Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 03:42

General

  • Target

    2024-04-26_0e9d546c6c4174e232194144d5defc6a_bkransomware.exe

  • Size

    71KB

  • MD5

    0e9d546c6c4174e232194144d5defc6a

  • SHA1

    66994a793dbb15d4d71ed11c2d912b94565d5894

  • SHA256

    08a2ddf71430191b7926a496d7e331bb5f33567d9ab8224e8fa4e8501946e039

  • SHA512

    4d4e7d4ca9e8e3d231595d2a4c8829a4c6e2ba755e7945b7b5de454a78f5fd4e5c9542b3e101af894c50cb76feea69d7b93ee68bfb724d562247e2bc9ebfe88f

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTR:ZhpAyazIlyazTR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_0e9d546c6c4174e232194144d5defc6a_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_0e9d546c6c4174e232194144d5defc6a_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          395KB

          MD5

          7ec071072d5d7c6754cbb25fbf8454d7

          SHA1

          d33dd96c63310bdabdbf32ef546a873fcf2244d8

          SHA256

          3fcea272491aae999301668031239861a5cfb5ad363bec06e5ac6cc9733367ac

          SHA512

          34374c35865ec1006250ecafcda02707f443fce17e5e03fdfdbecfdd13b87c4de7414182f720667a6d82d211514583206bb21433aba462fe336578bc11467fae

        • C:\Users\Admin\AppData\Local\Temp\cm8YjqPWqj6ZLXQ.exe

          Filesize

          71KB

          MD5

          03c22e3e4905a1f069fc35c65a601063

          SHA1

          372991b8d70baab5ad821e27ff059269c5d0b38a

          SHA256

          6fa80a15b9d0fc2ceb084e55faeafba30cd2f970e1713b08333182d1973812e5

          SHA512

          76213d934cbdaf634bb8a2570b863987f92f16e3059937b83316475430f012b58f6aa554596d051d2efd4d325e27e67fe7853df6b5215f65e30184d0be4d0d9c

        • C:\Windows\CTS.exe

          Filesize

          71KB

          MD5

          66df4ffab62e674af2e75b163563fc0b

          SHA1

          dec8a197312e41eeb3cfef01cb2a443f0205cd6e

          SHA256

          075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

          SHA512

          1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25