Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 03:26

General

  • Target

    2024-02-03_29b38c2538c23a3a1ecb9e977f6e8f6d_karagany_mafia.exe

  • Size

    250KB

  • MD5

    29b38c2538c23a3a1ecb9e977f6e8f6d

  • SHA1

    3f35ef31e687eaa77823e429eb6dfb5e1400c863

  • SHA256

    b977919c66c3bd156816b0dcd5e241e787d9d81e54210212918925c421f15b11

  • SHA512

    ed53b120a5cf46a3a53200ea4a2c035a053bc33d91e14a899d133c314fc02d264bea43589dbece740bdbb4622f9ca0b1ee1f57bbd0427c9d7421ad007b1156a7

  • SSDEEP

    3072:+/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:+/y20Gj0r+EBFrkvlU3RvIUDOIN

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects ransomware indicator 2 IoCs
  • Gandcrab Payload 2 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_29b38c2538c23a3a1ecb9e977f6e8f6d_karagany_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_29b38c2538c23a3a1ecb9e977f6e8f6d_karagany_mafia.exe"
    1⤵
      PID:4372
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 468
        2⤵
        • Program crash
        PID:1992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4372 -ip 4372
      1⤵
        PID:3132

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4372-2-0x00000000007C0000-0x00000000008C0000-memory.dmp

        Filesize

        1024KB

      • memory/4372-3-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/4372-4-0x0000000000400000-0x0000000000444000-memory.dmp

        Filesize

        272KB

      • memory/4372-5-0x00000000005D0000-0x00000000005E7000-memory.dmp

        Filesize

        92KB