Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 23:35

General

  • Target

    2024-05-31_a9be46799af0e9350dee5dfe330d7f47_bkransomware.exe

  • Size

    71KB

  • MD5

    a9be46799af0e9350dee5dfe330d7f47

  • SHA1

    acac10e2aaf02fedd3169472029548e2af5e126f

  • SHA256

    1e602e59e34f516cbba25d11dc2e706a742780ca8ec64094b3f8ee18b8a60a88

  • SHA512

    60daf9ea7d927adfb2fb257158b78debb407c3707f2e006b7b4d81c6e00583aafe0c977d76d0f430d28ca26971bd1d933d455ffa4bf0ecd09a08ce0a06cebb1d

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTV:ZRpAyazIliazTV

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-31_a9be46799af0e9350dee5dfe330d7f47_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-31_a9be46799af0e9350dee5dfe330d7f47_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    789KB

    MD5

    9f2ff7ac7245ae28d8130ba8fc886400

    SHA1

    4fb358ec3c58f28f09129c51b3bdfee8dc3c56ac

    SHA256

    b1cd45b8a06ced3814137029a13e537bdab89976697de58c782d36210fed7c30

    SHA512

    0a3782e04304b07001d08e3f9e4603c1f5ec6ec1ac7583a535d80ce8154e3627fe1ccc3a9f24aec34c5877bebb20475389aaa6e0da4d9bc36b56cb53a8b33c21

  • C:\Users\Admin\AppData\Local\Temp\BOl7GlDnAc3QdEb.exe

    Filesize

    71KB

    MD5

    453a45acbdd1ca9ac21162dd69133f40

    SHA1

    564f9adcab783970c3add6b59d48c648ae039ac1

    SHA256

    bf6eac5f71b6978bc03b8a7d0918bbc3651f13fc2731d8d7a05b9852fa56e236

    SHA512

    21071ab8493687c52db3ea736620dc584f0b8cde060688a45090b3ace590f0b13398b69aed1150cbb57a582a42b9a454e6a8b4b772182b411f7e4f544281285d

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432