Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 19:35

General

  • Target

    2024-04-28_ddceec2787c1805a8ce892ec7d22aee4_bkransomware.exe

  • Size

    71KB

  • MD5

    ddceec2787c1805a8ce892ec7d22aee4

  • SHA1

    7eb5951e28229e2f599f4e74184f2211056ff370

  • SHA256

    9d90ce5e4bfcfa4801f3edb2f40f081ad4da2329359fed1dcbd4ffc51507d3a9

  • SHA512

    1c6302b98168c0a1eda0343c7d51451b8f438454e3b066f0931ad337ab21271190dc3ad10027e2548dd13549fd760f01ed2424276c45982b00f34f8d898aa5ad

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTG:ZhpAyazIlyazTG

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_ddceec2787c1805a8ce892ec7d22aee4_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_ddceec2787c1805a8ce892ec7d22aee4_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    789KB

    MD5

    cbfe33559eaddb8b6c36106b04c098cc

    SHA1

    8a0bad59fbc29683fb0d0a65c34dd3bdeca786e4

    SHA256

    5ee3340b6cdfb9c16fb910df367538208053aede7bed8d85f9c6ac3c5e33337b

    SHA512

    6c649665202b1fcd8536bedff28d869260267c813250f0579dddae29122edf84a96e91b6f97da7a81795f1d46b26da84fc47441047369dc3742a6ef31615478e

  • C:\Users\Admin\AppData\Local\Temp\56pbXuaZIFvq2t3.exe

    Filesize

    71KB

    MD5

    1a29473264541594e117bfe47cc2a5bd

    SHA1

    0272bf35f3fa68061204337e686e7f97ca38fe01

    SHA256

    0db15133a81dd39c9a9d169c8fee436940b5b71395c85fb8ff89aed9c4d31cf2

    SHA512

    a4ae9f5feb33567f30c676019124ed78f6456f2250b21dda84629985193957a3bcfd19e3e9827337b24f3627cd1cfc2bcc32009718446d0f9dac720087ed5f8a

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25