Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 12:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exe
-
Size
677KB
-
MD5
aff4a76fc3fdad06f1e674c8a0bf5ec7
-
SHA1
cad65e7f7f1a4c995e9920ea44530ad5dc94006d
-
SHA256
4f8717d6659f923d707378eb4784d1c407f7fe95db30495d308118e1c80ba175
-
SHA512
203aaeec46b6087dba336b748fbe5319d19448d20d1865c2b8d302457441640cf89211f238861360f1b4c524a87f4e6f90ac915a0c54c93d3ad53f85aa8b9995
-
SSDEEP
12288:OvXk1egeKznl5TXJR0j3p2pVUrrQuLoWTF23JVbd0UILzXSocmKdYNq6:yk1e7ozX0j52pMkuLoiSJVlIL29mhNq6
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe 2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exedescription pid process Token: SeTakeOwnershipPrivilege 2228 2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_aff4a76fc3fdad06f1e674c8a0bf5ec7_bkransomware_karagany.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2228