Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 04:22

General

  • Target

    2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe

  • Size

    594KB

  • MD5

    13e0b960397b452b98d73e1b292003f2

  • SHA1

    155c62579b07aa4e23b6858e7628fc5c446fb131

  • SHA256

    c96e150e4868f986bbc68d02f91e02fd58c84abf3737ac01fb93a2c51d54c09b

  • SHA512

    947582b2e2f22ed5d592a87f9b5d111b441d8c762b1bc80191910494e5afc7a142f50e241a522714ef4f2c0caeeaa1fb1821b0f5bceafc591910f3f2fdf469c4

  • SSDEEP

    12288:qLmbCNuNL06qEAKlkE8Uuy8umAcrSzg7ju1:qDuNL03EAKlkE8U6icrN7jS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-22_13e0b960397b452b98d73e1b292003f2_bkransomware.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\dqsmhjizeieygs\rwxkr3z9fxkueuh0nzarefat.exe
      "C:\dqsmhjizeieygs\rwxkr3z9fxkueuh0nzarefat.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\dqsmhjizeieygs\rcrpxzpa.exe
        "C:\dqsmhjizeieygs\rcrpxzpa.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4704
  • C:\dqsmhjizeieygs\rcrpxzpa.exe
    C:\dqsmhjizeieygs\rcrpxzpa.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\dqsmhjizeieygs\brspfeypvkjd.exe
      xxecsxgknsxb "c:\dqsmhjizeieygs\rcrpxzpa.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\dqsmhjizeieygs\jenfxbtmprh

    Filesize

    4B

    MD5

    8f71c325d988e0182895c49d261a227b

    SHA1

    22ef6e5aedb90ff7422ff05838012f83760b4184

    SHA256

    05b350071ef29b1dff4bc857cf9d47846d9f4ce9750d9eda2179acf0929ba2be

    SHA512

    bfc174f2fa7465e15fee04e8a6cf4e432aa7c8e9eb8343089d7aa3a422a470cb55fbb0ae03e9c3cf3c2798dff9fd7229c64914dce64e7678f286b509ddd09ba9

  • C:\dqsmhjizeieygs\rwxkr3z9fxkueuh0nzarefat.exe

    Filesize

    594KB

    MD5

    13e0b960397b452b98d73e1b292003f2

    SHA1

    155c62579b07aa4e23b6858e7628fc5c446fb131

    SHA256

    c96e150e4868f986bbc68d02f91e02fd58c84abf3737ac01fb93a2c51d54c09b

    SHA512

    947582b2e2f22ed5d592a87f9b5d111b441d8c762b1bc80191910494e5afc7a142f50e241a522714ef4f2c0caeeaa1fb1821b0f5bceafc591910f3f2fdf469c4

  • C:\dqsmhjizeieygs\zun7qkzs

    Filesize

    12B

    MD5

    25ab849e35f0a9113402c523a29b381e

    SHA1

    9fdd84a6c8616440b0424f8ee45420c1d304f32c

    SHA256

    edfe17cdb077fb9e479518fc5925e20c6a4de77f4d8606f41923100a8a058b36

    SHA512

    5f93c1a12cc6d52e6edae5dd42e1449e13aedc88adaeb8bb46d58fa2c671c7bcaef73b7013dfcce3ddaba68ad2f515d311dd70db82a826777d9b61ee1bc2f5b8