Analysis

  • max time kernel
    136s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 00:29

General

  • Target

    2024-04-30_39d8d950440b31a19f4c0403d9d58437_bkransomware.exe

  • Size

    71KB

  • MD5

    39d8d950440b31a19f4c0403d9d58437

  • SHA1

    664570a69039767f3daba86a780ad12dea0008dc

  • SHA256

    a0918bf70d950a457d683f3dd3eb9b1c52f5e5bf6ea2e7a08fbc017cc6e0a70e

  • SHA512

    e06255e867708c98708440850105554c97fcd3cd717eb6e14ed08d5e79cc37d4596e616d14f2e2e06a18aa089f9ba3efeea188a0d45f35e31ce5972e4bd9c915

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTR:ZhpAyazIlyazTR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_39d8d950440b31a19f4c0403d9d58437_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_39d8d950440b31a19f4c0403d9d58437_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    408a60427e5ebe3f473594663e2b3c98

    SHA1

    af060174c9415a35bce92da6ef86dc488ee99b49

    SHA256

    ac2c2c3f3680d9da08946619312b6dfc15f79da34301c3ae31bf46556bb44288

    SHA512

    60ed441a4ae3097ea9c5492c3fddf4503ac61df428e5bf49464142d7083e17f650fbdf9616f95ae069574978de26ffba56d3cd99e507538c0fca447301dfe73a

  • C:\Users\Admin\AppData\Local\Temp\3c9DPEm1iGBCGRu.exe

    Filesize

    71KB

    MD5

    fcf0d80fcb0bfbf0a189605fb73e21d9

    SHA1

    5a4c730e18bd7144d09a7b05738bdf1b23bc6388

    SHA256

    ab8724cfb5d1eeb34b7aeee3f2ea558da15a6bd5cc34a19e8a2172932843d0a7

    SHA512

    9580687a70f568383a3ed94d766353cf807254f2fdb61f331c458b7d84ba607f3a98c0f280891aec26ce16dc1451c8d7c395687b73b989bafb32eb289dd57be0

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25