Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 22:30

General

  • Target

    2024-06-11_757ca758f3b8b7469033dc9f1cdb9a27_bkransomware.exe

  • Size

    71KB

  • MD5

    757ca758f3b8b7469033dc9f1cdb9a27

  • SHA1

    0b1a37593337658abd6017319746d1f7fda21628

  • SHA256

    6a91fe478db119300508b95a775d460b73785e4dbd6b048a23992ec3ac88449f

  • SHA512

    fcd72c149578d5d5764d20de60f3f5ea7feeac4f5cf58c8a0e7d7136437e9536d2151118e97e540a5600a2376a1a743ab5bc4a12ab016f19fb9ce1c7d6df0d12

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTU:ZhpAyazIlyazTU

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-11_757ca758f3b8b7469033dc9f1cdb9a27_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-11_757ca758f3b8b7469033dc9f1cdb9a27_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    392KB

    MD5

    0a0ebf38bfd2b130cb1ffa0ee9c7db46

    SHA1

    6c9aed13e6fa232f4789f3aabc2484163e44f4e1

    SHA256

    6720e52e1c4a8886ff5d4d774645f477d7e397c76131798b2634dba16b89f186

    SHA512

    0849d79c475c2df8e21144677f8c30a5408821484ac627ebfcf69314282fadbf4511f443bc9c4952ec3a21c3aa2b3e2b83d72df2a5b80b6ad797677f3f19d5e2

  • C:\Users\Admin\AppData\Local\Temp\YszcogeK6D1ScDH.exe

    Filesize

    71KB

    MD5

    ead990a781a020ffaea58834ec71dc6e

    SHA1

    28fed5b9c4d9ab358a82a1dc33ebe4a07815217a

    SHA256

    92cb3c235ec16724a751d26e180d8450de5c79ab41ab45bd49cbabc299f6b64b

    SHA512

    f1d1a054c92fb7bced8c29396f16eb7751e674bd1120508e8cee55431118936d584474b3735ed7b67bd4d8e4bba12f7916aeeee6e3f52c87b5ded5d297f0d96e

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25