Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe
Resource
win10v2004-20220812-en
General
-
Target
65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe
-
Size
2.5MB
-
MD5
055014486b569951e10ac35095ef48e0
-
SHA1
0bff9d7c8172cceb889ed34884ab150af93185be
-
SHA256
65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2
-
SHA512
64d9a3b779d81245a89c9595824d5c5ebee2fd6d8faaa85d26b32e73e979e7f240789a0c74c934327e6f61e6a7dd725667d2e591984fc16e8ab81fa36dd87bd9
-
SSDEEP
49152:B3LjsTp9UlA5961fOhs4EbxYgUEm05RDyBE+3ImGm:B7jApKAMO2qBsDyO+jG
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 884 Karpesky.exe 2824 AV.exe 3932 Karpesky.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows System = "C:\\Users\\Admin\\AppData\\Roaming\\Karpesky.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 884 set thread context of 3932 884 Karpesky.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2392 reg.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2392 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 85 PID 2044 wrote to memory of 2392 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 85 PID 2044 wrote to memory of 2392 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 85 PID 2044 wrote to memory of 884 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 87 PID 2044 wrote to memory of 884 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 87 PID 2044 wrote to memory of 884 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 87 PID 2044 wrote to memory of 2824 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 88 PID 2044 wrote to memory of 2824 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 88 PID 2044 wrote to memory of 2824 2044 65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe 88 PID 884 wrote to memory of 3932 884 Karpesky.exe 90 PID 884 wrote to memory of 3932 884 Karpesky.exe 90 PID 884 wrote to memory of 3932 884 Karpesky.exe 90 PID 884 wrote to memory of 3932 884 Karpesky.exe 90 PID 884 wrote to memory of 3932 884 Karpesky.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe"C:\Users\Admin\AppData\Local\Temp\65024be0c7a07630dfb1ab5f03569766f603d12323bc5ea4c0000b93098e25a2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows System" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Karpesky.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2392
-
-
C:\Users\Admin\AppData\Roaming\Karpesky.exe"C:\Users\Admin\AppData\Roaming\Karpesky.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\Karpesky.exe"C:\Users\Admin\AppData\Roaming\Karpesky.exe"3⤵
- Executes dropped EXE
PID:3932
-
-
-
C:\Users\Admin\AppData\Roaming\AV.exe"C:\Users\Admin\AppData\Roaming\AV.exe"2⤵
- Executes dropped EXE
PID:2824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD564144f5d463d21296625f4fa237cc99c
SHA17983cc329291012f87e2c83c20f098df87d57bb7
SHA256ff258d3d0b87a72f0a6d9feb05ec7f97628f5ded5b780494de2119ac9e7288f7
SHA512670abbedd4337a5a57800c0d56f455af7e5b9080592e9261ad4da7c7a1d0f28bdb3ff89015777d9c9c1696bd90e4ebaaf94961ca201f3905c271b5fa55e28388
-
Filesize
1.2MB
MD564144f5d463d21296625f4fa237cc99c
SHA17983cc329291012f87e2c83c20f098df87d57bb7
SHA256ff258d3d0b87a72f0a6d9feb05ec7f97628f5ded5b780494de2119ac9e7288f7
SHA512670abbedd4337a5a57800c0d56f455af7e5b9080592e9261ad4da7c7a1d0f28bdb3ff89015777d9c9c1696bd90e4ebaaf94961ca201f3905c271b5fa55e28388
-
Filesize
2.5MB
MD5da43e34d179e34bfc05551d5136b9b2c
SHA19fa24223da47452c4ceab70e5b8a4091009e45fc
SHA2562c9cdc4bff73ee0a0d0d851425276caf55995cf00fe7528fbb968a2bbdc0c20e
SHA5126f2b2a016cfd43eb54116cf9de6c47a119f1cb16bbe895be82bcb6513f12867da3470a718b6f634a7821d58c062a4a4df2fc478a3c678053e55af237adb0e2ad
-
Filesize
2.5MB
MD5da43e34d179e34bfc05551d5136b9b2c
SHA19fa24223da47452c4ceab70e5b8a4091009e45fc
SHA2562c9cdc4bff73ee0a0d0d851425276caf55995cf00fe7528fbb968a2bbdc0c20e
SHA5126f2b2a016cfd43eb54116cf9de6c47a119f1cb16bbe895be82bcb6513f12867da3470a718b6f634a7821d58c062a4a4df2fc478a3c678053e55af237adb0e2ad
-
Filesize
2.5MB
MD5da43e34d179e34bfc05551d5136b9b2c
SHA19fa24223da47452c4ceab70e5b8a4091009e45fc
SHA2562c9cdc4bff73ee0a0d0d851425276caf55995cf00fe7528fbb968a2bbdc0c20e
SHA5126f2b2a016cfd43eb54116cf9de6c47a119f1cb16bbe895be82bcb6513f12867da3470a718b6f634a7821d58c062a4a4df2fc478a3c678053e55af237adb0e2ad