Gandcrab Ransomware v3.0.1 | VTI
Try VMRay Analyzer
VTI SCORE: 100/100
Target: win10_64 | exe
Classification: Dropper, Downloader, Ransomware

8a1e66b4834499dacc24abb27733c387733d919070fc504b14ee865678952559 (SHA256)

2018-05-22_13-47-32.exe

Windows Exe (x86-32)

Created at 2018-05-22 08:11:00

Notifications (2/3)

Due to a reputation service error, no query could be made to determine the reputation status of any contacted URL.

Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.

The operating system was rebooted during the analysis.

Severity Category Operation Classification
5/5
File System Encrypts content of user files Ransomware
  • Encrypts the content of multiple user files. This is an indicator for ransomware.
3/5
OS Modifies certificate store -
  • Adds a certificate to the local "my" crab-decrypt.txt list by file.
  • Adds a certificate to the local "my" certificate trust list by file.
2/5
Anti Analysis Tries to detect virtual machine -
  • Reads out system information, commonly used to detect VMs via registry. (Value "Identifier" in key "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0").
1/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection -
1/5
Process Creates system object -
  • Creates mutex with name "Global\pc_group=WORKGROUP&ransom_id=dce1bb8bd2ca4def".
1/5
Persistence Installs system startup script or application -
  • Adds ""C:\Users\CIiHmnxMn6Ps\AppData\Roaming\Microsoft\tlgmea.exe"" to Windows startup via registry.
1/5
Process Creates process with hidden window -
  • The process "nslookup carder.bit ns1.wowservers.ru" starts with hidden window.
  • The process "nslookup ransomware.bit ns2.wowservers.ru" starts with hidden window.
  • The process "C:\Windows\system32\wbem\wmic.exe" starts with hidden window.
1/5
Network Performs DNS request -
1/5
File System Modifies application directory -
1/5
File System Creates an unusually large number of files -
1/5
Process Overwrites code -
1/5
Network Checks external IP address -
  • Checks external IP by asking IP info service at "ipv4bot.whatismyipaddress.com/".
1/5
Network Downloads data Downloader
1/5
Network Connects to HTTP server -
1/5
PE Drops PE file Dropper
1/5
PE Executes dropped PE file -
  • Executes dropped file "c:\users\ciihmnxmn6ps\appdata\roaming\microsoft\tlgmea.exe".
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image