Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe
-
Size
10.9MB
-
MD5
297adf8ec73d1db227132c2409876b1b
-
SHA1
1a7bb7c5ba7f17d2db1d4e2acf64557dda8cb32c
-
SHA256
5d68ea7454fbaab6ea3e9a4d716032b831b988daa08fd00fa740fd650729ed8c
-
SHA512
ee1d60b33ff2e535c384f1051c25d9d77896c3e99688270e48c5c0fb017c2e40d983a2a0d8603171bc2afa65126314d3feeb41ae978db3448fce39fce9230c71
-
SSDEEP
196608:XLbYQVG2JOguavkNqkTf9ABa/MXvd4wdbOj93pL2hDcsqjZ72Oz+Arm5g1xFPld0:7bYlQRb8HW4w4lgosWZ6OEyVW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4148 join.me.exe 2468 LMIGuardianSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 LMIGuardianSvc.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 join.me.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language join.me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LMIGuardianSvc.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 join.me.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 join.me.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ join.me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz join.me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString join.me.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4148 join.me.exe 4148 join.me.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4148 join.me.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 4148 join.me.exe Token: SeCreateGlobalPrivilege 4148 join.me.exe Token: SeCreateGlobalPrivilege 2468 LMIGuardianSvc.exe Token: SeCreateGlobalPrivilege 2468 LMIGuardianSvc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4148 join.me.exe 4148 join.me.exe 4148 join.me.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4148 3164 2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe 86 PID 3164 wrote to memory of 4148 3164 2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe 86 PID 3164 wrote to memory of 4148 3164 2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe 86 PID 4148 wrote to memory of 2468 4148 join.me.exe 87 PID 4148 wrote to memory of 2468 4148 join.me.exe 87 PID 4148 wrote to memory of 2468 4148 join.me.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\join.me.exe"C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\join.me.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\LMIGuardianSvc.exeC:\Users\Admin\AppData\Local\Temp\joi9105.tmp\LMIGuardianSvc /escort 4148 /CUSTOM JoinMe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD53d5b26f5076fbe6e5bfc12170ff9c205
SHA12f3402e0413b5d064d9f849dd912f73f6199880c
SHA256442b9dc4c1ad721da400c7b0539da0d278f41a93740b6913e34b400bec9d1ff7
SHA51289587a9d40a1f769b6da12dd32fee5bd09c5c93a8a95f0dcca336eb1ab1fe9e94a5895ca6afd359429fa6edf056bd5f971bd9d0b8f009be9d957ca70c2a88904
-
Filesize
402KB
MD534259f50b7826e57ebd146e30ad0c587
SHA18b77ca40d195c890d1bfc2ed4b346d55f1bbf4d3
SHA2568603457211df3f9e74277105db2f6ab1915b99a29b1d1ec540d1442ee50313d2
SHA512c3646523e941d2e6648ea6cc5b52c55feef7bc5d142052f5647b79d92fe5f2693fae3c650a5766a7b2cd9054b2a197886dcf41051d3d8b10c1f1d3b129414524
-
Filesize
367B
MD56c7bb2a0c6eac73bd9213d27b52c45a6
SHA1ccb09172de09402c3b246f1e227a75f52f98aa6c
SHA25639321e35b05b95d965f6f40acda8a5eadfdc6e78d9dd20ca6663fd58212f66f1
SHA512cca4767e7ae9f41c1c4c1f3022629ec793a40bfb312ccc0b647a6a954abbca9d99acea8790aa64ff1f82738d39af308897cf08b4977d6ff8177cb214222e8782
-
Filesize
24.3MB
MD57736b24ee7c26ef4159f054fa3f416c6
SHA1eefafe97e7c23009a62124ce9f9f8743b7f1ffd5
SHA256c69ba65f27e5289195dfb41b462ab3e1e7568d450592d7eba2d88b063ee84395
SHA51258f1e61fe2eb8627690a53c4de505d2b22033fb135e5d551e29d8d9d4b01e40b54c6c893b287e9f02520f59fa0ac34a818d0e43c88baa3e13b5af90ec5256e1c