Analysis
-
max time kernel
217s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe
Resource
win10v2004-20221111-en
General
-
Target
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe
-
Size
189KB
-
MD5
f1ebb4dbdfc6ec7a53bcefabdc7fb6de
-
SHA1
b76bc50249e7420ac0f4f64e83d1a58da2068eaa
-
SHA256
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
-
SHA512
8608689d716fe8ed44348b4382cf4aed67de6dd4a9da2d92a8fcbd731ccf1a7f42e60ce35376ccef81b67414f2f8ea8bbcd3b2054d78f344ad92d1f4f29ca788
-
SSDEEP
3072:t3blGV9hulKmhbfvjv69vF6nHynNPFW7Lifa81Hh7Gl8emNiq8q/f+2L:t3bq9UlKgPuEyNFWSb1Hg6l8q/ffL
Malware Config
Extracted
\??\Z:\WE CAN RECOVER YOUR DATA.txt
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE 1 IoCs
Processes:
bevjxskb.exepid Process 620 bevjxskb.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
bevjxskb.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\SubmitDisconnect.tiff bevjxskb.exe File opened for modification C:\Users\Admin\Pictures\DisableLock.tiff bevjxskb.exe -
Loads dropped DLL 2 IoCs
Processes:
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exepid Process 1340 bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe 1340 bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
bevjxskb.exedescription ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-4063495947-34355257-727531523-1000\desktop.ini bevjxskb.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
bevjxskb.exedescription ioc Process File opened (read-only) \??\H: bevjxskb.exe File opened (read-only) \??\X: bevjxskb.exe File opened (read-only) \??\A: bevjxskb.exe File opened (read-only) \??\T: bevjxskb.exe File opened (read-only) \??\V: bevjxskb.exe File opened (read-only) \??\E: bevjxskb.exe File opened (read-only) \??\F: bevjxskb.exe File opened (read-only) \??\G: bevjxskb.exe File opened (read-only) \??\Q: bevjxskb.exe File opened (read-only) \??\R: bevjxskb.exe File opened (read-only) \??\S: bevjxskb.exe File opened (read-only) \??\Y: bevjxskb.exe File opened (read-only) \??\K: bevjxskb.exe File opened (read-only) \??\L: bevjxskb.exe File opened (read-only) \??\N: bevjxskb.exe File opened (read-only) \??\W: bevjxskb.exe File opened (read-only) \??\Z: bevjxskb.exe File opened (read-only) \??\B: bevjxskb.exe File opened (read-only) \??\I: bevjxskb.exe File opened (read-only) \??\J: bevjxskb.exe File opened (read-only) \??\M: bevjxskb.exe File opened (read-only) \??\O: bevjxskb.exe File opened (read-only) \??\P: bevjxskb.exe File opened (read-only) \??\U: bevjxskb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
Processes:
bevjxskb.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana.css bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_zh_4.4.0.v20140623020002.jar.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Copenhagen bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_mid_over.gif.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_globalstyle.css bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WORDREP.XML.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0171847.WMF.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_ja.jar bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jvm.hprof.txt bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Atikokan bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue.css.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00382_.WMF.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187895.WMF bevjxskb.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\FreeSansBold.ttf.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\mailapi.jar bevjxskb.exe File created C:\Program Files\VideoLAN\VLC\locale\br\WE CAN RECOVER YOUR DATA.txt bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT_K_COL.HXK bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Macquarie.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Hovd.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\utilityfunctions.js bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-api_zh_CN.jar bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadataresource.xsd bevjxskb.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-charts.xml.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\core_zh_CN.jar.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-util-enumerations.xml.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02794_.WMF.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Choibalsan bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multiview.xml bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-options-api.jar.[2054B482].sonickwall bevjxskb.exe File created C:\Program Files\Java\jre7\lib\fonts\WE CAN RECOVER YOUR DATA.txt bevjxskb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200289.WMF bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR49F.GIF bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ko.properties bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4.ssl_1.0.0.v20140827-1444.jar.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_K_COL.HXK bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\NOTICE bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185670.WMF.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0202045.JPG.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\2 Right.accdt bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-threaddump.xml bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00336_.WMF bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ZoomIcons.jpg bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0205582.WMF.