Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe
-
Size
1.8MB
-
MD5
ef5e8840cc6c5df91b09680117683395
-
SHA1
3fb6e12778581acc3afb6953725c6c137bb59658
-
SHA256
f2c29d9968979f5ffbed0908253e7b8ae2c1e93a69c4463bd21bb9f01d2118b5
-
SHA512
581d9a58ac72e1062645c1df745a35de913a11f5f393116e944c9ec93641a4b3fd8e25b9e236006ef8279e7d2a81641533a85882f7520f4fc04e0efd0f2ccdf0
-
SSDEEP
49152:nmAdoX4s6K70P4cNuFidXCoBJneGUe6tQPKiqc:mAans4cNdNBJnes6tQPx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 lmi_rescue.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 lmi_rescue.exe 2644 lmi_rescue.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 lmi_rescue.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 lmi_rescue.exe 2644 lmi_rescue.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeCreateGlobalPrivilege 2644 lmi_rescue.exe Token: SeCreateGlobalPrivilege 2644 lmi_rescue.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 lmi_rescue.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2644 2696 2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe 87 PID 2696 wrote to memory of 2644 2696 2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe 87 PID 2696 wrote to memory of 2644 2696 2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe 87 PID 2696 wrote to memory of 2644 2696 2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe 87 PID 2696 wrote to memory of 2644 2696 2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-13_ef5e8840cc6c5df91b09680117683395_bkransomware_karagany.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR0001.tmp\lmi_rescue.exe"C:\Users\Admin\AppData\Local\LogMeIn Rescue Applet\LMIR0001.tmp\lmi_rescue.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5f7c67b42655f17eae239f3229e373958
SHA1b85b6d61395d4d32d8f471a913129f6d63ceaee7
SHA2561cd30754dab9009d2b5b13aa940c8beb67ca7d3745ea7973dc2e167ba2de65f6
SHA5128b48f93f63c52bbcfc9be86361a946e3234111920a448c379126e3c16f1ff3d0ef5e80c27261c3854af4b67f9d7b13cdb1dac3d0080186f00c610c86754679af
-
Filesize
1KB
MD581b9077540778d91e19b449ad999ff88
SHA1285c9229a395ba722a42a11f2a686e44e5afc567
SHA2564bfbf94aeb970362227ca47644d40f1e66f286a4a3f0193a9d0263fce210a48c
SHA512088f8ce8d67a85e8fda478a88b26ebbb59e2cd155f89ced1055a7cb18a1fdfc3880a00a90bfe679181aab10d8aa8f2459875295a7b5c8af4749b61c5be753bf9
-
Filesize
3.9MB
MD5441009073bb9acb840e0cf2e50bf7226
SHA1aa7424f651a1347d061e033fe384ae1babecc19c
SHA256921730a30e98d64d8a4fd7a6eaf467b0db714c62e79acdbd092ef46fb612f89b
SHA5120375e0dabbe9d9cd9f057c95e714003cc419dc7fc6c116da462fe3a6e50b5d84856894290476d0f1a6e5510661874ff3d4b9e873e8c9a7d5ec3800ad291892a8
-
Filesize
3KB
MD50b6e0b52143b23dbda26db608371a92f
SHA1d115121b4f5f0d18319b6065310b5b1161c1ca58
SHA2563137a1024676559007671d503c383b6861d2d0a0fcb3d826ae17464475b8d904
SHA512c944411fd6d28bf05e4b2d0933a3c9e39f86d72e914b162c88f0cb7691de60d084e32471c1d9c3b21a9a2b4b8ec332d050f7e97c6d5e1e9ead2ba77d5617f012
-
Filesize
829B
MD5ba44deda957e87e5f6178c956e45d761
SHA1365a2eab88a083120f361e6cd197f3895d7c3d3d
SHA256e93e93f2c99615c552f2fb31358e2075f99fbfa54a7e3afd63838d50b865d8c5
SHA5123ff65ea75ff41ccd6bdd9842163de5c32c80bef4889ed24ad62a15ea06d711578baef4fc3f5b069fab3c35fff9c43e0bc46ac8006ce53800a03f7b29195db962
-
Filesize
233KB
MD5854d190fd7b02caa1958fb343c92b402
SHA13d510716c839f2227c2436619d3cf38df9d0a2d0
SHA256187c9b071a26cafa124fdbbc67107d98af5f930990fab66f2df22f6858c2e2a1
SHA512041a4c0e895fe4d4efa6da91bf5c210e0232201b715a237d34e1c25285adaf537af3167ac7fc7c6869dfcc465e8606f37182d34c3a7c9137430431f65334a910
-
Filesize
23KB
MD5f2b8e2c273e91e3b5cc269b3d674f104
SHA1a89ae8d2a211c56d33354e93fd9c8f5ea7cef711
SHA256626af5b36588442241d8836493eae9c61f81738e4b53d9b44a67909fef5ddc08
SHA512893738a66537f864f68360ec63aa46df81287338b6059a8e9624fa21bfd9a129a3a3cc7011044478bac42681cc95372672210aaade19cc4f560731f333f4dbbb