Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
-
Size
1.3MB
-
MD5
16276f5f206c76282f2ec7d21421cdc6
-
SHA1
ff2c42dd3bd85edc75e9819b5cbae639c15a0d33
-
SHA256
322c4e27afd88938b89399442c7d75941567f6d32a3e8802da41f50a7b9f4a70
-
SHA512
2673d7e876de4faa923af3158fba538a101e473b5057f9d0101593149b599a1a34cb00d62fe2ca76f5629b959fd593ffa02307013304069d2e67d80c0f390ff0
-
SSDEEP
12288:vvXk1lXI7vgbrWVQhTCYHvRktx/aICF9flefuKaO0VQ/:Xk1e743TvRk6NwG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
alg.exepid process 880 alg.exe -
Drops file in System32 directory 4 IoCs
Processes:
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exedescription ioc process File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe File opened for modification C:\Windows\System32\alg.exe 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 664 664 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exedescription pid process Token: SeTakeOwnershipPrivilege 4920 2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_16276f5f206c76282f2ec7d21421cdc6_bkransomware_karagany.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:880
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5098eea6e59ce618e336eb24c7698da52
SHA1554410f78610eccb0db170c4459010350d93716d
SHA25609990ec61a6be6bd589f26a6166c5076e9995027104d1e0b4af74a5e65f52dde
SHA512b5d61b344d361ea8e2752d197e86e71db2c697d81851bdb2c11e6673274700da511c9f98001b33044c5dbe376d4bc5ef49f608328aba863a0e7362908584e6e4