Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe
-
Size
499KB
-
MD5
b089d82e779d6db0872d9aaff1701238
-
SHA1
7a96732673ce063fc78d918a31c6b5d015c19968
-
SHA256
2be8f274ca9e75c6ee615a67964208e5bb6e0d96bba8916c72c42a63d435cbbf
-
SHA512
e8a5414f904ffb31dc9010151060e8b68463fdf71d91204153d3248b78d7bac352858499830711fa7d0b3f8eed489085d47ee570c3fb97ff4b81c1cb7b952138
-
SSDEEP
6144:1ECNcqV5TEYDuw0JBjX3cR4XoXBCNqvvPKsqEvx5KS+fr5T/73l:+nE55a3JJU+oXBCwCsqWx5/+Z71
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1668 oe3z9jb3psifzjavg67x.exe 1064 fgrlfrqeqts.exe 2056 urpmmxfewjtw.exe 4172 fgrlfrqeqts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\kgryuyigfc\djiqvrhowex 2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe File created C:\Windows\kgryuyigfc\djiqvrhowex oe3z9jb3psifzjavg67x.exe File created C:\Windows\kgryuyigfc\djiqvrhowex fgrlfrqeqts.exe File created C:\Windows\kgryuyigfc\djiqvrhowex urpmmxfewjtw.exe File created C:\Windows\kgryuyigfc\djiqvrhowex fgrlfrqeqts.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oe3z9jb3psifzjavg67x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgrlfrqeqts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language urpmmxfewjtw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 fgrlfrqeqts.exe 1064 fgrlfrqeqts.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe 2056 urpmmxfewjtw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5080 wrote to memory of 1668 5080 2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe 82 PID 5080 wrote to memory of 1668 5080 2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe 82 PID 5080 wrote to memory of 1668 5080 2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe 82 PID 1064 wrote to memory of 2056 1064 fgrlfrqeqts.exe 84 PID 1064 wrote to memory of 2056 1064 fgrlfrqeqts.exe 84 PID 1064 wrote to memory of 2056 1064 fgrlfrqeqts.exe 84 PID 1668 wrote to memory of 4172 1668 oe3z9jb3psifzjavg67x.exe 85 PID 1668 wrote to memory of 4172 1668 oe3z9jb3psifzjavg67x.exe 85 PID 1668 wrote to memory of 4172 1668 oe3z9jb3psifzjavg67x.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_b089d82e779d6db0872d9aaff1701238_bkransomware.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\kgryuyigfc\oe3z9jb3psifzjavg67x.exe"C:\kgryuyigfc\oe3z9jb3psifzjavg67x.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\kgryuyigfc\fgrlfrqeqts.exe"C:\kgryuyigfc\fgrlfrqeqts.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4172
-
-
-
C:\kgryuyigfc\fgrlfrqeqts.exeC:\kgryuyigfc\fgrlfrqeqts.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\kgryuyigfc\urpmmxfewjtw.exefbil4al08ikb "c:\kgryuyigfc\fgrlfrqeqts.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10B
MD539aff10c5356babd31a03ceb805b2c29
SHA17549cde5498be2d69396f3e8678c374e10df2f47
SHA2569ffabdb5b36426083b9122bdd91681e1310487627dac8c976872018f96caa260
SHA5126d468303b146fffca7605237882ff566383b25f0c6db27bc21d683801474c013bf8b687355ee4eff82dca240c932b1e8199e1817d6f51653d2798b732bda85e0
-
Filesize
499KB
MD5b089d82e779d6db0872d9aaff1701238
SHA17a96732673ce063fc78d918a31c6b5d015c19968
SHA2562be8f274ca9e75c6ee615a67964208e5bb6e0d96bba8916c72c42a63d435cbbf
SHA512e8a5414f904ffb31dc9010151060e8b68463fdf71d91204153d3248b78d7bac352858499830711fa7d0b3f8eed489085d47ee570c3fb97ff4b81c1cb7b952138