Analysis

  • max time kernel
    135s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 08:01

General

  • Target

    2024-05-16_4f11241575f21e56358a9a2924041406_bkransomware.exe

  • Size

    71KB

  • MD5

    4f11241575f21e56358a9a2924041406

  • SHA1

    2d9db29b3738f5dedd5bb8e485c82c7938086963

  • SHA256

    5c29c1f0f804397d01bb559f923df7ec349aee0a8b36d52ca06f7276603abb86

  • SHA512

    bd6161d5ffae69aa2d8167b8f623c480734ce89cc7930b745f2a2878cd4236194772e7e1eb1deb827ffd41d3630f35ea34854aacce3996f5ec3c0cbdeb6d652c

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTd:ZRpAyazIliazTd

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_4f11241575f21e56358a9a2924041406_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_4f11241575f21e56358a9a2924041406_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2936

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          392KB

          MD5

          4324703c2db4bf25195153d584df6b73

          SHA1

          81be42cc8010d26582665053809cd55215b31b11

          SHA256

          469744612a9ea9b6a83eb0dc59b99f041aba5e224be549b0785887ce6fa2c2e5

          SHA512

          bcfb94db3220141de7a52aa1fcc1b79e67528225777b08479e6b73df1ad99da638ac75afac5c1328f63f981cbba6d64740df0f621b6d6b719193ef97dac8591d

        • C:\Users\Admin\AppData\Local\Temp\QYL6zuy5VXWu2C6.exe

          Filesize

          71KB

          MD5

          bd40e50c7686b9ef9352e7447cdb5263

          SHA1

          b9f60ac98c0d20044ed39ad4b5138f2cd88df0bc

          SHA256

          4d842a3625d4631cc0b5b160d5352214e3c287e5e331d19bb40042bbc2228722

          SHA512

          0b1a5a54783ba4d1bb07850868a195e6f2980eebc36e878a66a6082b7ba96600738e702596eea75a1ef95d817ab6209a5ee825b025fb3049b96003b8cb8f9210

        • C:\Windows\CTS.exe

          Filesize

          71KB

          MD5

          f9d4ab0a726adc9b5e4b7d7b724912f1

          SHA1

          3d42ca2098475924f70ee4a831c4f003b4682328

          SHA256

          b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

          SHA512

          22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432