Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe
-
Size
308KB
-
MD5
47acb8211addeb2fda8851a39c338b66
-
SHA1
efbf462e72f3c6b32502dd60d36eacc95cbe2363
-
SHA256
0da378abdfee2338636cb3aa255c49f6c2410cf76fe787203ca4ec7b8a9b527e
-
SHA512
0c1c43c49c3e527f287e05de4bd64117b9114ac742c58d70158bd5f3a49956d11172b95d409605e9fac64681e9e375c9d752aa2393a7a850366b58f3bfe91491
-
SSDEEP
3072:smBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:smBrrDDX0tXT30vzHF4Go0+Fs41
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/3532-1-0x0000000000400000-0x0000000000E86000-memory.dmp family_gandcrab behavioral2/memory/3532-4-0x0000000000FA0000-0x0000000000FB6000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Detects Reflective DLL injection artifacts 2 IoCs
resource yara_rule behavioral2/memory/3532-1-0x0000000000400000-0x0000000000E86000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader behavioral2/memory/3532-4-0x0000000000FA0000-0x0000000000FB6000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader -
Detects ransomware indicator 1 IoCs
resource yara_rule behavioral2/memory/3532-4-0x0000000000FA0000-0x0000000000FB6000-memory.dmp SUSP_RANSOMWARE_Indicator_Jul20 -
Gandcrab Payload 2 IoCs
resource yara_rule behavioral2/memory/3532-1-0x0000000000400000-0x0000000000E86000-memory.dmp Gandcrab behavioral2/memory/3532-4-0x0000000000FA0000-0x0000000000FB6000-memory.dmp Gandcrab -
Program crash 1 IoCs
pid pid_target Process procid_target 1904 3532 WerFault.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe"1⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 4482⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3532 -ip 35321⤵PID:3480