Home Cyber Security News New KAWA4096 Ransomware Variant Exploits Windows Management Instrumentation for Data Wipe

New KAWA4096 Ransomware Variant Exploits Windows Management Instrumentation for Data Wipe

0

Ransomware activity has shown no signs of abating in 2025, as threat intelligence experts at SpiderLabs uncover an aggressive newcomer: KAWA4096.

Emerging in June, this advanced ransomware has quickly claimed at least 11 known victims, primarily targeting organizations in the United States and Japan.

Heat maps and attack telemetry compiled by SpiderLabs confirm these regions as epicenters, with several attacks remaining undisclosed on public leak sites, illustrating the group’s opaque operations and potentially growing victim count.

Sophisticated Multi-Threaded Attacks

KAWA4096 stands out for its technical capabilities and focus on maximizing disruption.

The ransomware leverages modern techniques, such as exploiting Windows Management Instrumentation (WMI) for the deletion of shadow copies a core step in ensuring victims cannot easily recover their encrypted files.

This is achieved by executing commands like vssadmin.exe Delete Shadows /all /quiet and wmic shadowcopy delete /nointeractive, effectively wiping backup snapshots from infected systems.

Furthermore, KAWA4096 employs a configuration-driven model, loading its behavioral parameters within the binary using the LoadResource API.

The ransomware configuration of KAWA4096.

This config governs files, directories, and services to exclude or focus on, tailoring the attack for each execution.

The ransomware demonstrates an advanced emphasis on persistence and concurrency. It spawns a mutex (“SAY_HI_2025”) to prevent multiple instances from running, then creates up to 10 threads for simultaneous file encryption using semaphores to synchronize these threads.

This parallel processing accelerates the encryption process while maintaining system stability, and ensures that shared network drives are included, broadening the ransomware’s impact. Notably, KAWA4096 takes substantial measures to avoid detection and interference.

Its configuration-driven lists of processes and services targeted for termination encompass antivirus programs, backup solutions (like Veeam and Acronis), SQL services, and SAP systems.

Termination of services.

Through constant monitoring, the ransomware’s dedicated thread seeks and terminates processes that could obstruct or remediate its operation, even including endpoints like TeamViewer and QuickBooks.

Technique Overlap with Qilin and Akira

In terms of file targeting, KAWA4096 skips the encryption of specific extensions (such as .exe, .dll, .sys, etc.) and system-critical folders or files, ensuring the infected environment remains operational enough to receive the ransom note, but not to recover data.

Partial encryption and the ability to change the victim’s desktop wallpaper further highlight its sophisticated approach.

Mimicry is also evident in KAWA4096’s social engineering; the ransom note closely replicates Qilin’s format, while its data leak site design is nearly indistinguishable from Akira’s down to the green-on-black terminal styling.

These deliberate choices may aim to reinforce credibility or sow confusion among investigators and victims alike.

No clear evidence yet links KAWA4096 to pre-existing ransomware groups, but the observable overlaps in techniques and presentation suggest at least a high degree of technical familiarity with established threat actors.

Organizations are urged to monitor for the distinct behaviors identified in this analysis and employ robust endpoint protection, backup strategies, and proactive threat hunting services.

According to the Report, Trustwave’s detection suite and SpiderLabs services now include rules for identifying the hallmark evasion and impact techniques associated with KAWA4096.

In-depth threat hunting and rapid response capabilities become ever more indispensable as ransomware families multiply and adapt.

Indicators of Compromise (IOC)

NameTypeSHA-1SHA-256MD5
C3CE46D40.exeWin64 EXEbd30c87774c083a1003c0b9fb0a922b702302272f3a6d4ccdd0f663269c3909e74d6847608b8632fb2814b0436a4532b8281e617c3ce46d40b2893e30bf00fce72c2e1fa
kawa.exeWin64 EXEb8c32444ceef027fb65d9cf1c823ad3c9c59aceafadfef5caf6aede2a3a02a856b965ed40ee189612fa6fde81a30d5ed5ee6ae7d64756bf452baa4da411e3a835c08d884

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version