Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 04:35

General

  • Target

    2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe

  • Size

    604KB

  • MD5

    730f686e563dc0d5fe99d47933d30f89

  • SHA1

    e3cf5a420eec96a725f5722d5f403119f0dddfe0

  • SHA256

    cfa8ccfa38c703f26a05a67df8faa2a9bf8f6e953048bb6066c917cef1d27f09

  • SHA512

    56df0b57baa444e2152e2319eba86eec6ec80ffa2405cb4c0115b87da4705c204de2e65e83b55158f5654d6293d600c089cc35a25b1167c9181d8d2493d9bbdd

  • SSDEEP

    12288:AhBA3gckllBigHTtQnwGccqG45lboM67oM:qA3GDBigHTtQnwCqG2NoOM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\mnzqjjflzdakmnd\i9h3z93nqzqpnhbl6qv.exe
      "C:\mnzqjjflzdakmnd\i9h3z93nqzqpnhbl6qv.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\mnzqjjflzdakmnd\dyzuvwapk.exe
        "C:\mnzqjjflzdakmnd\dyzuvwapk.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3840
  • C:\mnzqjjflzdakmnd\dyzuvwapk.exe
    C:\mnzqjjflzdakmnd\dyzuvwapk.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\mnzqjjflzdakmnd\tzifgugqvf.exe
      ijzashmphwgv "c:\mnzqjjflzdakmnd\dyzuvwapk.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\mnzqjjflzdakmnd\i9h3z93nqzqpnhbl6qv.exe

    Filesize

    604KB

    MD5

    730f686e563dc0d5fe99d47933d30f89

    SHA1

    e3cf5a420eec96a725f5722d5f403119f0dddfe0

    SHA256

    cfa8ccfa38c703f26a05a67df8faa2a9bf8f6e953048bb6066c917cef1d27f09

    SHA512

    56df0b57baa444e2152e2319eba86eec6ec80ffa2405cb4c0115b87da4705c204de2e65e83b55158f5654d6293d600c089cc35a25b1167c9181d8d2493d9bbdd

  • C:\mnzqjjflzdakmnd\xtvpv1lsz

    Filesize

    6B

    MD5

    9a9d9def6a2f91b3355e3d7e8b0112a0

    SHA1

    8e93e9c83ac208d4786f276a67ce9986163760e5

    SHA256

    7098b25dc3408e0cba2529f2cea95f036a8989c6012f7def3ba06e8e7b56081a

    SHA512

    16d3245b2ae5e59d5ddd537c92c509adaa08889bde29c68a322c9be9dcd442401034e0f677530f2e643834097f28d28a9370a17f7af7d729d3e5b32b0e543882

  • C:\mnzqjjflzdakmnd\ypxkkwsr

    Filesize

    4B

    MD5

    69ffe8de98d9adbcc0da80dbd9644933

    SHA1

    95a271bff65373400be46610a41223670b8d6b89

    SHA256

    4cfe6d31cbbe80b99f7ba30811a59ff78864cd0ef8ef3490952f2ffa458113b8

    SHA512

    187e46fa3a18e544ffeedfc3e047ba01eb314190bc30160e8a38d24ae89426f42a07ca6b44ea097dbf32a3161966d9e801f7440bedf02265eb298ba722d14dda