Analysis

  • max time kernel
    136s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 20:53

General

  • Target

    NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe

  • Size

    250KB

  • MD5

    d8c9cd65d4d43699185c36637f25e04b

  • SHA1

    f76ceae11ad0a7ee1fd846ba49491add1935ab4a

  • SHA256

    89798b4824c070ccb944723fc5c162a34562b9184b02eed7aa153eea8e41ef3d

  • SHA512

    1892d9d778396a0e8f1691a25d7fa3c0e88db6b8f6dbd9fe040526f376cfa222cc0225eefd735882dffdf579867eb273e86704ce2fdebf176ba54c67122b901c

  • SSDEEP

    3072:7/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOdP:7/y20Gj0r+EBFrkvlU3RvIUDOIB

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe"
    1⤵
      PID:1232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 468
        2⤵
        • Program crash
        PID:228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1232 -ip 1232
      1⤵
        PID:2404

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1232-2-0x00000000006D0000-0x00000000007D0000-memory.dmp

              Filesize

              1024KB

            • memory/1232-3-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1232-4-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1232-5-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1232-6-0x00000000006D0000-0x00000000007D0000-memory.dmp

              Filesize

              1024KB

            • memory/1232-8-0x00000000021D0000-0x00000000021E7000-memory.dmp

              Filesize

              92KB