Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe
Resource
win7-20240508-en
General
-
Target
2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe
-
Size
1017KB
-
MD5
9c4e36290c30fb9937f146fd85d2e852
-
SHA1
9402654c9fae68f38048570e6880ede261968544
-
SHA256
1d49f96a72daed71a99d0afeb8cd6cbfa16d9d0e78bef632a0bca08991f794b6
-
SHA512
2689ec0d298b58fa36d5ec36f4ed64c7eeadba7f2afc6a7e7e174efc29b358123e1c00e76c01ebdf9ee783ce0bf6351120d09f05d35f537bc4cd74f1ba055ce1
-
SSDEEP
24576:o2lmh4RW/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:o2Mh4RWLNiXicJFFRGNzj3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 472 Process not Found 2604 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1944 2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1944 2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe 1944 2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe 1944 2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-07_9c4e36290c30fb9937f146fd85d2e852_bkransomware.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1944
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2604
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5abd0c132c16928729371555cd453839e
SHA1f012787db0cc013865660e58683e17dbcccadddb
SHA256bba89bfae1e6167bd67c0d29825c39d97e2bbc09f5a2cb326b9cec877dd8bf94
SHA512df7c950571c4f72ae1c00c845d25310093c3220cd366077f82845482c3b3557859f863f058575b69625904583c7f98e88eb3e627c8295285c73b60b3f47a3381