Windows
Analysis Report
2fiDcmkaZY.exe
Overview
General Information
Detection
Gandcrab
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Snort IDS alert for network traffic
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to determine the online IP of the system
Found Tor onion address
Uses nslookup.exe to query domains
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Queries information about the installed CPU (vendor, model number etc)
Drops PE files
Found evaded block containing many API calls
Contains functionality to enumerate device drivers
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
2fiDcmkaZY.exe (PID: 6752 cmdline:
"C:\Users\ user\Deskt op\2fiDcmk aZY.exe" MD5: A8AC57500DE5DADF8C4DB19959DDF2EC) nslookup.exe (PID: 6896 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6972 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6980 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7032 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7084 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7144 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7152 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5388 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6392 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 2992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 3096 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5808 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5940 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6024 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5872 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6632 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5964 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6308 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6952 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6848 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7044 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7040 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 7036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7104 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5684 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 7148 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 712 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 4556 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5844 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5888 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5976 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6564 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 5860 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 5892 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6608 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6032 cmdline:
nslookup g andcrab.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6440 cmdline:
nslookup n omoreranso m.bit dns1 .soprodns. ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) nslookup.exe (PID: 6460 cmdline:
nslookup e msisoft.bi t dns1.sop rodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC) conhost.exe (PID: 6788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
tdicrr.exe (PID: 1476 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \tdicrr.ex e" MD5: D2E112FDFFC314778285E837BC0BED47)
tdicrr.exe (PID: 5864 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \tdicrr.ex e" MD5: D2E112FDFFC314778285E837BC0BED47)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Gandcrab | Gandcrab Payload | kevoreilly |
| |
SUSP_RANSOMWARE_Indicator_Jul20 | Detects ransomware indicator | Florian Roth |
| |
JoeSecurity_Gandcrab | Yara detected Gandcrab | Joe Security | ||
Click to see the 13 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.58.8.8.860180532829500 09/01/22-00:02:50.502751 |
SID: | 2829500 |
Source Port: | 60180 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |