Analysis
-
max time kernel
18s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe
Resource
win10v2004-20231215-en
General
-
Target
20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe
-
Size
308KB
-
MD5
d0b354ab8677744c68a2e1f4f317fee0
-
SHA1
7e54300fda71e614b1a137dcc8cd7fd6b6e88242
-
SHA256
e7c8b631d08b694cee5323231b48985f56f2abe0909cb448329f1d7bf58069db
-
SHA512
b99d531ea6971fcd721f85c336461f4a9b06ccb3d58fcccce840384e2907dd40daf9d30e35d602f0a2301c88e88faaf5f45af66598dcbbbb636d58343c7c3a8e
-
SSDEEP
6144:QzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:2DHNam62ZdKmZmuPH
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/2176-2-0x0000000000400000-0x0000000001400000-memory.dmp family_gandcrab behavioral1/memory/2176-4-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab behavioral1/memory/2176-11-0x0000000000400000-0x0000000001400000-memory.dmp family_gandcrab behavioral1/memory/2176-14-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ssqcxiafxxx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\kzroam.exe\"" 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\S: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\K: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\L: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\M: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\O: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\P: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\W: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\E: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\B: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\J: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\N: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\U: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\Z: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\A: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\H: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\I: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\Q: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\R: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\V: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\X: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\Y: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe File opened (read-only) \??\G: 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2844 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 28 PID 2176 wrote to memory of 2844 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 28 PID 2176 wrote to memory of 2844 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 28 PID 2176 wrote to memory of 2844 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 28 PID 2176 wrote to memory of 2264 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 31 PID 2176 wrote to memory of 2264 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 31 PID 2176 wrote to memory of 2264 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 31 PID 2176 wrote to memory of 2264 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 31 PID 2176 wrote to memory of 2720 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 32 PID 2176 wrote to memory of 2720 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 32 PID 2176 wrote to memory of 2720 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 32 PID 2176 wrote to memory of 2720 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 32 PID 2176 wrote to memory of 2780 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 35 PID 2176 wrote to memory of 2780 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 35 PID 2176 wrote to memory of 2780 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 35 PID 2176 wrote to memory of 2780 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 35 PID 2176 wrote to memory of 2656 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 36 PID 2176 wrote to memory of 2656 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 36 PID 2176 wrote to memory of 2656 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 36 PID 2176 wrote to memory of 2656 2176 20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe"C:\Users\Admin\AppData\Local\Temp\20240106d0b354ab8677744c68a2e1f4f317fee0karaganymafia.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2264
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2720
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2780
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2656
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2500
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:472
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2868
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1648
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2332
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2080
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2072
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2296
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:3060
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:992
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2480
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1220
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1164
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1996
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1604
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2676
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2028
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2608
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2748
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2616
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1140
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1208
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2896
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2984
-