Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:25

General

  • Target

    2024-09-19_48853dfe2f0fa5f286ea3ce79b0bd8e9_bkransomware.exe

  • Size

    605KB

  • MD5

    48853dfe2f0fa5f286ea3ce79b0bd8e9

  • SHA1

    8f790cee95d4e8f381de8683c6741bccceeb1c00

  • SHA256

    56f6d974faf55d01a6cbbf60a51ac8371d7767c48e1a64d3a8b4df7de33ac0c0

  • SHA512

    b422751c2a88386f893365fcbb0a23514cd6f7caf64fb8d145de747976219c34e763da2f39c5ede015bde7428656e652c09cfd995710e13fcd665493e496dc30

  • SSDEEP

    12288:iglxRWu6mP8PCu//eL/Q+AlcKChmILFzRj:igNP6mS4/xocKOpFFj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_48853dfe2f0fa5f286ea3ce79b0bd8e9_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_48853dfe2f0fa5f286ea3ce79b0bd8e9_bkransomware.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\cmrfcvxgqcp\ic4agvnydveaaert.exe
      "C:\cmrfcvxgqcp\ic4agvnydveaaert.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\cmrfcvxgqcp\vwwwkxdkuetd.exe
        "C:\cmrfcvxgqcp\vwwwkxdkuetd.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2808
  • C:\cmrfcvxgqcp\vwwwkxdkuetd.exe
    C:\cmrfcvxgqcp\vwwwkxdkuetd.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\cmrfcvxgqcp\nnzggcbdmpfb.exe
      mxdxacgmdrja "c:\cmrfcvxgqcp\vwwwkxdkuetd.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\cmrfcvxgqcp\rbzjibotruw

    Filesize

    6B

    MD5

    0606d42b5c965742ca0ff915ddc96720

    SHA1

    720c3fb94349a7f83b43c80a90edf9b48c0583f1

    SHA256

    cd84eed2d1a54a83dc8ab4c88c2ee0ff2b7107d87229573da52091af803adcfb

    SHA512

    515b589e29ded5a28e9d04cbb19e86725afa27a02eca11d5dbb773a539a070e5608c5fdffa6219273a3d829dbd0d5ec39b9e6c4c3bf948a9db834c4d2c50e502

  • \cmrfcvxgqcp\ic4agvnydveaaert.exe

    Filesize

    605KB

    MD5

    48853dfe2f0fa5f286ea3ce79b0bd8e9

    SHA1

    8f790cee95d4e8f381de8683c6741bccceeb1c00

    SHA256

    56f6d974faf55d01a6cbbf60a51ac8371d7767c48e1a64d3a8b4df7de33ac0c0

    SHA512

    b422751c2a88386f893365fcbb0a23514cd6f7caf64fb8d145de747976219c34e763da2f39c5ede015bde7428656e652c09cfd995710e13fcd665493e496dc30