Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exe
Resource
win7-20240221-en
General
-
Target
2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exe
-
Size
677KB
-
MD5
cfefb97ddc161f242b4be0e0bfa8fa3d
-
SHA1
4f23edf479475a5ba2f42be0199036035e0c2c05
-
SHA256
9d4811daf5f0d9635ffe23e14e959aa5fab4e9d17c477992d673590deb790a95
-
SHA512
68afdaa64afa4c8675d193553efb27c7fe74b639bc7d164c776d0dd22b1241d61ce1c0839e735b1e402058bdceb023919abf937d1ab5b8e07dd89d7b11579cec
-
SSDEEP
12288:IvXk1MXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:sk1MsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
alg.exepid process 464 2652 alg.exe -
Drops file in System32 directory 1 IoCs
Processes:
2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe 2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exedescription pid process Token: SeTakeOwnershipPrivilege 2648 2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_cfefb97ddc161f242b4be0e0bfa8fa3d_bkransomware_karagany.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\System32\alg.exeFilesize
644KB
MD552eb906720912510fb445da6db6dda0f
SHA19eb3253b2463864e789487f87129b9f8fa62e85f
SHA2567aca2658d99d3bcb3aea94515e345adcfb5172ef95a120a4737415f13d55de53
SHA5121304e99aebb62c0c0c665f2b6f74e0505a46c0ad0711207512b01ffe5811ceefaff874490d2f9a6a5feea66885a0cb54690a4cbf81ef117e0bec98029376c4e0
-
memory/2648-0-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2648-8-0x0000000000230000-0x0000000000297000-memory.dmpFilesize
412KB
-
memory/2648-1-0x0000000000230000-0x0000000000297000-memory.dmpFilesize
412KB
-
memory/2648-16-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2652-13-0x0000000100000000-0x00000001000A4000-memory.dmpFilesize
656KB
-
memory/2652-17-0x0000000100000000-0x00000001000A4000-memory.dmpFilesize
656KB