Analysis

  • max time kernel
    132s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 07:53

General

  • Target

    2024-05-23_5f655bdaada31d9fc11f5da963bb6a31_bkransomware.exe

  • Size

    71KB

  • MD5

    5f655bdaada31d9fc11f5da963bb6a31

  • SHA1

    6a9ccec5f385d92fefca9890e166f7340c2c8e80

  • SHA256

    c4c77be8ff680ad6f110e7a7f6abafcb0712b391e88db1c4b0129520546255a1

  • SHA512

    82bcfb501828d7ce05ab811b3fa9c5d38aa960e4b699ae66d7129466d1adbe6d397ebae8120cf6ed3e53b02ceac213508dfb6a083e62b5ce41558f3b186cb3e2

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTs:ZRpAyazIliazTs

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_5f655bdaada31d9fc11f5da963bb6a31_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_5f655bdaada31d9fc11f5da963bb6a31_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml
    Filesize

    392KB

    MD5

    66dc4f36cba600a45439a2453066cc94

    SHA1

    364ee260f2734d2eb21e6e4442cec0237eed50be

    SHA256

    43e1b6236278a4c82e80d4111581b18bbd647af2232130539e48426cb3100c92

    SHA512

    66235c00cfa5533a911432e926d612166dcf592ba7cfa919b7bf0b57c3f12121d2391cb6a9070b2c94de749ee53ec07212c5ac3f44ec0a5c2a9da058b6738c7e

  • C:\Users\Admin\AppData\Local\Temp\xzLD9lCDf3VApMX.exe
    Filesize

    71KB

    MD5

    096bdb2e41bc2791a630e1f5b78f44b3

    SHA1

    58b3084a695e03de25e802c872de4d32886b5bbc

    SHA256

    17d89deae505d512c1f9653bc4c6922910b8e0dad8e2b7114c94bd99b0ddd141

    SHA512

    fa94f01d0b27e11ff1fdadf9978b4892b3005fb8260c82a5a7b00030f97d3333f0f64347a782f15c2fc4947a203c94eae24bea1f6926d5394fcc0d083b8aba9f

  • C:\Windows\CTS.exe
    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432