Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe
-
Size
588KB
-
MD5
b53033851a3e77d995656269686559da
-
SHA1
ccfca4f1ada986ad370d6b6b54c1eec8d2d22c9c
-
SHA256
eb448fed4ee9b5a1fc218960c2eac63ebf4313bcee165905088a7c1802941ace
-
SHA512
df98e13fd7ada5d6b55101f6f09c50c909c9bb94c98afc81aa55417c271d8b92df35f81e90fa7c96356ca48f60a0011d97e368f80470747ec49740cd7b9d8505
-
SSDEEP
12288:JO7gxJOeF5niCosYxsYS9BTyyH0maoUajx6CjlrJQ0BGgD:JOMxJLF5Mh2YSPTynmRUaNRJQQ
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4976 vxye3z98aemvu7fy4jyhrow.exe 1776 umfkcit.exe 1828 pnntssn.exe 2264 umfkcit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\wihkhhveawbvyrh\jonquyjt 2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe File created C:\Windows\wihkhhveawbvyrh\jonquyjt vxye3z98aemvu7fy4jyhrow.exe File created C:\Windows\wihkhhveawbvyrh\jonquyjt umfkcit.exe File created C:\Windows\wihkhhveawbvyrh\jonquyjt pnntssn.exe File created C:\Windows\wihkhhveawbvyrh\jonquyjt umfkcit.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxye3z98aemvu7fy4jyhrow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umfkcit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnntssn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1776 umfkcit.exe 1776 umfkcit.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe 1828 pnntssn.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4976 1296 2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe 82 PID 1296 wrote to memory of 4976 1296 2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe 82 PID 1296 wrote to memory of 4976 1296 2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe 82 PID 1776 wrote to memory of 1828 1776 umfkcit.exe 84 PID 1776 wrote to memory of 1828 1776 umfkcit.exe 84 PID 1776 wrote to memory of 1828 1776 umfkcit.exe 84 PID 4976 wrote to memory of 2264 4976 vxye3z98aemvu7fy4jyhrow.exe 85 PID 4976 wrote to memory of 2264 4976 vxye3z98aemvu7fy4jyhrow.exe 85 PID 4976 wrote to memory of 2264 4976 vxye3z98aemvu7fy4jyhrow.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_b53033851a3e77d995656269686559da_bkransomware.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\wihkhhveawbvyrh\vxye3z98aemvu7fy4jyhrow.exe"C:\wihkhhveawbvyrh\vxye3z98aemvu7fy4jyhrow.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\wihkhhveawbvyrh\umfkcit.exe"C:\wihkhhveawbvyrh\umfkcit.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2264
-
-
-
C:\wihkhhveawbvyrh\umfkcit.exeC:\wihkhhveawbvyrh\umfkcit.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\wihkhhveawbvyrh\pnntssn.exeeyhxbvcnx8e1 "c:\wihkhhveawbvyrh\umfkcit.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9B
MD5aad3a8a325ba765834b5eb734fd84061
SHA1df4ddb1cd60ea0fa1d70b983060c9e9147347909
SHA256121e4f66a39d8f1683680c6ad59cefa72b380b6f1968d2394ef3a8006007a81e
SHA512c795396042e1a84d9760d688cdc05514464c0200f14ba9fb1acf5eb5685778ef0405c8d604588a1b3c354c7a111270e7e6248af3d95fd83d3dd61b491acab6e1
-
Filesize
588KB
MD5b53033851a3e77d995656269686559da
SHA1ccfca4f1ada986ad370d6b6b54c1eec8d2d22c9c
SHA256eb448fed4ee9b5a1fc218960c2eac63ebf4313bcee165905088a7c1802941ace
SHA512df98e13fd7ada5d6b55101f6f09c50c909c9bb94c98afc81aa55417c271d8b92df35f81e90fa7c96356ca48f60a0011d97e368f80470747ec49740cd7b9d8505