Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe
-
Size
6.6MB
-
MD5
7a3a9717e6795c025e2708df2bea8aa7
-
SHA1
5faf35ac2d4093d1f520d0cdcb2ad78b03cf3704
-
SHA256
f3861eabc29fdcfeeb2285284a14f936cfaf15eb32b03a7ffbdd244ef49c2299
-
SHA512
b4a0706c3a15bb66c26d9184b64e2c33301c31073b7c3d248ca991a6db5436fdd304019bd515fcd6e483ac370314054b32f7acfba26d1f2d8ac46cb2cab3337c
-
SSDEEP
196608:NWQH1sQqOwekLRZeWHrHvDH9mjFd+A1h4Vm:oQH1AOweeRgcDHSMNm
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2720 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 2968 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2720 powershell.exe 2720 powershell.exe 2720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1300 2968 2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe 28 PID 2968 wrote to memory of 1300 2968 2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe 28 PID 2968 wrote to memory of 1300 2968 2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe 28 PID 2968 wrote to memory of 1300 2968 2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe 28 PID 1300 wrote to memory of 2836 1300 cmd.exe 30 PID 1300 wrote to memory of 2836 1300 cmd.exe 30 PID 1300 wrote to memory of 2836 1300 cmd.exe 30 PID 1300 wrote to memory of 2836 1300 cmd.exe 30 PID 2836 wrote to memory of 2104 2836 forfiles.exe 31 PID 2836 wrote to memory of 2104 2836 forfiles.exe 31 PID 2836 wrote to memory of 2104 2836 forfiles.exe 31 PID 2836 wrote to memory of 2104 2836 forfiles.exe 31 PID 2104 wrote to memory of 2736 2104 cmd.exe 32 PID 2104 wrote to memory of 2736 2104 cmd.exe 32 PID 2104 wrote to memory of 2736 2104 cmd.exe 32 PID 2104 wrote to memory of 2736 2104 cmd.exe 32 PID 1300 wrote to memory of 2636 1300 cmd.exe 33 PID 1300 wrote to memory of 2636 1300 cmd.exe 33 PID 1300 wrote to memory of 2636 1300 cmd.exe 33 PID 1300 wrote to memory of 2636 1300 cmd.exe 33 PID 2636 wrote to memory of 2400 2636 forfiles.exe 34 PID 2636 wrote to memory of 2400 2636 forfiles.exe 34 PID 2636 wrote to memory of 2400 2636 forfiles.exe 34 PID 2636 wrote to memory of 2400 2636 forfiles.exe 34 PID 2400 wrote to memory of 2096 2400 cmd.exe 35 PID 2400 wrote to memory of 2096 2400 cmd.exe 35 PID 2400 wrote to memory of 2096 2400 cmd.exe 35 PID 2400 wrote to memory of 2096 2400 cmd.exe 35 PID 1300 wrote to memory of 3060 1300 cmd.exe 36 PID 1300 wrote to memory of 3060 1300 cmd.exe 36 PID 1300 wrote to memory of 3060 1300 cmd.exe 36 PID 1300 wrote to memory of 3060 1300 cmd.exe 36 PID 3060 wrote to memory of 3012 3060 forfiles.exe 37 PID 3060 wrote to memory of 3012 3060 forfiles.exe 37 PID 3060 wrote to memory of 3012 3060 forfiles.exe 37 PID 3060 wrote to memory of 3012 3060 forfiles.exe 37 PID 3012 wrote to memory of 2560 3012 cmd.exe 38 PID 3012 wrote to memory of 2560 3012 cmd.exe 38 PID 3012 wrote to memory of 2560 3012 cmd.exe 38 PID 3012 wrote to memory of 2560 3012 cmd.exe 38 PID 1300 wrote to memory of 2600 1300 cmd.exe 39 PID 1300 wrote to memory of 2600 1300 cmd.exe 39 PID 1300 wrote to memory of 2600 1300 cmd.exe 39 PID 1300 wrote to memory of 2600 1300 cmd.exe 39 PID 2600 wrote to memory of 2652 2600 forfiles.exe 40 PID 2600 wrote to memory of 2652 2600 forfiles.exe 40 PID 2600 wrote to memory of 2652 2600 forfiles.exe 40 PID 2600 wrote to memory of 2652 2600 forfiles.exe 40 PID 2652 wrote to memory of 2676 2652 cmd.exe 41 PID 2652 wrote to memory of 2676 2652 cmd.exe 41 PID 2652 wrote to memory of 2676 2652 cmd.exe 41 PID 2652 wrote to memory of 2676 2652 cmd.exe 41 PID 1300 wrote to memory of 2680 1300 cmd.exe 42 PID 1300 wrote to memory of 2680 1300 cmd.exe 42 PID 1300 wrote to memory of 2680 1300 cmd.exe 42 PID 1300 wrote to memory of 2680 1300 cmd.exe 42 PID 2680 wrote to memory of 2696 2680 forfiles.exe 43 PID 2680 wrote to memory of 2696 2680 forfiles.exe 43 PID 2680 wrote to memory of 2696 2680 forfiles.exe 43 PID 2680 wrote to memory of 2696 2680 forfiles.exe 43 PID 2696 wrote to memory of 2720 2696 cmd.exe 44 PID 2696 wrote to memory of 2720 2696 cmd.exe 44 PID 2696 wrote to memory of 2720 2696 cmd.exe 44 PID 2696 wrote to memory of 2720 2696 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-08_7a3a9717e6795c025e2708df2bea8aa7_bkransomware.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:2736
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:2096
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:2560
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:2676
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:2520
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6082⤵
- Program crash
PID:2380
-