SID: | 2829500 |
Source Port: | 56507 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.852121532829500 08/31/22-23:45:13.843635 |
SID: | 2829500 |
Source Port: | 52121 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.863867532829500 08/31/22-23:43:31.143411 |
SID: | 2829500 |
Source Port: | 63867 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.854513532829498 08/31/22-23:44:53.235786 |
SID: | 2829498 |
Source Port: | 54513 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.854757532026737 08/31/22-23:45:14.540780 |
SID: | 2026737 |
Source Port: | 54757 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.850347532829500 08/31/22-23:44:00.906690 |
SID: | 2829500 |
Source Port: | 50347 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.860134532829500 08/31/22-23:44:29.746960 |
SID: | 2829500 |
Source Port: | 60134 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.861173532829498 08/31/22-23:45:03.206529 |
SID: | 2829498 |
Source Port: | 61173 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.852486532026737 08/31/22-23:43:48.342534 |
SID: | 2026737 |
Source Port: | 52486 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.864649532829498 08/31/22-23:44:48.847826 |
SID: | 2829498 |
Source Port: | 64649 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.864798532026737 08/31/22-23:44:59.208494 |
SID: | 2026737 |
Source Port: | 64798 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.863501532829498 08/31/22-23:45:53.807893 |
SID: | 2829498 |
Source Port: | 63501 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.850968532829498 08/31/22-23:45:24.827189 |
SID: | 2829498 |
Source Port: | 50968 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.862915532829498 08/31/22-23:43:29.888154 |
SID: | 2829498 |
Source Port: | 62915 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.863438532026737 08/31/22-23:45:30.070764 |
SID: | 2026737 |
Source Port: | 63438 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |