Analysis

  • max time kernel
    67s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 14:04

General

  • Target

    2024-04-26_45f449a0f45ff40fecc07862dc7333e3_bkransomware.exe

  • Size

    71KB

  • MD5

    45f449a0f45ff40fecc07862dc7333e3

  • SHA1

    8f59dae689651d9c4499b2fa4ab5f3e1b231030f

  • SHA256

    54b8d08a2982a3f7a62ea17d79deeed283391f26e60d8733f7483a502a904f40

  • SHA512

    895081ca453a27efdada508cea2ef4b3de51044e718a0fb10e33bc3780cc2314714f1b92a6209fb65216b41aabfbdabd366554b6e505e16049ed56e1afa72333

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTXc:ZhpAyazIlyazTXc

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_45f449a0f45ff40fecc07862dc7333e3_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_45f449a0f45ff40fecc07862dc7333e3_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:5084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          395KB

          MD5

          5112a48b55d40cbace50818ab171df14

          SHA1

          53fbd5dccd7a60297e0200917e5419c33a3cc5a4

          SHA256

          fefba746bc4fe43c1ccbc6a8234fe235ba529bbeeee5c2499b51e070826bd928

          SHA512

          959bf97633421a3f62f96d9c55f8a9d1d2c94e28567f1d7ad6b260ef633a114b20e05a4e10234371455c8ce61ccf6ed7c9cd22a9c050b76a649bece6282baff2

        • C:\Users\Admin\AppData\Local\Temp\vdrq2fgdOXAcFHu.exe

          Filesize

          71KB

          MD5

          423316a30cf0206ce047cc7a214be72f

          SHA1

          033134b5356b655d95c43199e18fa616bbdc627b

          SHA256

          46169018809f28a82f0e1a799c9c76b47196bcd3a32ce0614cbe49c7a6124a44

          SHA512

          21a4eae8b9097801912f642517be182164d47113c7d39814d82579339e6d2454fdf1387f21174357e4cd299adda560e91c6ef578bee8177460bd998d96cb4340

        • C:\Windows\CTS.exe

          Filesize

          71KB

          MD5

          66df4ffab62e674af2e75b163563fc0b

          SHA1

          dec8a197312e41eeb3cfef01cb2a443f0205cd6e

          SHA256

          075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

          SHA512

          1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25