Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe
-
Size
604KB
-
MD5
730f686e563dc0d5fe99d47933d30f89
-
SHA1
e3cf5a420eec96a725f5722d5f403119f0dddfe0
-
SHA256
cfa8ccfa38c703f26a05a67df8faa2a9bf8f6e953048bb6066c917cef1d27f09
-
SHA512
56df0b57baa444e2152e2319eba86eec6ec80ffa2405cb4c0115b87da4705c204de2e65e83b55158f5654d6293d600c089cc35a25b1167c9181d8d2493d9bbdd
-
SSDEEP
12288:AhBA3gckllBigHTtQnwGccqG45lboM67oM:qA3GDBigHTtQnwCqG2NoOM
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3584 i9h3z93nqzqpnhbl6qv.exe 4744 dyzuvwapk.exe 2672 tzifgugqvf.exe 3840 dyzuvwapk.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\mnzqjjflzdakmnd\xtvpv1lsz 2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe File created C:\Windows\mnzqjjflzdakmnd\xtvpv1lsz i9h3z93nqzqpnhbl6qv.exe File created C:\Windows\mnzqjjflzdakmnd\xtvpv1lsz dyzuvwapk.exe File created C:\Windows\mnzqjjflzdakmnd\xtvpv1lsz tzifgugqvf.exe File created C:\Windows\mnzqjjflzdakmnd\xtvpv1lsz dyzuvwapk.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i9h3z93nqzqpnhbl6qv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyzuvwapk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzifgugqvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4744 dyzuvwapk.exe 4744 dyzuvwapk.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 4744 dyzuvwapk.exe 4744 dyzuvwapk.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 4744 dyzuvwapk.exe 4744 dyzuvwapk.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 4744 dyzuvwapk.exe 4744 dyzuvwapk.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe 4744 dyzuvwapk.exe 4744 dyzuvwapk.exe 2672 tzifgugqvf.exe 2672 tzifgugqvf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3936 wrote to memory of 3584 3936 2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe 82 PID 3936 wrote to memory of 3584 3936 2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe 82 PID 3936 wrote to memory of 3584 3936 2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe 82 PID 4744 wrote to memory of 2672 4744 dyzuvwapk.exe 84 PID 4744 wrote to memory of 2672 4744 dyzuvwapk.exe 84 PID 4744 wrote to memory of 2672 4744 dyzuvwapk.exe 84 PID 3584 wrote to memory of 3840 3584 i9h3z93nqzqpnhbl6qv.exe 85 PID 3584 wrote to memory of 3840 3584 i9h3z93nqzqpnhbl6qv.exe 85 PID 3584 wrote to memory of 3840 3584 i9h3z93nqzqpnhbl6qv.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_730f686e563dc0d5fe99d47933d30f89_bkransomware.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\mnzqjjflzdakmnd\i9h3z93nqzqpnhbl6qv.exe"C:\mnzqjjflzdakmnd\i9h3z93nqzqpnhbl6qv.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\mnzqjjflzdakmnd\dyzuvwapk.exe"C:\mnzqjjflzdakmnd\dyzuvwapk.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3840
-
-
-
C:\mnzqjjflzdakmnd\dyzuvwapk.exeC:\mnzqjjflzdakmnd\dyzuvwapk.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\mnzqjjflzdakmnd\tzifgugqvf.exeijzashmphwgv "c:\mnzqjjflzdakmnd\dyzuvwapk.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604KB
MD5730f686e563dc0d5fe99d47933d30f89
SHA1e3cf5a420eec96a725f5722d5f403119f0dddfe0
SHA256cfa8ccfa38c703f26a05a67df8faa2a9bf8f6e953048bb6066c917cef1d27f09
SHA51256df0b57baa444e2152e2319eba86eec6ec80ffa2405cb4c0115b87da4705c204de2e65e83b55158f5654d6293d600c089cc35a25b1167c9181d8d2493d9bbdd
-
Filesize
6B
MD59a9d9def6a2f91b3355e3d7e8b0112a0
SHA18e93e9c83ac208d4786f276a67ce9986163760e5
SHA2567098b25dc3408e0cba2529f2cea95f036a8989c6012f7def3ba06e8e7b56081a
SHA51216d3245b2ae5e59d5ddd537c92c509adaa08889bde29c68a322c9be9dcd442401034e0f677530f2e643834097f28d28a9370a17f7af7d729d3e5b32b0e543882
-
Filesize
4B
MD569ffe8de98d9adbcc0da80dbd9644933
SHA195a271bff65373400be46610a41223670b8d6b89
SHA2564cfe6d31cbbe80b99f7ba30811a59ff78864cd0ef8ef3490952f2ffa458113b8
SHA512187e46fa3a18e544ffeedfc3e047ba01eb314190bc30160e8a38d24ae89426f42a07ca6b44ea097dbf32a3161966d9e801f7440bedf02265eb298ba722d14dda