Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 02:30

General

  • Target

    2024-04-11_4377c6b1e7d3ecf142efe296456a99d1_karagany_mafia.exe

  • Size

    326KB

  • MD5

    4377c6b1e7d3ecf142efe296456a99d1

  • SHA1

    eb9ff07a3038cb48f54905d735e1f8e2a3efcc57

  • SHA256

    fe983e6d193f83450e31192cee8020ca6b26061ee93bd15a56d4640cc039b995

  • SHA512

    f2c32c4dd0cde671eab6f3181cbcb3c298d68e32ede0235d3d4e67382f7fb9c0cffe50fe56969285296ced0a8463d899c35cab7e741933e7487885643c6b758f

  • SSDEEP

    3072:V+V2GtObCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8JuR:VB3USTXkLHgPitjYVmq+9

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects ransomware indicator 1 IoCs
  • Gandcrab Payload 2 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_4377c6b1e7d3ecf142efe296456a99d1_karagany_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_4377c6b1e7d3ecf142efe296456a99d1_karagany_mafia.exe"
    1⤵
      PID:4088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 472
        2⤵
        • Program crash
        PID:3612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4088 -ip 4088
      1⤵
        PID:3268

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4088-0-0x0000000000400000-0x00000000012D6000-memory.dmp

              Filesize

              14.8MB

            • memory/4088-2-0x00000000015E0000-0x00000000016E0000-memory.dmp

              Filesize

              1024KB

            • memory/4088-3-0x0000000000400000-0x00000000012D6000-memory.dmp

              Filesize

              14.8MB

            • memory/4088-4-0x0000000000400000-0x00000000012D6000-memory.dmp

              Filesize

              14.8MB

            • memory/4088-5-0x00000000015B0000-0x00000000015C7000-memory.dmp

              Filesize

              92KB