Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 15:35

General

  • Target

    2024-05-05_8ac34719cb003de2defb7e044fc097e0_bkransomware.exe

  • Size

    71KB

  • MD5

    8ac34719cb003de2defb7e044fc097e0

  • SHA1

    beded5e6f4b094fa778f01e3429645f0d1aa236c

  • SHA256

    54a4ea1994f12418819fe0fb38c6e63065df677ae34caca945153de5a2b3a594

  • SHA512

    63359b6df19b39ea059dc2ddbbb769d12b37cc3240f597f92e703baa6d9f60bf59f3f5d425385ef7efeb5e31cf869ac9f60385cbd5842c36eaec2b3c34d3dd2b

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTE:ZRpAyazIliazTE

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_8ac34719cb003de2defb7e044fc097e0_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_8ac34719cb003de2defb7e044fc097e0_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    394KB

    MD5

    e4d4bb7480ee9cce446639f1f03359a9

    SHA1

    203a8fed4b6bdfdf3efcce240e3a2eb41e71fa72

    SHA256

    cadf916e5fd4fcba40191b858032f2b4bb4562b78add3b846c1d3d20d3401bd5

    SHA512

    8a15e90daf947e046be6e70deaa86b4b98bfc2327e6c65a6e663f7d7fea650a7f4ec98fb32b8a33380e3c5b3199f51c66c4c9f5e070c68980fe38fdd109f9634

  • C:\Users\Admin\AppData\Local\Temp\B1rPJ2FcM9xv5nQ.exe

    Filesize

    71KB

    MD5

    47c2d97d1bd4764341a1fc0ca3df5a14

    SHA1

    300aa772f4c5fc31da508209a13c58a985fd0758

    SHA256

    65644519c47bf78fa5a4a83345d73898b4483abb80bb7f344f1f30f59027335f

    SHA512

    3459f97af8381477f07c3eeccd960647ee36f59c4cced2256936aff382409dd7c529fdf7170e00180f5ff8f6366af6f89a15a36239dad360990cfb9352665521

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432