Analysis

  • max time kernel
    133s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 23:27

General

  • Target

    2024-05-03_5aa805a750a98d81b7430dd758d6205c_bkransomware.exe

  • Size

    108KB

  • MD5

    5aa805a750a98d81b7430dd758d6205c

  • SHA1

    dca9a0fb5f19b1267a9a84c5c9ee60346de4b6bb

  • SHA256

    0cefbc48321311c0f1b393371365f21ecbc335665d97da582fb480e975836110

  • SHA512

    50f09e7768df9167ba82309af3676a6f2291f01feb17c4b32c808bcd1a7b284ff687c41bf166a81d378aa632acff2850f46ef54c12d72b705f5601862dc4015b

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTAJdYCg0vBtA7E4b7EztosZ1fqg:ZhpAyazIlyazTAJvL5tmEltBfN

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_5aa805a750a98d81b7430dd758d6205c_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_5aa805a750a98d81b7430dd758d6205c_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\bFXdqZLDKX2UPdM.exe
      C:\Users\Admin\AppData\Local\Temp\bFXdqZLDKX2UPdM.exe
      2⤵
      • Executes dropped EXE
      PID:3012
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    7cc34aa3807d403716f57abcda71a300

    SHA1

    6e3980461c5e6adc82eefcc69ad53df9709ffaa2

    SHA256

    f1fdc3da57ef8b63da45fedef707484afdd450346b5e126071a5b994d706a60c

    SHA512

    26a22d814a465be132b79ba13408f6fe2241be8b30a4894900c1812cbfe2e9c0c43a131d4ad7510734117ef91fbd5c3865e78293a353603e01549bc0d537a696

  • C:\Users\Admin\AppData\Local\Temp\bFXdqZLDKX2UPdM.exe

    Filesize

    37KB

    MD5

    371627fd939bb54ed26f473ca54e718f

    SHA1

    3a6910295ae9d1fe388b7572736b8bdfc6e0d111

    SHA256

    b5481e424246a174456add0132427df3a7cd4105f5769835cdf597966c7c0b61

    SHA512

    ff7ea5ae445089ffa808c97e23c620313dd267994b343176c0cb9f8098aace1d12d9212b96611fdf97c974ef94f866b817aed9c0e5f4f195234e7d8d4ec3f8cd

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25

  • memory/3012-12-0x00007FFE2B313000-0x00007FFE2B315000-memory.dmp

    Filesize

    8KB

  • memory/3012-11-0x0000000000210000-0x000000000021E000-memory.dmp

    Filesize

    56KB

  • memory/3012-27-0x00007FFE2B310000-0x00007FFE2BDD1000-memory.dmp

    Filesize

    10.8MB

  • memory/3012-32-0x00007FFE2B310000-0x00007FFE2BDD1000-memory.dmp

    Filesize

    10.8MB