Analysis

  • max time kernel
    134s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 19:32

General

  • Target

    2024-05-03_94a0f3f3f540884ac684d34da4ea4937_bkransomware.exe

  • Size

    71KB

  • MD5

    94a0f3f3f540884ac684d34da4ea4937

  • SHA1

    8536ce95167a027aa62780318cf393b5038c276b

  • SHA256

    a4191f6414d843d81605a0612da6e2734021914f89bc7d51c9a15597e9d9139d

  • SHA512

    0fd69b89e6d146c6e3ae460485f3eadcc962a0687091c4b34ae4a8fd1858bdf156c9dc62eac1885ac9f855fed12285bc2ae61f23a991f4866b143f2cb38b0381

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazT5:ZRpAyazIliazT5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_94a0f3f3f540884ac684d34da4ea4937_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_94a0f3f3f540884ac684d34da4ea4937_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    5ad883d04306f1dc2f34117e06cad3b3

    SHA1

    4fff81c822561c94bd488781979eaf2f95ce4472

    SHA256

    14cadc0d1bcc1c549fb79ac41937f1a7ca701ef8b2aec3f01f552535d6fe424d

    SHA512

    882b84c5b6c1234c23ddb3ccaf0d0b30d42e8c26d24a540b15e462a5b1b0d6ea1dc3053df35a632ee1c1e929c22b0ba0cbfc5e6a5954951a4470b8908740772e

  • C:\Users\Admin\AppData\Local\Temp\8DjJ6b1hcpzor8H.exe

    Filesize

    71KB

    MD5

    905e919d503f95fab4d076819ec79dc4

    SHA1

    8e9bcb179bb63f31908a3bfc9ffaffd06888dc6d

    SHA256

    5283dded2aed99de453882ae7ac4fda77bae6dda6597fef97225d66990c6cb46

    SHA512

    186e990d1fb08bbabd70196122fa21ee9de700132d9cec7512fb9a216850a0b2802d6a19ef9425197d636ecf6426db9b2bae972d4faabde09406c001a9293e0d

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432