Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe
-
Size
13.3MB
-
MD5
07deeb9cb6c401f8cc1d621166a03db5
-
SHA1
091e98cac463aebd96665ef5f767ddc583692c14
-
SHA256
2b747b3f33a8ff5a2651812d5bbf85ac63788da27c1089c1ae7daabf4efa7ddc
-
SHA512
0ba72849ab7d09a9e580d8fe1857fa8f939be7c05c6ef3369973e1bc0c2d65a8718c69aab215b89f0aa6c7b99935d8c3f9b1e15f641f6d0342f07ded45ad7e9c
-
SSDEEP
196608:Sid8YlRU4Vw3vMPP+uGmmAsj3hycvrd4T3RA4wWYSe63FFVQTeMtnMKfYS+ouKn:JvlRUPx5ZRycvrg2GNVF4/yQR
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1236 HZgWenWhyp98pSb.exe 4048 CTS.exe 2756 HZgWenWhyp98pSb.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 HZgWenWhyp98pSb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe Token: SeDebugPrivilege 4048 CTS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1236 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe 91 PID 4796 wrote to memory of 1236 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe 91 PID 4796 wrote to memory of 1236 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe 91 PID 4796 wrote to memory of 4048 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe 92 PID 4796 wrote to memory of 4048 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe 92 PID 4796 wrote to memory of 4048 4796 2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe 92 PID 1236 wrote to memory of 2756 1236 HZgWenWhyp98pSb.exe 93 PID 1236 wrote to memory of 2756 1236 HZgWenWhyp98pSb.exe 93 PID 1236 wrote to memory of 2756 1236 HZgWenWhyp98pSb.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_07deeb9cb6c401f8cc1d621166a03db5_bkransomware.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\HZgWenWhyp98pSb.exeC:\Users\Admin\AppData\Local\Temp\HZgWenWhyp98pSb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\Temp\{A740607D-C2B9-481E-B6F1-42D50B32341B}\.cr\HZgWenWhyp98pSb.exe"C:\Windows\Temp\{A740607D-C2B9-481E-B6F1-42D50B32341B}\.cr\HZgWenWhyp98pSb.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\HZgWenWhyp98pSb.exe" -burn.filehandle.attached=536 -burn.filehandle.self=5323⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2756
-
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789KB
MD5c87ba9c50d92e8c8dc814ab4706df1b3
SHA132736261da8f3babc56bb3b8ad82cda2f711e1bb
SHA256b7c3ce58935d83daa25730c922136c053b1f39cd85531b22d4866d81a3398a94
SHA51217187fe50d6101493d32dc542be7228c758885f17265194dba4f1b68c1f2aa00a1fcade89ccf14a20b0f9d73059b4bca63ce5d0d2885c49cea4e5b119aa81bb7
-
Filesize
13.2MB
MD5ca8c521c30f57c0c199d526b9a23fc4a
SHA1663399541a7d3bb1b5ea0e57a00c024e50d8506c
SHA2568ae59d82845159db3a70763f5cb1571e45ebf6a1adfecc47574ba17b019483a0
SHA51228cf976fa51e4c7abb57fd8fcde6381f1e140407924ef265fde6e59546fb6fdeb803f388a5d1e9e74fb80d47ce5fd9f275aaf41258a09002fba27c2cbbc2df4d
-
Filesize
71KB
MD566df4ffab62e674af2e75b163563fc0b
SHA1dec8a197312e41eeb3cfef01cb2a443f0205cd6e
SHA256075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163
SHA5121588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25
-
Filesize
634KB
MD52389d29f633df11642dff1bf5f21eb35
SHA1ce85460fd7cde25528142f4cdca4e6013bb4b1e8
SHA256ab91fbaab09a94839ba839275338ac42fe2661781d371e517f9b2e4866e2cc55
SHA51259d607112566d13d15a8de8e18be204e8bf0d2010310ebc9c8589ceb42fb8fce7800a6e58f30ffb92d4c1b3e0d17c1a2076a478de753e5334971465c52f8eeed
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2