Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:18
Behavioral task
behavioral1
Sample
202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe
Resource
win10v2004-20240426-en
General
-
Target
202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe
-
Size
143KB
-
MD5
4e72a9ccd1c403f1101fd3538b4278ec
-
SHA1
3d2eab8949a107447e7064c62e63dea219bf765d
-
SHA256
9f0310c8d7c3b5b077439bc7fe8ad5ab9d35121543994aae9e1d2ea95856e62e
-
SHA512
74a97947fcdb693af1fabb18987bc647b46fa3d293f4af98e4f0a364afddfa3e88ad38a81bf380480594cba7ec40877f6d4ead6b010e0abdadc30e1f1b35cc15
-
SSDEEP
3072:o+HcL21CfjTntqSQRruiMZMqqDL2/AwvdI7Vjp9:hyDtORruiMyqqDL6tvdap9
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2112 2932 WerFault.exe 202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exedescription pid process target process PID 2932 wrote to memory of 2112 2932 202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe WerFault.exe PID 2932 wrote to memory of 2112 2932 202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe WerFault.exe PID 2932 wrote to memory of 2112 2932 202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe WerFault.exe PID 2932 wrote to memory of 2112 2932 202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe"C:\Users\Admin\AppData\Local\Temp\202405244e72a9ccd1c403f1101fd3538b4278ecbkransomwaregandcrabkaragany.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 882⤵
- Program crash
PID:2112