Analysis

  • max time kernel
    135s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 14:46

General

  • Target

    2024-05-24_2a63f576879a9738b176b5036b73c2a3_bkransomware.exe

  • Size

    71KB

  • MD5

    2a63f576879a9738b176b5036b73c2a3

  • SHA1

    4446063948b99f1e43407707b9989c8b2ae021fc

  • SHA256

    ba415b4ebcb0b5a592c2ecbbf95765e54c32fa20b6617595adb294e3b40a6324

  • SHA512

    fde8cc2db4bdd4df7e13331dbb603fb4aca5760d3684ca51baa1924053980b991dd17529685d28afcd3def2fbcc2577ca695e76eaddcd06bdf8309a6ab439d21

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazT1:ZRpAyazIliazT1

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_2a63f576879a9738b176b5036b73c2a3_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_2a63f576879a9738b176b5036b73c2a3_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml
    Filesize

    789KB

    MD5

    94fc983527c1f67eadf63485ca0005c6

    SHA1

    f4ea53b0ee270a5767d9b5e70517b3241c533a17

    SHA256

    4f6bc97d5e74e4257828655455909c64e2c2dabf73bb713a1abb1e5bec8bfc1f

    SHA512

    2d59b7cae4f98c2dd6b7fd18705a439d5ce12a4abb0a10d6116e46d86095873cd03fe19c04d30c3a695c83745bc72cff2c90a83bfe7d0885791e5c072511aae0

  • C:\Users\Admin\AppData\Local\Temp\gMgTpms4KHoEJ1Y.exe
    Filesize

    71KB

    MD5

    3e0c0479c2e405f34b41ab336a7bcced

    SHA1

    d012d7f9f0431dfc9c7c86ca573ac7e5a6624364

    SHA256

    3f0ea4e2ab4cd858cdc1921c4bc1e9be5db2d3fb3bf6c07465e072c115eba9b8

    SHA512

    5837a067badb3cdb170d7f3930abf3f05092b245eaf9d7df2dab381c83a985a6745e8424ef8052d9d278610bd9779e31d6460e15600d42b5a10d6be27384b563

  • C:\Windows\CTS.exe
    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432