Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe
-
Size
594KB
-
MD5
13e0b960397b452b98d73e1b292003f2
-
SHA1
155c62579b07aa4e23b6858e7628fc5c446fb131
-
SHA256
c96e150e4868f986bbc68d02f91e02fd58c84abf3737ac01fb93a2c51d54c09b
-
SHA512
947582b2e2f22ed5d592a87f9b5d111b441d8c762b1bc80191910494e5afc7a142f50e241a522714ef4f2c0caeeaa1fb1821b0f5bceafc591910f3f2fdf469c4
-
SSDEEP
12288:qLmbCNuNL06qEAKlkE8Uuy8umAcrSzg7ju1:qDuNL03EAKlkE8U6icrN7jS
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2696 rwxkr3z9fxkueuh0nzarefat.exe 3544 rcrpxzpa.exe 3956 brspfeypvkjd.exe 4704 rcrpxzpa.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\dqsmhjizeieygs\zun7qkzs 2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe File created C:\Windows\dqsmhjizeieygs\zun7qkzs rwxkr3z9fxkueuh0nzarefat.exe File created C:\Windows\dqsmhjizeieygs\zun7qkzs rcrpxzpa.exe File created C:\Windows\dqsmhjizeieygs\zun7qkzs brspfeypvkjd.exe File created C:\Windows\dqsmhjizeieygs\zun7qkzs rcrpxzpa.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwxkr3z9fxkueuh0nzarefat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rcrpxzpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brspfeypvkjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3544 rcrpxzpa.exe 3544 rcrpxzpa.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3544 rcrpxzpa.exe 3544 rcrpxzpa.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3544 rcrpxzpa.exe 3544 rcrpxzpa.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3544 rcrpxzpa.exe 3544 rcrpxzpa.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3544 rcrpxzpa.exe 3544 rcrpxzpa.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe 3956 brspfeypvkjd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2696 2860 2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe 83 PID 2860 wrote to memory of 2696 2860 2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe 83 PID 2860 wrote to memory of 2696 2860 2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe 83 PID 3544 wrote to memory of 3956 3544 rcrpxzpa.exe 85 PID 3544 wrote to memory of 3956 3544 rcrpxzpa.exe 85 PID 3544 wrote to memory of 3956 3544 rcrpxzpa.exe 85 PID 2696 wrote to memory of 4704 2696 rwxkr3z9fxkueuh0nzarefat.exe 89 PID 2696 wrote to memory of 4704 2696 rwxkr3z9fxkueuh0nzarefat.exe 89 PID 2696 wrote to memory of 4704 2696 rwxkr3z9fxkueuh0nzarefat.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\dqsmhjizeieygs\rwxkr3z9fxkueuh0nzarefat.exe"C:\dqsmhjizeieygs\rwxkr3z9fxkueuh0nzarefat.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\dqsmhjizeieygs\rcrpxzpa.exe"C:\dqsmhjizeieygs\rcrpxzpa.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4704
-
-
-
C:\dqsmhjizeieygs\rcrpxzpa.exeC:\dqsmhjizeieygs\rcrpxzpa.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\dqsmhjizeieygs\brspfeypvkjd.exexxecsxgknsxb "c:\dqsmhjizeieygs\rcrpxzpa.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD58f71c325d988e0182895c49d261a227b
SHA122ef6e5aedb90ff7422ff05838012f83760b4184
SHA25605b350071ef29b1dff4bc857cf9d47846d9f4ce9750d9eda2179acf0929ba2be
SHA512bfc174f2fa7465e15fee04e8a6cf4e432aa7c8e9eb8343089d7aa3a422a470cb55fbb0ae03e9c3cf3c2798dff9fd7229c64914dce64e7678f286b509ddd09ba9
-
Filesize
594KB
MD513e0b960397b452b98d73e1b292003f2
SHA1155c62579b07aa4e23b6858e7628fc5c446fb131
SHA256c96e150e4868f986bbc68d02f91e02fd58c84abf3737ac01fb93a2c51d54c09b
SHA512947582b2e2f22ed5d592a87f9b5d111b441d8c762b1bc80191910494e5afc7a142f50e241a522714ef4f2c0caeeaa1fb1821b0f5bceafc591910f3f2fdf469c4
-
Filesize
12B
MD525ab849e35f0a9113402c523a29b381e
SHA19fdd84a6c8616440b0424f8ee45420c1d304f32c
SHA256edfe17cdb077fb9e479518fc5925e20c6a4de77f4d8606f41923100a8a058b36
SHA5125f93c1a12cc6d52e6edae5dd42e1449e13aedc88adaeb8bb46d58fa2c671c7bcaef73b7013dfcce3ddaba68ad2f515d311dd70db82a826777d9b61ee1bc2f5b8