Resubmissions

24/03/2024, 05:19

240324-fz7vqsaa32 10

24/03/2024, 04:32

240324-e6f5xscd8v 10

Analysis

  • max time kernel
    135s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2024, 04:32

General

  • Target

    2024-03-24_f36110e6adee9d68a0a567e3c16a1e46_karagany_mafia.exe

  • Size

    250KB

  • MD5

    f36110e6adee9d68a0a567e3c16a1e46

  • SHA1

    cbfe948c3dffaaf8b16de9263d039d5e87099a3a

  • SHA256

    ef73aa177b5e78e43c001b8ea8f21e392ca23d49d6d203d81057a9d0b86de8b5

  • SHA512

    9938788c4cfaa61aa1386755cd335d09ad665fbd3238a8d3182a479907655726bfabadbeef847ea320595cda2bee837fa20bac03d665102256ad72144374359d

  • SSDEEP

    3072:Y/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:Y/y20Gj0r+EBFrkvlU3RvIUDOIN

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects ransomware indicator 2 IoCs
  • Gandcrab Payload 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-24_f36110e6adee9d68a0a567e3c16a1e46_karagany_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-24_f36110e6adee9d68a0a567e3c16a1e46_karagany_mafia.exe"
    1⤵
      PID:2876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 448
        2⤵
        • Program crash
        PID:2592
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2876 -ip 2876
      1⤵
        PID:4420
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:3836
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2344

        Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2344-47-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-73-0x000001F9AAD20000-0x000001F9AAD21000-memory.dmp

                Filesize

                4KB

              • memory/2344-77-0x000001F9AAE40000-0x000001F9AAE41000-memory.dmp

                Filesize

                4KB

              • memory/2344-76-0x000001F9AAD30000-0x000001F9AAD31000-memory.dmp

                Filesize

                4KB

              • memory/2344-9-0x000001F9A28B0000-0x000001F9A28C0000-memory.dmp

                Filesize

                64KB

              • memory/2344-25-0x000001F9A29B0000-0x000001F9A29C0000-memory.dmp

                Filesize

                64KB

              • memory/2344-41-0x000001F9AAFA0000-0x000001F9AAFA1000-memory.dmp

                Filesize

                4KB

              • memory/2344-42-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-43-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-44-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-45-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-46-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-75-0x000001F9AAD30000-0x000001F9AAD31000-memory.dmp

                Filesize

                4KB

              • memory/2344-48-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-53-0x000001F9AABE0000-0x000001F9AABE1000-memory.dmp

                Filesize

                4KB

              • memory/2344-50-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-51-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-52-0x000001F9AABF0000-0x000001F9AABF1000-memory.dmp

                Filesize

                4KB

              • memory/2344-49-0x000001F9AAFD0000-0x000001F9AAFD1000-memory.dmp

                Filesize

                4KB

              • memory/2344-55-0x000001F9AABF0000-0x000001F9AABF1000-memory.dmp

                Filesize

                4KB

              • memory/2344-58-0x000001F9AABE0000-0x000001F9AABE1000-memory.dmp

                Filesize

                4KB

              • memory/2344-61-0x000001F9AAB20000-0x000001F9AAB21000-memory.dmp

                Filesize

                4KB

              • memory/2876-2-0x0000000000640000-0x0000000000740000-memory.dmp

                Filesize

                1024KB

              • memory/2876-3-0x0000000000400000-0x0000000000444000-memory.dmp

                Filesize

                272KB

              • memory/2876-5-0x0000000000620000-0x0000000000637000-memory.dmp

                Filesize

                92KB

              • memory/2876-4-0x0000000000400000-0x0000000000444000-memory.dmp

                Filesize

                272KB