Analysis

  • max time kernel
    91s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2024 15:37

General

  • Target

    2024-03-31_7715d65af53705e4f8314b6e653448e4_karagany_mafia.exe

  • Size

    308KB

  • MD5

    7715d65af53705e4f8314b6e653448e4

  • SHA1

    db923a422c3295c6f594035590fda3c70857383c

  • SHA256

    74d15999a90f6b33bd8db3b37f318ce6986ce1d8e89a1002cb3f5374c5ebb659

  • SHA512

    3f656bc2d97762147471eda3e2e7a533724ef56e05a772e288809c7512c71ee18d2066c4b342278eb4238faa727f37a8ad6fe5a008dc1c2b81a958285e1739c0

  • SSDEEP

    6144:SZ5fh1s4mex2OO8bAiZ0YDChe8UN5alW6jx+J:C5frs4f2OOm/Ao8UNglGJ

Malware Config

Signatures

  • GandCrab payload 3 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 3 IoCs
  • Detects ransomware indicator 1 IoCs
  • Gandcrab Payload 3 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-31_7715d65af53705e4f8314b6e653448e4_karagany_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-31_7715d65af53705e4f8314b6e653448e4_karagany_mafia.exe"
    1⤵
      PID:1752
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 344
        2⤵
        • Program crash
        PID:808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1752 -ip 1752
      1⤵
        PID:244

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1752-0-0x0000000000400000-0x0000000000C3E000-memory.dmp
        Filesize

        8.2MB

      • memory/1752-2-0x0000000000400000-0x0000000000C3E000-memory.dmp
        Filesize

        8.2MB

      • memory/1752-3-0x0000000000E70000-0x0000000000F70000-memory.dmp
        Filesize

        1024KB

      • memory/1752-4-0x0000000000C60000-0x0000000000C76000-memory.dmp
        Filesize

        88KB

      • memory/1752-7-0x0000000000400000-0x0000000000C3E000-memory.dmp
        Filesize

        8.2MB