Analysis

  • max time kernel
    134s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 19:37

General

  • Target

    2024-05-23_c2f878ac348a0fd1778a6a17cef809c3_bkransomware.exe

  • Size

    71KB

  • MD5

    c2f878ac348a0fd1778a6a17cef809c3

  • SHA1

    a4de2e11ecd9bd9ca2e78334b8fffa7039780cb0

  • SHA256

    705a1f47993b93cf4c84e20e6912333da02c98f0df3bc6c33e15736171fc3bfe

  • SHA512

    8269eea8539b4f0f28408a76322002e182a005e95799351f4ad4b87ccf0535e3e4e032fbf9dd11c3d472317e3c0c6a4e9e0d20b2e1809b1b02784d1fec497f0c

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTu/:ZhpAyazIlyazT+

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_c2f878ac348a0fd1778a6a17cef809c3_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_c2f878ac348a0fd1778a6a17cef809c3_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    394KB

    MD5

    ad6d292eaebf79f43f8640e602b10531

    SHA1

    feabb700571716ed4854ddbf04efa7d8bb2992b9

    SHA256

    76e4040fc88c9495e2b19556fe424b67cb79424d05d20f2633ccb930709ae0fc

    SHA512

    48f537395d0692003dac44ce9de35bac36d47fa2d179491d74fd70491261fcbaa5585f2b8fb4418e9c770c4a9d53fa035c937daed5c48f03eaa2f2b538043685

  • C:\Users\Admin\AppData\Local\Temp\RVUxrxjeEYM1QiK.exe

    Filesize

    71KB

    MD5

    581cb099981a8da3bd10082c355d040f

    SHA1

    f5bfdb52c8451148c87d112e4617fe72c5c82c49

    SHA256

    1bbb1f89180925348cc0f5f96ed5b2badb056e7ef55300564afcda0c5e418d24

    SHA512

    224ac42a8c03f51cafada0d27789a8277891ab6729f3b5b1c2da7a478541ad6029083c5dbdbd9878018e3ecd41684898da88dd9e55cf8905dc3ab2e449d737fa

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25