Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
-
Size
1.3MB
-
MD5
16276f5f206c76282f2ec7d21421cdc6
-
SHA1
ff2c42dd3bd85edc75e9819b5cbae639c15a0d33
-
SHA256
322c4e27afd88938b89399442c7d75941567f6d32a3e8802da41f50a7b9f4a70
-
SHA512
2673d7e876de4faa923af3158fba538a101e473b5057f9d0101593149b599a1a34cb00d62fe2ca76f5629b959fd593ffa02307013304069d2e67d80c0f390ff0
-
SSDEEP
12288:vvXk1lXI7vgbrWVQhTCYHvRktx/aICF9flefuKaO0VQ/:Xk1e743TvRk6NwG
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
alg.exepid process 476 2072 alg.exe -
Drops file in System32 directory 1 IoCs
Processes:
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe -
Drops file in Windows directory 1 IoCs
Processes:
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exedescription pid process Token: SeTakeOwnershipPrivilege 1196 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2072
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56309307ceea05444666d90eb468d3757
SHA13cf6c1280c373181b108c96cd563d9af5c0f07c0
SHA2562d25e6c2abf115b4f08bd43d952e228fd9d5e61ad85d21303012bcdb3ae48f9d
SHA512f984df510861c75bc9a7793f3dfcf03f51cbfea3c0be64494c8995d5c0b63c91b3c299d97542791923e5d355a410b42fd8fd8d456730219e328f722f3ab884b1