Windows
Analysis Report
eW1QrimJYd.exe
Overview
General Information
Detection
Gandcrab
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Snort IDS alert for network traffic
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to determine the online IP of the system
Found Tor onion address
Uses nslookup.exe to query domains
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Queries information about the installed CPU (vendor, model number etc)
Drops PE files
Found evaded block containing many API calls
Contains functionality to enumerate device drivers
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
eW1QrimJYd.exe (PID: 4500 cmdline:
"C:\Users\ user\Deskt op\eW1Qrim JYd.exe" MD5: B7325E075262FFDEAA68CAE94018CADB) nslookup.exe (PID: 5720 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5276 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5916 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5400 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5732 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4788 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 3572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5276 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5380 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6148 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6168 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6220 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6316 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6372 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6380 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6528 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6540 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6632 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6640 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6720 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6808 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6920 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6932 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7028 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7100 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7156 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6164 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6156 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6288 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2852 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 1432 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 2408 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6448 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6392 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6428 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
qvvfpl.exe (PID: 3252 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \qvvfpl.ex e" MD5: E5E0C9F951E9947AEA55720B7D0299F2)
qvvfpl.exe (PID: 68 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \qvvfpl.ex e" MD5: E5E0C9F951E9947AEA55720B7D0299F2)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
| |
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Click to see the 13 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.68.8.8.860695532026737 08/31/22-23:49:57.078873 |
SID: | 2026737 |
Source Port: | 60695 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.864649532026737 08/31/22-23:50:23.329807 |
SID: | 2026737 |
Source Port: | 64649 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.850255532829498 08/31/22-23:50:34.185397 |
SID: | 2829498 |
Source Port: | 50255 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.862039532829498 08/31/22-23:50:37.987567 |
SID: | 2829498 |
Source Port: | 62039 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.857518532829498 08/31/22-23:49:46.207614 |
SID: | 2829498 |
Source Port: | 57518 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.849468532026737 08/31/22-23:50:44.319184 |
SID: | 2026737 |
Source Port: | 49468 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.856571532829500 08/31/22-23:49:21.389711 |
SID: | 2829500 |
Source Port: | 56571 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.863674532829500 08/31/22-23:50:38.481064 |
SID: | 2829500 |
Source Port: | 63674 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.861613532829500 08/31/22-23:49:00.911463 |
SID: | 2829500 |
Source Port: | 61613 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.854197532829500 08/31/22-23:50:08.085752 |
SID: | 2829500 |
Source Port: | 54197 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.861175532026737 08/31/22-23:50:41.147699 |
SID: | 2026737 |
Source Port: | 61175 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.68.8.8.851324532829500 08/31/22-23:49:50.142801 |
SID: | 2829500 |
Source Port: | 51324 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |