Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_d4126745c9cac331f795948ad3059dcf_bkransomware_karagany.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_d4126745c9cac331f795948ad3059dcf_bkransomware_karagany.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-11_d4126745c9cac331f795948ad3059dcf_bkransomware_karagany
-
Size
88KB
-
MD5
d4126745c9cac331f795948ad3059dcf
-
SHA1
593d860269b207225ebb2127f87c943048844e96
-
SHA256
39645cfe18bef434489e12711006cdafbcb5b184ee8d2d67c4f21a1a94373b3b
-
SHA512
d788240288c47fe0dadd1eeebf6c992f02d21028de87c7105aeb82304430b37f6f0c4ef64db92ee77904c4feb52fe6e740ce471b76b65fb5885ee2e3d66620de
-
SSDEEP
1536:BRCFbyKinflyHGTCfcsA3Lbxc8ImC2VsWjcdL24mLPIsrUB:HKaymW61ImfaL24mjIkUB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-11_d4126745c9cac331f795948ad3059dcf_bkransomware_karagany
Files
-
2024-06-11_d4126745c9cac331f795948ad3059dcf_bkransomware_karagany.exe windows:5 windows x86 arch:x86
7706e6495fb9c3103706f97c8a70bdb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
pdh
PdhGetFormattedCounterValue
PdhCloseQuery
PdhCollectQueryData
kernel32
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
GetStringTypeW
HeapReAlloc
HeapAlloc
OutputDebugStringW
RtlUnwind
LoadLibraryExW
GetCPInfo
GetACP
IsValidCodePage
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemDirectoryA
LoadLibraryA
lstrcatA
GetVersionExW
GetModuleFileNameW
LoadLibraryW
lstrcpyW
GetTickCount
FreeLibrary
GetProcAddress
SetFilePointerEx
WriteConsoleW
CloseHandle
GetOEMCP
CreateFileW
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineA
IsProcessorFeaturePresent
IsDebuggerPresent
GetLastError
SetLastError
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
GetSystemTimeAsFileTime
user32
SystemParametersInfoW
DrawIconEx
LoadImageA
LoadIconA
FindWindowA
SetWindowLongW
PtInRect
GetSysColor
GetCursorPos
MessageBeep
MessageBoxW
GetWindowRect
GetClientRect
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
DrawTextW
TrackPopupMenu
AppendMenuW
DestroyMenu
CreatePopupMenu
KillTimer
SetTimer
IsWindowVisible
SetWindowPos
SetLayeredWindowAttributes
DestroyWindow
CreateWindowExW
PostQuitMessage
DefWindowProcW
PostMessageW
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
wsprintfW
gdi32
ExtTextOutA
SetTextColor
SetBkColor
SelectObject
GetTextExtentPoint32W
GetStockObject
GetDeviceCaps
DeleteObject
CreateFontIndirectW
advapi32
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
shell32
Shell_NotifyIconW
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