Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe
-
Size
250KB
-
MD5
1f1bd29d45c5ab7b60bd03e37e3e2c01
-
SHA1
6c36fc36ba6f88dd4dc22b5801a14d61c70f44b4
-
SHA256
7da47ee5bb9211fa7e07b158c4e9a425a69cbae6bdbcb7200e09593d74d37e37
-
SHA512
5cc9b9a5e0dfb6f03bdff7828cc637443f54b16c977e8c3998573fa9fdb268a4202d2d87a92371c8ea5fb37b6eae293ae760bf17b3c6f89446a8821ceb1ce522
-
SSDEEP
3072:7HvXSC+AQalUoA/INvHc7aEBN82RSVRnoxhsI/5muYDAuBauuuuuuMuWauuuuuuw:7D+A0Z/IlbctOR4hsI
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-4177215427-74451935-3209572229-1000\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/ef2d62a9f35db12a
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (334) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\f35db6c7f35db12077.lock 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\KRAB-DECRYPT.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\J: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\M: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\R: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\T: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\Y: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\Z: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\N: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\Q: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\X: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\E: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\I: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\K: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\L: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\O: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\V: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\A: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\B: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\G: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\P: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\S: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\U: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened (read-only) \??\W: 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe -
Drops file in Program Files directory 45 IoCs
description ioc Process File created C:\Program Files (x86)\KRAB-DECRYPT.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\FindSwitch.aifc 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\FormatResume.jpg 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\GetCopy.pptm 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\InvokeDeny.m3u 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\TraceInvoke.wdp 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files\KRAB-DECRYPT.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\DisablePublish.mp2v 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\LimitPop.wvx 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\RedoPush.tif 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UseSwitch.DVR 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\f35db6c7f35db12077.lock 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\f35db6c7f35db12077.lock 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\KRAB-DECRYPT.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files\f35db6c7f35db12077.lock 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\CloseRepair.zip 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UndoShow.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UpdateGroup.ppsm 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\MergeShow.htm 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UninstallExport.dib 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UnprotectPublish.ppt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UseClose.eprtx 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\ApproveSend.mp3 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\AssertSet.htm 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\CompareFind.jtx 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\ExportSelect.raw 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\KRAB-DECRYPT.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\ResumeRevoke.odt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\SelectStop.3gp2 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\TestConfirm.xsl 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\NewRequest.wpl 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\ResumeDismount.vst 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\StepSet.m4v 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UndoSelect.htm 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\SwitchClear.au 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\UnpublishUse.WTV 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\KRAB-DECRYPT.txt 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\ResumeMerge.wmv 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\SelectUnblock.rm 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\f35db6c7f35db12077.lock 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\f35db6c7f35db12077.lock 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\FormatSearch.midi 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\InstallEdit.xla 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\LockConvert.wmf 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe File opened for modification C:\Program Files\PublishSuspend.csv 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2256 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe 2256 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2908 wmic.exe Token: SeSecurityPrivilege 2908 wmic.exe Token: SeTakeOwnershipPrivilege 2908 wmic.exe Token: SeLoadDriverPrivilege 2908 wmic.exe Token: SeSystemProfilePrivilege 2908 wmic.exe Token: SeSystemtimePrivilege 2908 wmic.exe Token: SeProfSingleProcessPrivilege 2908 wmic.exe Token: SeIncBasePriorityPrivilege 2908 wmic.exe Token: SeCreatePagefilePrivilege 2908 wmic.exe Token: SeBackupPrivilege 2908 wmic.exe Token: SeRestorePrivilege 2908 wmic.exe Token: SeShutdownPrivilege 2908 wmic.exe Token: SeDebugPrivilege 2908 wmic.exe Token: SeSystemEnvironmentPrivilege 2908 wmic.exe Token: SeRemoteShutdownPrivilege 2908 wmic.exe Token: SeUndockPrivilege 2908 wmic.exe Token: SeManageVolumePrivilege 2908 wmic.exe Token: 33 2908 wmic.exe Token: 34 2908 wmic.exe Token: 35 2908 wmic.exe Token: SeIncreaseQuotaPrivilege 2908 wmic.exe Token: SeSecurityPrivilege 2908 wmic.exe Token: SeTakeOwnershipPrivilege 2908 wmic.exe Token: SeLoadDriverPrivilege 2908 wmic.exe Token: SeSystemProfilePrivilege 2908 wmic.exe Token: SeSystemtimePrivilege 2908 wmic.exe Token: SeProfSingleProcessPrivilege 2908 wmic.exe Token: SeIncBasePriorityPrivilege 2908 wmic.exe Token: SeCreatePagefilePrivilege 2908 wmic.exe Token: SeBackupPrivilege 2908 wmic.exe Token: SeRestorePrivilege 2908 wmic.exe Token: SeShutdownPrivilege 2908 wmic.exe Token: SeDebugPrivilege 2908 wmic.exe Token: SeSystemEnvironmentPrivilege 2908 wmic.exe Token: SeRemoteShutdownPrivilege 2908 wmic.exe Token: SeUndockPrivilege 2908 wmic.exe Token: SeManageVolumePrivilege 2908 wmic.exe Token: 33 2908 wmic.exe Token: 34 2908 wmic.exe Token: 35 2908 wmic.exe Token: SeBackupPrivilege 1264 vssvc.exe Token: SeRestorePrivilege 1264 vssvc.exe Token: SeAuditPrivilege 1264 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2908 2256 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe 33 PID 2256 wrote to memory of 2908 2256 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe 33 PID 2256 wrote to memory of 2908 2256 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe 33 PID 2256 wrote to memory of 2908 2256 2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe 33 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-15_1f1bd29d45c5ab7b60bd03e37e3e2c01_karagany_mafia.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1264
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
7KB
MD593974ae396a461a524fb6563dc358af1
SHA1dcc5ffda9f4afa3ef80b27d28f44ed3f01b8f496
SHA256beffcc5b252b8417373f2da0a550c25dff4b187b0b23433b756f7188419b79fd
SHA51214d18881cceba8db4ceba4cf1ebf88cc1e0a0beceda263620c965951c4d3e44c776bf99f9cc0bddf88ed65025d7237266a9e78d9612da971c9d5f0acff8fda9f