Analysis
-
max time kernel
66s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe
-
Size
100KB
-
MD5
f6091790caec3b3225997d6be07aa16d
-
SHA1
97726a02c7051ab68ff44e97dd061988e706a5e9
-
SHA256
1fcad26d2165a0c8d289af8ee3246ee0253d583aa3e5e877e9ee16c9ff732312
-
SHA512
4bbae8bcd64b03d26ecc4762e689daa2bd09530fab86008b31a2607f939e95b23d0c9c32f0cc551cab5d4381d14f763dadb8a40790ad7ae94dc5443b85ed529a
-
SSDEEP
1536:62RJ8zIfEMBreBSoeKcTZV5MuzcekgksWjcdKa9PGCq2iW7z/:62RcQSlNACW3LKKGCHr
Malware Config
Signatures
-
Detects executables packed with ASPack 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023bb2-3.dat INDICATOR_EXE_Packed_ASPack behavioral2/memory/4572-6-0x0000000000670000-0x0000000000679000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4572-8-0x0000000000670000-0x0000000000679000-memory.dmp INDICATOR_EXE_Packed_ASPack -
resource yara_rule behavioral2/files/0x000b000000023bb2-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation audOBm.exe -
Executes dropped EXE 1 IoCs
pid Process 4572 audOBm.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE audOBm.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe audOBm.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe audOBm.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe audOBm.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe audOBm.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe audOBm.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe audOBm.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe audOBm.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE audOBm.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe audOBm.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe audOBm.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE audOBm.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe audOBm.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe audOBm.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe audOBm.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe audOBm.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe audOBm.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe audOBm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe audOBm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe audOBm.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe audOBm.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe audOBm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2856 wrote to memory of 4572 2856 2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe 86 PID 2856 wrote to memory of 4572 2856 2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe 86 PID 2856 wrote to memory of 4572 2856 2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe 86 PID 4572 wrote to memory of 3852 4572 audOBm.exe 90 PID 4572 wrote to memory of 3852 4572 audOBm.exe 90 PID 4572 wrote to memory of 3852 4572 audOBm.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_f6091790caec3b3225997d6be07aa16d_bkransomware_karagany_wapomi.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\audOBm.exeC:\Users\Admin\AppData\Local\Temp\audOBm.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\386b6a17.bat" "3⤵PID:3852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD58911fdcb06d7991236367a87bd1a68ac
SHA1ec46eff1fe320c800cd6a68269a22917e279a214
SHA25667b5062b46ba281c4de7474bd47733fefdb26ed03bd77d8bfd7ccfc056ee9e7b
SHA5127a6406577520106edc0d1cc0899fdc07750c488c646c0069cd50b20d8116b3a2afec723cba1978466fa056afe5b4d3b1ae35e94640ba30437a5be3eb5a50c696
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e