Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2023, 19:05

General

  • Target

    7297d2946a05fed405292ec0163ee709_mafia_JC.exe

  • Size

    319KB

  • MD5

    7297d2946a05fed405292ec0163ee709

  • SHA1

    4acd6a6dd058c5d27f2f0e93c541096a671525a1

  • SHA256

    62a3ba22b1e3ff36da6edb0d1acb29ea7795f16b4346bcc4156e01f149fbc1d0

  • SHA512

    3e6634985a122d6615af68b7169b1754e35fbbfcf18308b96719e1265a3a86b5c43edeee067caefc11f409947601cbfcb9a9e7229e5dc238d2e6910c41c39899

  • SSDEEP

    3072:DLFqoITs8+GgzXKhp6vFcBNTjbL617AL6MfUL1OeV7LGyH0Bme3BdcpFbMT9O:DLFAYz7z6hp2W1L61ALCOk7LhdeROuO

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookAW 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7297d2946a05fed405292ec0163ee709_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7297d2946a05fed405292ec0163ee709_mafia_JC.exe"
    1⤵
    • Suspicious use of SetWindowsHookAW
    PID:3420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 468
      2⤵
      • Program crash
      PID:4508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3420 -ip 3420
    1⤵
      PID:2528

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3420-133-0x0000000004D20000-0x0000000004D3B000-memory.dmp

            Filesize

            108KB

          • memory/3420-134-0x0000000000400000-0x0000000004B6E000-memory.dmp

            Filesize

            71.4MB

          • memory/3420-136-0x0000000004DA0000-0x0000000004DB7000-memory.dmp

            Filesize

            92KB

          • memory/3420-140-0x0000000004D20000-0x0000000004D3B000-memory.dmp

            Filesize

            108KB