Analysis
-
max time kernel
92s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe
-
Size
10.9MB
-
MD5
a7bf65818d46158c7b30868eefc7e491
-
SHA1
38d4a8f69bc5056d3e73f7c6763099cd02e865c3
-
SHA256
b8b7371cde124baf99f1c7fa947906ce7ce72b918a835c43eeadcf356a971c07
-
SHA512
87a6ba10a05162f515292fde7530ed052d08723ad547ea3ce1227168b32cf32d11b7ff904807b0bb019f91198260f2f025b378bdc727ef54eca4425c8adfd023
-
SSDEEP
196608:PLbYQVG2JOguavkNqkTf9ABa/MXvd4wdbOj93pL2hDcsqjZ72Oz+Arm5g1xFPld0:jbYlQRb8HW4w4lgosWZ6OEyVW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1544 join.me.exe 2432 LMIGuardianSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 LMIGuardianSvc.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 join.me.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LMIGuardianSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language join.me.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 join.me.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 join.me.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ join.me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz join.me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString join.me.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1544 join.me.exe 1544 join.me.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1544 join.me.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 1544 join.me.exe Token: SeCreateGlobalPrivilege 1544 join.me.exe Token: SeCreateGlobalPrivilege 2432 LMIGuardianSvc.exe Token: SeCreateGlobalPrivilege 2432 LMIGuardianSvc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1544 join.me.exe 1544 join.me.exe 1544 join.me.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1544 3012 2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe 86 PID 3012 wrote to memory of 1544 3012 2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe 86 PID 3012 wrote to memory of 1544 3012 2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe 86 PID 1544 wrote to memory of 2432 1544 join.me.exe 87 PID 1544 wrote to memory of 2432 1544 join.me.exe 87 PID 1544 wrote to memory of 2432 1544 join.me.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-06_a7bf65818d46158c7b30868eefc7e491_bkransomware_karagany.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\joiB100.tmp\join.me.exe"C:\Users\Admin\AppData\Local\Temp\joiB100.tmp\join.me.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\joiB100.tmp\LMIGuardianSvc.exeC:\Users\Admin\AppData\Local\Temp\joiB100.tmp\LMIGuardianSvc /escort 1544 /CUSTOM JoinMe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD53d5b26f5076fbe6e5bfc12170ff9c205
SHA12f3402e0413b5d064d9f849dd912f73f6199880c
SHA256442b9dc4c1ad721da400c7b0539da0d278f41a93740b6913e34b400bec9d1ff7
SHA51289587a9d40a1f769b6da12dd32fee5bd09c5c93a8a95f0dcca336eb1ab1fe9e94a5895ca6afd359429fa6edf056bd5f971bd9d0b8f009be9d957ca70c2a88904
-
Filesize
402KB
MD534259f50b7826e57ebd146e30ad0c587
SHA18b77ca40d195c890d1bfc2ed4b346d55f1bbf4d3
SHA2568603457211df3f9e74277105db2f6ab1915b99a29b1d1ec540d1442ee50313d2
SHA512c3646523e941d2e6648ea6cc5b52c55feef7bc5d142052f5647b79d92fe5f2693fae3c650a5766a7b2cd9054b2a197886dcf41051d3d8b10c1f1d3b129414524
-
Filesize
354B
MD53532fc5043716979bf0dba5a5a005fe8
SHA19eb6eb7870e498f1e23cfd67cfea22ae48405289
SHA25671f5b1791c90b2790b93a9ad13554ba3c374ba59d890b28a75fc91873f79d9cf
SHA512920e3ec1f41ea070030b14b206e15b5ef1dd4f887ede3d07ff7f11c89cb6cab5064b1ce572ba46954aff07d2f5462dbea182d203ed363355deb86a7fae7b2d35
-
Filesize
24.3MB
MD57736b24ee7c26ef4159f054fa3f416c6
SHA1eefafe97e7c23009a62124ce9f9f8743b7f1ffd5
SHA256c69ba65f27e5289195dfb41b462ab3e1e7568d450592d7eba2d88b063ee84395
SHA51258f1e61fe2eb8627690a53c4de505d2b22033fb135e5d551e29d8d9d4b01e40b54c6c893b287e9f02520f59fa0ac34a818d0e43c88baa3e13b5af90ec5256e1c
-
Filesize
1KB
MD5211ab8833831a57461f0869a41fe110e
SHA1bab83714ee873f737cba9a0bc9bf8e7fab73ce70
SHA2560cc935d4be465c7fdaff64ebd1cf7d6a57548902f8a709abace668ff08f75f74
SHA51218e3894457c62002f3def66362223d2c7ccc77810e63677fffeea3836bab70a02a31fb96a466c8efee98937e43ce7b175881e2d2995ad0176c01ac5171ad42f9