Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 13:24
Behavioral task
behavioral1
Sample
2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe
-
Size
143KB
-
MD5
392049b3c1a7684e263a5e7380b030fc
-
SHA1
27c9974a600ff489f7d2676c48aa7d71a23624fc
-
SHA256
38749eeaa4135da4db7e32426f2d6c1faa4bec81d31ba035bba97eebd56e7688
-
SHA512
281fdf34499040518d47f9beaa54aa50708e3e5b087e5c98216fd8d97006ce945d90f2afbf823db01670e8ed40b0329f131c48c7f7b8562b4db28a2debfc7197
-
SSDEEP
3072:o+HcL27CfQTntqSQRruiMZMqqDL2/AwvdF7Vjp9:hfDtORruiMyqqDL6tvdHp9
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2264 1944 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2264 1944 2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe 28 PID 1944 wrote to memory of 2264 1944 2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe 28 PID 1944 wrote to memory of 2264 1944 2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe 28 PID 1944 wrote to memory of 2264 1944 2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_392049b3c1a7684e263a5e7380b030fc_gandcrab_karagany.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 882⤵
- Program crash
PID:2264
-