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR1B.GIF.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.HK.XML.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01563_.WMF bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-multiview.xml bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\PAB.SAM bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\GIGGLE.WAV.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\README.TXT.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Bougainville.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Marquesas.[2054B482].sonickwall bevjxskb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01130_.WMF bevjxskb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_zh_4.4.0.v20140623020002.jar bevjxskb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
bevjxskb.exepid Process 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe 620 bevjxskb.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
bevjxskb.exevssvc.exedescription pid Process Token: SeTakeOwnershipPrivilege 620 bevjxskb.exe Token: SeBackupPrivilege 1728 vssvc.exe Token: SeRestorePrivilege 1728 vssvc.exe Token: SeAuditPrivilege 1728 vssvc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exebevjxskb.execmd.execmd.exedescription pid Process procid_target PID 1340 wrote to memory of 620 1340 bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe 27 PID 1340 wrote to memory of 620 1340 bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe 27 PID 1340 wrote to memory of 620 1340 bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe 27 PID 1340 wrote to memory of 620 1340 bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe 27 PID 620 wrote to memory of 1012 620 bevjxskb.exe 31 PID 620 wrote to memory of 1012 620 bevjxskb.exe 31 PID 620 wrote to memory of 1012 620 bevjxskb.exe 31 PID 620 wrote to memory of 1012 620 bevjxskb.exe 31 PID 1012 wrote to memory of 972 1012 cmd.exe 33 PID 1012 wrote to memory of 972 1012 cmd.exe 33 PID 1012 wrote to memory of 972 1012 cmd.exe 33 PID 1012 wrote to memory of 972 1012 cmd.exe 33 PID 620 wrote to memory of 1916 620 bevjxskb.exe 39 PID 620 wrote to memory of 1916 620 bevjxskb.exe 39 PID 620 wrote to memory of 1916 620 bevjxskb.exe 39 PID 620 wrote to memory of 1916 620 bevjxskb.exe 39 PID 1916 wrote to memory of 1524 1916 cmd.exe 41 PID 1916 wrote to memory of 1524 1916 cmd.exe 41 PID 1916 wrote to memory of 1524 1916 cmd.exe 41 PID 1916 wrote to memory of 1524 1916 cmd.exe 41 PID 1916 wrote to memory of 1056 1916 cmd.exe 42 PID 1916 wrote to memory of 1056 1916 cmd.exe 42 PID 1916 wrote to memory of 1056 1916 cmd.exe 42 PID 1916 wrote to memory of 1056 1916 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe"C:\Users\Admin\AppData\Local\Temp\bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\ProgramData\Installed Updates.{D450A8A1-9568-45C7-9C0E-B4F9FB4537BD}\bevjxskb.exe"C:\ProgramData\Installed Updates.{D450A8A1-9568-45C7-9C0E-B4F9FB4537BD}\bevjxskb.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C CSCRIPT.EXE //E:JScript "C:\Users\Admin\AppData\Local\Temp\PRNALLRP.SYS"3⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cscript.exeCSCRIPT.EXE //E:JScript "C:\Users\Admin\AppData\Local\Temp\PRNALLRP.SYS"4⤵PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c for /l %i in (1,1,1000) do (ping -n 2 localhost & del "C:\ProgramData\Installed Updates.{D450A8A1-9568-45C7-9C0E-B4F9FB4537BD}\bevjxskb.exe" & if not exist "C:\ProgramData\Installed Updates.{D450A8A1-9568-45C7-9C0E-B4F9FB4537BD}\bevjxskb.exe" exit)3⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\PING.EXEping -n 2 localhost4⤵
- Runs ping.exe
PID:1524
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 localhost4⤵
- Runs ping.exe
PID:1056
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f1ebb4dbdfc6ec7a53bcefabdc7fb6de
SHA1b76bc50249e7420ac0f4f64e83d1a58da2068eaa
SHA256bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
SHA5128608689d716fe8ed44348b4382cf4aed67de6dd4a9da2d92a8fcbd731ccf1a7f42e60ce35376ccef81b67414f2f8ea8bbcd3b2054d78f344ad92d1f4f29ca788
-
Filesize
189KB
MD5f1ebb4dbdfc6ec7a53bcefabdc7fb6de
SHA1b76bc50249e7420ac0f4f64e83d1a58da2068eaa
SHA256bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
SHA5128608689d716fe8ed44348b4382cf4aed67de6dd4a9da2d92a8fcbd731ccf1a7f42e60ce35376ccef81b67414f2f8ea8bbcd3b2054d78f344ad92d1f4f29ca788
-
Filesize
175B
MD598a1a4dbdf75466df301906093847417
SHA13e8c7656887496694512e118795f4d28894d8f6e
SHA2567f8367fc0177355741b1def74b2f1d81d99571f674a014896478815c9fb4d3bd
SHA512d61cd7cbc63e28189a800efa46f82c5f4a1e513dc945b65e57d4a79308c04ab86945dd48249190456caa582891377e4e75ba678d4b28c28d4d0656d87d31519b
-
Filesize
189KB
MD5f1ebb4dbdfc6ec7a53bcefabdc7fb6de
SHA1b76bc50249e7420ac0f4f64e83d1a58da2068eaa
SHA256bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
SHA5128608689d716fe8ed44348b4382cf4aed67de6dd4a9da2d92a8fcbd731ccf1a7f42e60ce35376ccef81b67414f2f8ea8bbcd3b2054d78f344ad92d1f4f29ca788
-
Filesize
189KB
MD5f1ebb4dbdfc6ec7a53bcefabdc7fb6de
SHA1b76bc50249e7420ac0f4f64e83d1a58da2068eaa
SHA256bc67b94181dd4d613f3648c25c584aad5226cc1ec1999bd03d550c7f242eb7cb
SHA5128608689d716fe8ed44348b4382cf4aed67de6dd4a9da2d92a8fcbd731ccf1a7f42e60ce35376ccef81b67414f2f8ea8bbcd3b2054d78f344ad92d1f4f29ca788