Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe
-
Size
606KB
-
MD5
cd26fa78f1ffd0e529a04ec4403b6f28
-
SHA1
d44cb3ab04e572eea10fd9c9a531af58fc312101
-
SHA256
a5620cc4ba32d3c89d7ba9e245c5f62bd607f9f8446a3a1169600fa640fd6224
-
SHA512
10c990c9d4632e73e52b58769a06b101b719d27277f8cf1ab2cd74c1d2105214dc020b9175eea178db65df21c373b99bf708bc389cacc75d31d7dd4d355b8ab1
-
SSDEEP
12288:pjGDKEOdJb/rqM/rHTC920va4agXe/Z3uGEHM252/R62OMwu8:VGDKEO72amXWduGf25eR6Xn5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4928 hceymohdm.exe 3864 fxvbspdgm.exe 2632 hceymohdm.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\lmwowlhvlbpky\gurrinku 2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe File created C:\Windows\lmwowlhvlbpky\gurrinku hceymohdm.exe File created C:\Windows\lmwowlhvlbpky\gurrinku fxvbspdgm.exe File created C:\Windows\lmwowlhvlbpky\gurrinku hceymohdm.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hceymohdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxvbspdgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4928 hceymohdm.exe 4928 hceymohdm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe 3864 fxvbspdgm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3864 4928 hceymohdm.exe 83 PID 4928 wrote to memory of 3864 4928 hceymohdm.exe 83 PID 4928 wrote to memory of 3864 4928 hceymohdm.exe 83 PID 1636 wrote to memory of 2632 1636 2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe 84 PID 1636 wrote to memory of 2632 1636 2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe 84 PID 1636 wrote to memory of 2632 1636 2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_cd26fa78f1ffd0e529a04ec4403b6f28_bkransomware.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\lmwowlhvlbpky\hceymohdm.exe"C:\lmwowlhvlbpky\hceymohdm.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2632
-
-
C:\lmwowlhvlbpky\hceymohdm.exeC:\lmwowlhvlbpky\hceymohdm.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\lmwowlhvlbpky\fxvbspdgm.exeqmygxsrmr9tk "c:\lmwowlhvlbpky\hceymohdm.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD58ba0ad98e0210bae8c6738654b1cb01d
SHA1b4da58002c07cebd40f73e2c4e230a74604f359d
SHA256841e7cbcfe8b8198d0f9ac2a701f261458c003a52b8c9b2fc29dad1e0b9c8d57
SHA512051cb35962f652573e7ed0241a528bbb081cf519a2466ecbce472d5b526c6feb46e63254a84a30658b1d4ddd2abce01e2c859f4816186d5e23dd63d601d7796f
-
Filesize
606KB
MD5cd26fa78f1ffd0e529a04ec4403b6f28
SHA1d44cb3ab04e572eea10fd9c9a531af58fc312101
SHA256a5620cc4ba32d3c89d7ba9e245c5f62bd607f9f8446a3a1169600fa640fd6224
SHA51210c990c9d4632e73e52b58769a06b101b719d27277f8cf1ab2cd74c1d2105214dc020b9175eea178db65df21c373b99bf708bc389cacc75d31d7dd4d355b8ab1
-
Filesize
4B
MD5c20ff1611c26a91b658f15b33e265d4d
SHA12ec492da3d932d94018fc2b63b7b8ce9fc28f3f3
SHA256fa247642d88d34ae08832891c21ae8c2be5170011e1bc8ede94d781a151d4fb1
SHA51243a614a3759c69b9927d0beb816ca83713b4ad2754b7d73e56aa05fb77a5283fd9bd33c1bf1706e2acde322deb8e3c31a73795dcfbe283e6e4d8315517232d95