Analysis
-
max time kernel
108s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 20:51
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe
Resource
win7-20240903-en
General
-
Target
2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe
-
Size
117KB
-
MD5
f87353370bad1dffce4a957381b5e457
-
SHA1
b23121db02e99d83648ade87d081715f6d98f86e
-
SHA256
9c0dade5b83b03cb769e523b89e66c7b2cd192afe014be0b8cc4ca024185e71a
-
SHA512
9c0d8a05e7a488866c58575069b19e5f7cd69803eaf3062ccdf1f3d25a9d57b0d904ec4c8617aefc962f3e6fa369e6d930fd093cbe37ad7ace1c930cd60f6c77
-
SSDEEP
1536:IdSLQcdYvt3eBHFSpTAvNwUbuEpovMc8LPDznsWjcdTgD17gl:kSjup4NRbuEpoyLP3IUD17U
Malware Config
Signatures
-
Emotet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmoSorting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmoSorting.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3976 SmoSorting.exe 3976 SmoSorting.exe 3976 SmoSorting.exe 3976 SmoSorting.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2616 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2616 wrote to memory of 376 2616 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 83 PID 2616 wrote to memory of 376 2616 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 83 PID 2616 wrote to memory of 376 2616 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 83 PID 376 wrote to memory of 3976 376 SmoSorting.exe 84 PID 376 wrote to memory of 3976 376 SmoSorting.exe 84 PID 376 wrote to memory of 3976 376 SmoSorting.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\SmoSorting.exe"C:\Windows\SysWOW64\SmoSorting.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\SmoSorting.exe"C:\Windows\SysWOW64\SmoSorting.exe" -e57903a3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-