Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 17:28

General

  • Target

    2024-04-15_1f3614e3ff9464c0c3eb209be0b6c511_mafia.exe

  • Size

    316KB

  • MD5

    1f3614e3ff9464c0c3eb209be0b6c511

  • SHA1

    18c38c6722920f46f4b49b744e72b304efa60daa

  • SHA256

    e86ac51c0985111b602e4879467eb485a558cee0d713177a3f1580801150d950

  • SHA512

    5bdb03a79ca1212983c2d10705c3fd64e6f9609814c5ae7121fb9c479d1326dd3ad5e58e48bb4b378e04bfc58ed8932cabe53ec548fdacd3012f58221ed3c078

  • SSDEEP

    6144:VvEANMO1UnseVgkV0xwvfxnhLTiusLe1740w:2uM0Unsna5mut40w

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects ransomware indicator 1 IoCs
  • Gandcrab Payload 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookAW 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_1f3614e3ff9464c0c3eb209be0b6c511_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_1f3614e3ff9464c0c3eb209be0b6c511_mafia.exe"
    1⤵
    • Suspicious use of SetWindowsHookAW
    PID:4760
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 480
      2⤵
      • Program crash
      PID:952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4760 -ip 4760
    1⤵
      PID:1816

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4760-0-0x00000000058E0000-0x00000000058FB000-memory.dmp

            Filesize

            108KB

          • memory/4760-1-0x0000000000400000-0x0000000003B9F000-memory.dmp

            Filesize

            55.6MB

          • memory/4760-2-0x0000000005920000-0x0000000005937000-memory.dmp

            Filesize

            92KB

          • memory/4760-6-0x00000000058E0000-0x00000000058FB000-memory.dmp

            Filesize

            108KB