Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:06
Behavioral task
behavioral1
Sample
202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe
Resource
win10v2004-20240226-en
General
-
Target
202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe
-
Size
139KB
-
MD5
0d878ccc1cb769843567c500cda485f9
-
SHA1
3cf9794440100aed4664b2a757b9a5e6b9a931cc
-
SHA256
1b01f74efe1897061c76801b9f628b7cabd7ddd820451fa0927444dc85dc8e38
-
SHA512
de73fa0994af09615e4ff1a77fdc1f0444f1a6f1151c2de2023cca50c8e88a2ae7f14d6a37a9f5ccd32800ab5bb93bf5928f4fd4f80629c62a0b1e49ce52907c
-
SSDEEP
3072:IRDukUiI1qQHJVT9NwoPsaMqqDL2/Ogvdu8:IRDfgtVwoPsJqqDL6Pvdu8
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2136 2972 WerFault.exe 202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exedescription pid process target process PID 2972 wrote to memory of 2136 2972 202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe WerFault.exe PID 2972 wrote to memory of 2136 2972 202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe WerFault.exe PID 2972 wrote to memory of 2136 2972 202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe WerFault.exe PID 2972 wrote to memory of 2136 2972 202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe"C:\Users\Admin\AppData\Local\Temp\202405240d878ccc1cb769843567c500cda485f9bkransomwaregandcrabkaragany.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 362⤵
- Program crash
PID:2136