Analysis

  • max time kernel
    67s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 23:23

General

  • Target

    2024-04-28_54b817024a4828af6b4dfa37213b62c3_bkransomware.exe

  • Size

    71KB

  • MD5

    54b817024a4828af6b4dfa37213b62c3

  • SHA1

    8f610eb699e047f9d68ef0cd1ce349c296f3ad43

  • SHA256

    d1ea8e410b417935ed16a97430ed018d705c113f7a9e192be32b04330c65c2f2

  • SHA512

    d7ddef8eda0fbd7c61f57268758222320fea6741142ff09173e959ccb20e415b25b2f61d159db2d1b125a0680ffebbc0ee742a2cf15a8ed2d9f1e65650cbce48

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTBIu:ZRpAyazIliazTOu

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_54b817024a4828af6b4dfa37213b62c3_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_54b817024a4828af6b4dfa37213b62c3_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    e57217c80ced94ee0dffc5df2a92c84e

    SHA1

    12e6e07c2cf1b200aafa510851e5cbf96886f3e6

    SHA256

    4c651ebf187b8ef35ccc609a252ddf8ccf5e89d29e3327ae9e03033df7c782ee

    SHA512

    11bb0212f113af1cc30294ee9d2d3a9a503518332771f530725e6ea343ec2abc27eeea7b9b764dac6d36e048e13874adb5c316659e88d0489c3e2aa72a77f2e3

  • C:\Users\Admin\AppData\Local\Temp\NzFGUk8ejdO09Ue.exe

    Filesize

    71KB

    MD5

    c96d865a5d1810852e671ae5d1460fe8

    SHA1

    c64245624a6547a3035b8f7ff0f9757306960b2b

    SHA256

    0256162a35bcf620ac65e307a71c833588cd4eb5aad4a08d8b52aaade3741f60

    SHA512

    51069e2c448b8455a9e321698a50e245f4625fbafeaa6e43fdd06ac28e577a6232d0769a326e7ad27da7bce5d19ce0b614a83cb4adfa1f445df83d695ed31071

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432