Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:52

General

  • Target

    2024-05-22_a6986119a8ce3f27239a777542273d8c_bkransomware.exe

  • Size

    71KB

  • MD5

    a6986119a8ce3f27239a777542273d8c

  • SHA1

    a2651fce15380f7a14524ba6439fe5fb66ef69f8

  • SHA256

    efe34fec097c9d0abd6586238e87c81fe5c858432f6cfc3b3f4d7d2c497aede1

  • SHA512

    470ed3f825a751aa76dc49a1d1e3002c4514ec601e55e3548511adb14c0f8739210cb7fad73cbd6922e301a41e10605fa10805ff2cccf5122560d4c27caeae4d

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazT1:ZRpAyazIliazT1

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_a6986119a8ce3f27239a777542273d8c_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_a6986119a8ce3f27239a777542273d8c_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    6fcf6e7b1b5ef8fd8c4f4aa2dafb083a

    SHA1

    86a54981b9821090c86873326cb5b71b9108d1db

    SHA256

    db66842db1e8e2bbbedca63f6816fed84199666ea36e54be691d8df2e700264f

    SHA512

    b7bb37ccf11d2e82af817f7260b815392839a4a4a3bc465c1f3033aa089ae3210505ad79d754a378a95f7236ad1fdb8fab0788ea35164c47bd73179c86e15b04

  • C:\Users\Admin\AppData\Local\Temp\eewjzXHURKMgbNh.exe

    Filesize

    71KB

    MD5

    13467ee87c41d107de3b0e5502df0cf2

    SHA1

    6f6dd60074a9729c6b2acacf5ef05efdfecbf04b

    SHA256

    afa969bd0cdfa0b5e78819968fe2f8028f3009da3050fefe2e440c5c3f3566b9

    SHA512

    23d9afb785f126c5f8a9ad88a637a70c6a7880087677bef35d5fd96bc43d1817114b4740d1b8e4f150bf7d67b1a69a648c7837f633b1aa0129da285a7745e1d8

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432