Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe
-
Size
300KB
-
MD5
bcfe609eeb073d7d0d072b890581e3e0
-
SHA1
88a4ddaff03953add5dcdcc9a8436653549ed3c3
-
SHA256
e3b89d8b16ce7e12fd2adc93ad8998a423699401885aca2fed051cac7d5b3b3c
-
SHA512
541ad4fdbf6f6d8128c1d8ba71d54af3737cd5d64f844e61e23e07b3e8bef85d6dabb7e131af253c24476f078a0d3bcf28bd072d93b44f76f20d4ce19a0fc582
-
SSDEEP
6144:5vEANMO1UnseVgkV0xwvfxnhLTiusLe1740B:quM0Unsna5mut40B
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/1504-1-0x0000000000400000-0x0000000003B9B000-memory.dmp family_gandcrab behavioral2/memory/1504-2-0x00000000059B0000-0x00000000059C7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Detects Reflective DLL injection artifacts 2 IoCs
resource yara_rule behavioral2/memory/1504-1-0x0000000000400000-0x0000000003B9B000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader behavioral2/memory/1504-2-0x00000000059B0000-0x00000000059C7000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader -
Detects ransomware indicator 1 IoCs
resource yara_rule behavioral2/memory/1504-2-0x00000000059B0000-0x00000000059C7000-memory.dmp SUSP_RANSOMWARE_Indicator_Jul20 -
Gandcrab Payload 2 IoCs
resource yara_rule behavioral2/memory/1504-1-0x0000000000400000-0x0000000003B9B000-memory.dmp Gandcrab behavioral2/memory/1504-2-0x00000000059B0000-0x00000000059C7000-memory.dmp Gandcrab -
Program crash 1 IoCs
pid pid_target Process procid_target 4664 1504 WerFault.exe 86 -
Suspicious use of SetWindowsHookAW 64 IoCs
pid Process 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe 1504 2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_bcfe609eeb073d7d0d072b890581e3e0_mafia.exe"1⤵
- Suspicious use of SetWindowsHookAW
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 4922⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1504 -ip 15041⤵PID:5100