Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 11:42

General

  • Target

    2024-06-07_f7b6f03a6456642372ba5162fafd96cf_bkransomware.exe

  • Size

    135KB

  • MD5

    f7b6f03a6456642372ba5162fafd96cf

  • SHA1

    63a21668dd16e8e27c84f6a54afffa64c98ea30a

  • SHA256

    6fa30473b6e820704f2e50ab92bc081da5688c6a4cd7a1dfdad08921f4851efa

  • SHA512

    17dc74a5d8561a4b2e2c81b5d3953b072c9eb8512e02e2b9fe765d5cc74ec27ebf765c12c2f6920c30fe90e0ca32af4f8ef0c4f211e9524f819fd6a81eb349e5

  • SSDEEP

    3072:ZRpAyazIliazTEmxUwkV/LE/QlT/8MmcY8/+G:xZ8azQykVzw2Trmcd/J

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-07_f7b6f03a6456642372ba5162fafd96cf_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-07_f7b6f03a6456642372ba5162fafd96cf_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\Yho3aCpUrEgoy06.exe
      C:\Users\Admin\AppData\Local\Temp\Yho3aCpUrEgoy06.exe
      2⤵
      • Executes dropped EXE
      PID:1132
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          394KB

          MD5

          0b6c656280dfc796c4bd8334a45aebf5

          SHA1

          e6299431d05ed2ba93e0262f6c97a56b37b8f2ac

          SHA256

          c356685899be0f2825c2b2e0b1767267a68e4e7e06c6369290be2b43ce8d6e6f

          SHA512

          f383dff4b15dcf522db79ec4de375b5c7376bdc71e62ede239016c5f48772b44155fb95d49a1be3447453a2f9fda9c90360c1f7e5a4758083a21dcaa1938d19a

        • C:\Users\Admin\AppData\Local\Temp\Yho3aCpUrEgoy06.exe

          Filesize

          64KB

          MD5

          e97c622b03fb2a2598bf019fbbe29f2c

          SHA1

          32698bd1d3a0ff6cf441770d1b2b816285068d19

          SHA256

          5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

          SHA512

          db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

        • C:\Windows\CTS.exe

          Filesize

          71KB

          MD5

          f9d4ab0a726adc9b5e4b7d7b724912f1

          SHA1

          3d42ca2098475924f70ee4a831c4f003b4682328

          SHA256

          b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

          SHA512

          22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432