Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 02:35

General

  • Target

    2024-02-22_78d9df50cd41569ef9a5e2deaeabca97_karagany_mafia.exe

  • Size

    308KB

  • MD5

    78d9df50cd41569ef9a5e2deaeabca97

  • SHA1

    2b70e2dc46cc696af8e25a495993d150aa1df668

  • SHA256

    1fcc71119483c8545befd6243b08d701b0cddbecc5de675cef68f325f910d4b8

  • SHA512

    eea8e02587659f2f875552f00439a6ecd7c76548e586a44a110094e71f4a5b9a464f8fcde158c06cc185f3f524d780bf08a90e8324b9d33db5da3566ae065c3d

  • SSDEEP

    6144:hzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:vDHNam62ZdKmZmuPH

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects ransomware indicator 1 IoCs
  • Gandcrab Payload 2 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_78d9df50cd41569ef9a5e2deaeabca97_karagany_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_78d9df50cd41569ef9a5e2deaeabca97_karagany_mafia.exe"
    1⤵
      PID:4440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 484
        2⤵
        • Program crash
        PID:1764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4440 -ip 4440
      1⤵
        PID:4080

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4440-1-0x000000000ABB0000-0x000000000ACB0000-memory.dmp

              Filesize

              1024KB

            • memory/4440-2-0x0000000000400000-0x0000000001400000-memory.dmp

              Filesize

              16.0MB

            • memory/4440-3-0x000000000AB90000-0x000000000ABA7000-memory.dmp

              Filesize

              92KB