Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 13:55

General

  • Target

    2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe

  • Size

    10.9MB

  • MD5

    297adf8ec73d1db227132c2409876b1b

  • SHA1

    1a7bb7c5ba7f17d2db1d4e2acf64557dda8cb32c

  • SHA256

    5d68ea7454fbaab6ea3e9a4d716032b831b988daa08fd00fa740fd650729ed8c

  • SHA512

    ee1d60b33ff2e535c384f1051c25d9d77896c3e99688270e48c5c0fb017c2e40d983a2a0d8603171bc2afa65126314d3feeb41ae978db3448fce39fce9230c71

  • SSDEEP

    196608:XLbYQVG2JOguavkNqkTf9ABa/MXvd4wdbOj93pL2hDcsqjZ72Oz+Arm5g1xFPld0:7bYlQRb8HW4w4lgosWZ6OEyVW

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_297adf8ec73d1db227132c2409876b1b_bkransomware_karagany.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\join.me.exe
      "C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\join.me.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4148
      • C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\LMIGuardianSvc.exe
        C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\LMIGuardianSvc /escort 4148 /CUSTOM JoinMe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\LMIGuardianDll.dll

    Filesize

    1.5MB

    MD5

    3d5b26f5076fbe6e5bfc12170ff9c205

    SHA1

    2f3402e0413b5d064d9f849dd912f73f6199880c

    SHA256

    442b9dc4c1ad721da400c7b0539da0d278f41a93740b6913e34b400bec9d1ff7

    SHA512

    89587a9d40a1f769b6da12dd32fee5bd09c5c93a8a95f0dcca336eb1ab1fe9e94a5895ca6afd359429fa6edf056bd5f971bd9d0b8f009be9d957ca70c2a88904

  • C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\LMIGuardianSvc.exe

    Filesize

    402KB

    MD5

    34259f50b7826e57ebd146e30ad0c587

    SHA1

    8b77ca40d195c890d1bfc2ed4b346d55f1bbf4d3

    SHA256

    8603457211df3f9e74277105db2f6ab1915b99a29b1d1ec540d1442ee50313d2

    SHA512

    c3646523e941d2e6648ea6cc5b52c55feef7bc5d142052f5647b79d92fe5f2693fae3c650a5766a7b2cd9054b2a197886dcf41051d3d8b10c1f1d3b129414524

  • C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\config.json

    Filesize

    367B

    MD5

    6c7bb2a0c6eac73bd9213d27b52c45a6

    SHA1

    ccb09172de09402c3b246f1e227a75f52f98aa6c

    SHA256

    39321e35b05b95d965f6f40acda8a5eadfdc6e78d9dd20ca6663fd58212f66f1

    SHA512

    cca4767e7ae9f41c1c4c1f3022629ec793a40bfb312ccc0b647a6a954abbca9d99acea8790aa64ff1f82738d39af308897cf08b4977d6ff8177cb214222e8782

  • C:\Users\Admin\AppData\Local\Temp\joi9105.tmp\join.me.exe

    Filesize

    24.3MB

    MD5

    7736b24ee7c26ef4159f054fa3f416c6

    SHA1

    eefafe97e7c23009a62124ce9f9f8743b7f1ffd5

    SHA256

    c69ba65f27e5289195dfb41b462ab3e1e7568d450592d7eba2d88b063ee84395

    SHA512

    58f1e61fe2eb8627690a53c4de505d2b22033fb135e5d551e29d8d9d4b01e40b54c6c893b287e9f02520f59fa0ac34a818d0e43c88baa3e13b5af90ec5256e1c