Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe
-
Size
90KB
-
MD5
ff643f927171106e82aa8033a1dd97c9
-
SHA1
ee72cf1196ac501de53a9936e3babfeced2ce76b
-
SHA256
27d0eb6a67182a0f3a752296e06f9f5bbe7787a45a0b5ed726c8b476876c1b09
-
SHA512
5c42933eb7e0c27bc7c10d35ea9578906e06eda7216326125d4089cf659a2b9a625561a62d9bdf73d8cf68e13535396d926200664acdeb1deac1adfa0e34dece
-
SSDEEP
1536:KJgIzEO/p3BjXV1bG5r4rW7r4tc+L19sWjcdx8Ka0SGCq2iW7z:ov1/G5+L1C6jGCH
Malware Config
Signatures
-
Detects executables packed with ASPack 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\awsceI.exe INDICATOR_EXE_Packed_ASPack behavioral2/memory/444-5-0x0000000000F20000-0x0000000000F29000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/444-12-0x0000000000F20000-0x0000000000F29000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\awsceI.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
awsceI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation awsceI.exe -
Executes dropped EXE 1 IoCs
Processes:
awsceI.exepid process 444 awsceI.exe -
Drops file in Program Files directory 64 IoCs
Processes:
awsceI.exedescription ioc process File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe awsceI.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe awsceI.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe awsceI.exe File opened for modification C:\Program Files\Windows Mail\wab.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe awsceI.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe awsceI.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe awsceI.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe awsceI.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe awsceI.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE awsceI.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe awsceI.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe awsceI.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe awsceI.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe awsceI.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe awsceI.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe awsceI.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe awsceI.exe File opened for modification C:\Program Files\dotnet\dotnet.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe awsceI.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe awsceI.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe awsceI.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe awsceI.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe awsceI.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe awsceI.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe awsceI.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe awsceI.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE awsceI.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe awsceI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exeawsceI.exedescription pid process target process PID 2624 wrote to memory of 444 2624 2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe awsceI.exe PID 2624 wrote to memory of 444 2624 2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe awsceI.exe PID 2624 wrote to memory of 444 2624 2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe awsceI.exe PID 444 wrote to memory of 2976 444 awsceI.exe cmd.exe PID 444 wrote to memory of 2976 444 awsceI.exe cmd.exe PID 444 wrote to memory of 2976 444 awsceI.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_ff643f927171106e82aa8033a1dd97c9_bkransomware_karagany_wapomi.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\awsceI.exeC:\Users\Admin\AppData\Local\Temp\awsceI.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3f4a48bb.bat" "3⤵PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD506c4a2217e54f9fddeef8e1384044a36
SHA1e70d51bcfd01968324c8eda01c7a7a68eec2deea
SHA25668a6424db4a21ee6f8db5af133f7bd4f5e6235f165c2e9b1bdefa06e1df9ff86
SHA5126a287557d6ba3a2732a03d2ea99b0044db2d3f2a670e94f22354c468adebf588a1abb2b86d04c3a6571101911424292b58e1d20f9a29501fba92aa13379d09b4
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e