Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe
-
Size
316KB
-
MD5
9c52ff48234ac7d24894ea773d8a121f
-
SHA1
fd22932d3cd200282d9d6b9da604aae4c8d9cf6d
-
SHA256
d08f88d1ad0af0cb0fd7c985e7f18129a3c17fbed6b93ecd05d5a72fe9243956
-
SHA512
050868c6ab24908454f95c83f36c32b1a373de270d5889e5c3dbfa9fe2093a9de7130cc4204ee9b79769716b58c253e2a575c23f3255d4cbf519b269c3471fcb
-
SSDEEP
6144:/vExNMO1UnseVgkV0xwvfxnhLTiusLe1740/:UTM0Unsna5mut40/
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/4600-1-0x0000000000400000-0x0000000003B9F000-memory.dmp family_gandcrab behavioral2/memory/4600-2-0x00000000059C0000-0x00000000059D7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Detects Reflective DLL injection artifacts 2 IoCs
resource yara_rule behavioral2/memory/4600-1-0x0000000000400000-0x0000000003B9F000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader behavioral2/memory/4600-2-0x00000000059C0000-0x00000000059D7000-memory.dmp INDICATOR_SUSPICIOUS_ReflectiveLoader -
Detects ransomware indicator 1 IoCs
resource yara_rule behavioral2/memory/4600-2-0x00000000059C0000-0x00000000059D7000-memory.dmp SUSP_RANSOMWARE_Indicator_Jul20 -
Gandcrab Payload 2 IoCs
resource yara_rule behavioral2/memory/4600-1-0x0000000000400000-0x0000000003B9F000-memory.dmp Gandcrab behavioral2/memory/4600-2-0x00000000059C0000-0x00000000059D7000-memory.dmp Gandcrab -
Program crash 1 IoCs
pid pid_target Process procid_target 2144 4600 WerFault.exe 82 -
Suspicious use of SetWindowsHookAW 64 IoCs
pid Process 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe 4600 2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_9c52ff48234ac7d24894ea773d8a121f_mafia.exe"1⤵
- Suspicious use of SetWindowsHookAW
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 4722⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4600 -ip 46001⤵PID:228