Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe
-
Size
1.3MB
-
MD5
434a4cc9106457e7eafd9a307135a759
-
SHA1
7e525cc26989f28c96ac51fca55af73398597a64
-
SHA256
4ef5d04aaea19f6494739a25412de41697f3b2418972cb3f9b64f96bd422216f
-
SHA512
80650c5448ac310403f36c5ad4705949c440ea8f37cf1e256588072f28a919d20834770b600818ff15d77db98986565094a1afc8a41686e97a96070d2ad74f6d
-
SSDEEP
12288:PvXk1gK3aAXOILyiYkqMk7+KzubUtYJPfaNiBGwLFzKGMaoQWHMI+XG9:3k1RThXbqT+KzWEKS0nFz1MaoCG9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 480 Process not Found 2932 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1984 2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_434a4cc9106457e7eafd9a307135a759_bkransomware_karagany.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2932
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b9caaccdd374fa34fd7237457e64100f
SHA147cb7e73ad4154c3a6c4ba23a848baf3c3794f57
SHA256681fc5c5b3ff513a71eb8d00aaa5a38361e0738975638da609756e355fb5d2d5
SHA51277ef7eda923ccf729f4040c1c3a5e91716e5f7ce408453adde3c5f26d2d1093c589e44caa636f7c39381dcb06612de4823879567708e6069e5d2baec878877bc