Analysis

  • max time kernel
    159s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 05:45

General

  • Target

    2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia.exe

  • Size

    250KB

  • MD5

    83038ce0fd442418738ea54f717d9971

  • SHA1

    5ef135c6b72aeaf798fe2574302b224eeb6f9ed6

  • SHA256

    daeae69e322553e048c1a885c144d9d1af3d15b8184ca7a12b5dcb2de04ab7cc

  • SHA512

    eec8f42ddce66ff310550b0800b3eeeb50380a7359ef654808052224185c7f99a84bed8347ca73b51900f9ab2f9406a4e46c502568bdb02b920cb1cd5e7a6024

  • SSDEEP

    6144:B+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:hOCjaklYgVIpxIhDtR

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia.exe"
    1⤵
      PID:1952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 476
        2⤵
        • Program crash
        PID:3872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1952 -ip 1952
      1⤵
        PID:1724

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1952-0-0x00000000006E0000-0x00000000006FB000-memory.dmp

        Filesize

        108KB

      • memory/1952-1-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/1952-2-0x00000000006E0000-0x00000000006FB000-memory.dmp

        Filesize

        108KB

      • memory/1952-3-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/1952-4-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/1952-5-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/1952-7-0x00000000020B0000-0x00000000020C7000-memory.dmp

        Filesize

        92KB

      • memory/1952-9-0x00000000006E0000-0x00000000006FB000-memory.dmp

        Filesize

        108KB