Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_519e629cbff98b50738ad125e216e543_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-21_519e629cbff98b50738ad125e216e543_karagany_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-21_519e629cbff98b50738ad125e216e543_karagany_mafia.exe
-
Size
308KB
-
MD5
519e629cbff98b50738ad125e216e543
-
SHA1
7521f0bfb09bbc26f7c03827f1dc2004f106d076
-
SHA256
a2a1b3b73f1cb6d8fe3a67c4adad6c785fe1a9ffb37c26d96dad93479a2dff58
-
SHA512
2f6a301d9e6c70b352f28e05a1210a509dbdf300e3cd7e03bc0230bb2a9c18458264a479dd88f699e55e12126a75e1da1afecdfa36faa960eb4c008a8ef786bc
-
SSDEEP
6144:OzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:MDHNam62ZdKmZmuPH
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/2248-2-0x0000000000400000-0x0000000001400000-memory.dmp family_gandcrab behavioral2/memory/2248-3-0x000000000C760000-0x000000000C777000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Detects Reflective DLL injection artifacts 2 IoCs
resource yara_rule behavioral2/memory/2248-2-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader behavioral2/memory/2248-3-0x000000000C760000-0x000000000C777000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader -
Detects ransomware indicator 1 IoCs
resource yara_rule behavioral2/memory/2248-3-0x000000000C760000-0x000000000C777000-memory.dmp SUSP_RANSOMWARE_Indicator_Jul20 -
Gandcrab Payload 2 IoCs
resource yara_rule behavioral2/memory/2248-2-0x0000000000400000-0x0000000001400000-memory.dmp Gandcrab behavioral2/memory/2248-3-0x000000000C760000-0x000000000C777000-memory.dmp Gandcrab -
Program crash 1 IoCs
pid pid_target Process procid_target 924 2248 WerFault.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_519e629cbff98b50738ad125e216e543_karagany_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_519e629cbff98b50738ad125e216e543_karagany_mafia.exe"1⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 4762⤵
- Program crash
PID:924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2248 -ip 22481⤵PID:3056