Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe
-
Size
10.9MB
-
MD5
3af0401cc8a4bca80045796f5d858c39
-
SHA1
1c12c063cae8dc930190dfc4c744f6a3d098ad6c
-
SHA256
11ca173a74a19ac2f34471358aac2c79959d16a42ae924205ba6ed7f1186e1f5
-
SHA512
cc3f7bcc2030a03577035339b6d4c98208bfcb69c685e358d618cb7402722bc08238faec7a8073eb8a9ac204753b64501189466013c7e33efa6a9efd445a06bf
-
SSDEEP
196608:VLbYQVG2JOguavkNqkTf9ABa/MXvd4wdbOj93pL2hDcsqjZ72Oz+Arm5g1xFPld0:9bYlQRb8HW4w4lgosWZ6OEyVW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5072 join.me.exe 368 LMIGuardianSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 368 LMIGuardianSvc.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 join.me.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language join.me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LMIGuardianSvc.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString join.me.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 join.me.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 join.me.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ join.me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz join.me.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5072 join.me.exe 5072 join.me.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5072 join.me.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 5072 join.me.exe Token: SeCreateGlobalPrivilege 5072 join.me.exe Token: SeCreateGlobalPrivilege 368 LMIGuardianSvc.exe Token: SeCreateGlobalPrivilege 368 LMIGuardianSvc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5072 join.me.exe 5072 join.me.exe 5072 join.me.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 804 wrote to memory of 5072 804 2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe 86 PID 804 wrote to memory of 5072 804 2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe 86 PID 804 wrote to memory of 5072 804 2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe 86 PID 5072 wrote to memory of 368 5072 join.me.exe 87 PID 5072 wrote to memory of 368 5072 join.me.exe 87 PID 5072 wrote to memory of 368 5072 join.me.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_3af0401cc8a4bca80045796f5d858c39_bkransomware_karagany.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\join.me.exe"C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\join.me.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\joi802C.tmp\LMIGuardianSvc.exeC:\Users\Admin\AppData\Local\Temp\joi802C.tmp\LMIGuardianSvc /escort 5072 /CUSTOM JoinMe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD53d5b26f5076fbe6e5bfc12170ff9c205
SHA12f3402e0413b5d064d9f849dd912f73f6199880c
SHA256442b9dc4c1ad721da400c7b0539da0d278f41a93740b6913e34b400bec9d1ff7
SHA51289587a9d40a1f769b6da12dd32fee5bd09c5c93a8a95f0dcca336eb1ab1fe9e94a5895ca6afd359429fa6edf056bd5f971bd9d0b8f009be9d957ca70c2a88904
-
Filesize
402KB
MD534259f50b7826e57ebd146e30ad0c587
SHA18b77ca40d195c890d1bfc2ed4b346d55f1bbf4d3
SHA2568603457211df3f9e74277105db2f6ab1915b99a29b1d1ec540d1442ee50313d2
SHA512c3646523e941d2e6648ea6cc5b52c55feef7bc5d142052f5647b79d92fe5f2693fae3c650a5766a7b2cd9054b2a197886dcf41051d3d8b10c1f1d3b129414524
-
Filesize
344B
MD50ad788d7b2eb3c80578a15d4cc0c6204
SHA11435918d4a2d69c3291584439ea9e8344e6037db
SHA256d8817d216de76357c69d813e0f68a7d1c10436c9c480b58fee96eeca077ec899
SHA512ffabc2163e23da6bc75564566bf83ba61cf81000220dcc387b1d0919cd05ab8ab978f02512c5240bfef314509edd9ab5c1f4858dac5af48af66103244863348b
-
Filesize
24.3MB
MD57736b24ee7c26ef4159f054fa3f416c6
SHA1eefafe97e7c23009a62124ce9f9f8743b7f1ffd5
SHA256c69ba65f27e5289195dfb41b462ab3e1e7568d450592d7eba2d88b063ee84395
SHA51258f1e61fe2eb8627690a53c4de505d2b22033fb135e5d551e29d8d9d4b01e40b54c6c893b287e9f02520f59fa0ac34a818d0e43c88baa3e13b5af90ec5256e1c