Analysis

  • max time kernel
    141s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 01:47

General

  • Target

    2024-04-28_f51d639c5486aa1f8e3efc5687dfa1e7_bkransomware.exe

  • Size

    71KB

  • MD5

    f51d639c5486aa1f8e3efc5687dfa1e7

  • SHA1

    5bd3a24b3adbba0a9020d71fa4470d230348c72e

  • SHA256

    634104ece30c02e7c436b68fc397295569ef69b9e8c76d353b000181423bb7bf

  • SHA512

    32f92021bfe82f421bfed0ade5d5a7bc2e6f2626ae4d7959ab28e0da8d9ef8aea7948bdb0badd87a9ab2e59aa8c1340ab09dc050d7cd586ad2816b11520a6645

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTFL:ZRpAyazIliazTFL

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_f51d639c5486aa1f8e3efc5687dfa1e7_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_f51d639c5486aa1f8e3efc5687dfa1e7_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1868
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3592 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

      Filesize

      789KB

      MD5

      a28989bdc1395410e56d12a3f9ba28aa

      SHA1

      b3530a452c9ee6da99824038da8a20ae3ee1c29a

      SHA256

      dabfe818b52d2dfe0e069a793ed69428811c6173bf323c99ea5b34d06c80ecfc

      SHA512

      62da3975056a9f4beb991d7fd1d7a963f0921cebf2eb21248b3e916f47891e393c1dd01c28bfa4c9a75d2d90dc98342f28e7505bba2d1728d5d0faa9f9ec087b

    • C:\Users\Admin\AppData\Local\Temp\Lh4g3VEeSawlAIh.exe

      Filesize

      71KB

      MD5

      ac6d8dfdc339416af54171f633855028

      SHA1

      60db975f90f2b93a0100570f96fbb5f12613c9b7

      SHA256

      7a6f46f2e221acb10dbf6807c8bd0bf9b17d78a12064662b027fc91daac534df

      SHA512

      566faa3c38f5ed224fcf7ef66221210adfaca0906a881851b9f1495c7900884a919db521d13d8106bae47130ee20b04afaa83b29555d1c8c2238d5ced9fe82eb

    • C:\Windows\CTS.exe

      Filesize

      71KB

      MD5

      f9d4ab0a726adc9b5e4b7d7b724912f1

      SHA1

      3d42ca2098475924f70ee4a831c4f003b4682328

      SHA256

      b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

      SHA512

      22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432