Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 16:55

General

  • Target

    2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe

  • Size

    10.9MB

  • MD5

    3af0401cc8a4bca80045796f5d858c39

  • SHA1

    1c12c063cae8dc930190dfc4c744f6a3d098ad6c

  • SHA256

    11ca173a74a19ac2f34471358aac2c79959d16a42ae924205ba6ed7f1186e1f5

  • SHA512

    cc3f7bcc2030a03577035339b6d4c98208bfcb69c685e358d618cb7402722bc08238faec7a8073eb8a9ac204753b64501189466013c7e33efa6a9efd445a06bf

  • SSDEEP

    196608:VLbYQVG2JOguavkNqkTf9ABa/MXvd4wdbOj93pL2hDcsqjZ72Oz+Arm5g1xFPld0:9bYlQRb8HW4w4lgosWZ6OEyVW

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\join.me.exe
      "C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\join.me.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\LMIGuardianSvc.exe
        C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\LMIGuardianSvc /escort 5072 /CUSTOM JoinMe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\LMIGuardianDll.dll

    Filesize

    1.5MB

    MD5

    3d5b26f5076fbe6e5bfc12170ff9c205

    SHA1

    2f3402e0413b5d064d9f849dd912f73f6199880c

    SHA256

    442b9dc4c1ad721da400c7b0539da0d278f41a93740b6913e34b400bec9d1ff7

    SHA512

    89587a9d40a1f769b6da12dd32fee5bd09c5c93a8a95f0dcca336eb1ab1fe9e94a5895ca6afd359429fa6edf056bd5f971bd9d0b8f009be9d957ca70c2a88904

  • C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\LMIGuardianSvc.exe

    Filesize

    402KB

    MD5

    34259f50b7826e57ebd146e30ad0c587

    SHA1

    8b77ca40d195c890d1bfc2ed4b346d55f1bbf4d3

    SHA256

    8603457211df3f9e74277105db2f6ab1915b99a29b1d1ec540d1442ee50313d2

    SHA512

    c3646523e941d2e6648ea6cc5b52c55feef7bc5d142052f5647b79d92fe5f2693fae3c650a5766a7b2cd9054b2a197886dcf41051d3d8b10c1f1d3b129414524

  • C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\config.json

    Filesize

    344B

    MD5

    0ad788d7b2eb3c80578a15d4cc0c6204

    SHA1

    1435918d4a2d69c3291584439ea9e8344e6037db

    SHA256

    d8817d216de76357c69d813e0f68a7d1c10436c9c480b58fee96eeca077ec899

    SHA512

    ffabc2163e23da6bc75564566bf83ba61cf81000220dcc387b1d0919cd05ab8ab978f02512c5240bfef314509edd9ab5c1f4858dac5af48af66103244863348b

  • C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\join.me.exe

    Filesize

    24.3MB

    MD5

    7736b24ee7c26ef4159f054fa3f416c6

    SHA1

    eefafe97e7c23009a62124ce9f9f8743b7f1ffd5

    SHA256

    c69ba65f27e5289195dfb41b462ab3e1e7568d450592d7eba2d88b063ee84395

    SHA512

    58f1e61fe2eb8627690a53c4de505d2b22033fb135e5d551e29d8d9d4b01e40b54c6c893b287e9f02520f59fa0ac34a818d0e43c88baa3e13b5af90ec5256e1c