Analysis

  • max time kernel
    132s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 14:31

General

  • Target

    2024-05-15_a97d09a867eddf3885cc5f689436076e_bkransomware.exe

  • Size

    71KB

  • MD5

    a97d09a867eddf3885cc5f689436076e

  • SHA1

    ce0b1e9f94908829bbf2e7298996e4ac3574aa9e

  • SHA256

    741238aeb16109d98c8fce04d8d69200eb69d2929feb6a40f40b025d2fbe8174

  • SHA512

    527967b60febd2c05b466e558c9bbf366f705fba6768d834b6b5df9774805fa5f646af242b9725ac87c8a68d0e093c2b846ad5724c70d26de7132ab8dd828919

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTq:ZRpAyazIliazTq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-15_a97d09a867eddf3885cc5f689436076e_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-15_a97d09a867eddf3885cc5f689436076e_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    34d4a889c97bd5169512ee5a68be6ccb

    SHA1

    e65830d6ebc34d60153bb948fadb22fd4ac90857

    SHA256

    7e3f412182baff0bd05885f47745468cffef8841257185d874954a252024b0e9

    SHA512

    a8fcb46c9437fa01d01c3887ee85cd54b2fb7f54df6b79b53b4bce5a3c44e8cdb89e1d7318eb75046ce2c7247d5d8f05f30193b249741144cdc6a3ddc0a350b3

  • C:\Users\Admin\AppData\Local\Temp\kAf5r6gRpwx30y8.exe

    Filesize

    71KB

    MD5

    8c5946ea541d5e2eb9bc48bc1875b818

    SHA1

    30995b50638a096b75808d9f20aa289c5d41d76b

    SHA256

    cf568e04c3eaa67785d471c4e4e050ae552ad825e1be91537df5992d264bf754

    SHA512

    4d0a3d3d1b8a1b2b23e1fa9af69f892e7dc12213122190f310ac8ebb45d61ed207b9758ba6115bb7c0600f58ba87707e3dc880e0873e18fe4ff8f9487dfc7a9c

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432