Analysis

  • max time kernel
    41s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 02:31

General

  • Target

    2024-07-05_7d17c2148c09a8d9e88fffcbb810329a_bkransomware.exe

  • Size

    71KB

  • MD5

    7d17c2148c09a8d9e88fffcbb810329a

  • SHA1

    cc1feb0bb0ea3a1a23a3ae3085fcea2e2af43c09

  • SHA256

    656baa2cb933e9ef4ddf10eeea8612cb59d422ea4192e64be5cf649924a064fb

  • SHA512

    bf8dce5531e652c08171b041489601a77ef236f6c7c323d52773298c414665a3a37252b896c70775c35986499499fe40f400e0045c8c2425be6246d502df5e27

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazT9:ZRpAyazIliazT9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-05_7d17c2148c09a8d9e88fffcbb810329a_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-05_7d17c2148c09a8d9e88fffcbb810329a_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    394KB

    MD5

    5a8a1cec0fc3a684f3712852eb53039d

    SHA1

    8914bb76042012f23da79fea3545b354993a9a5b

    SHA256

    70a8524ef82f18002217d4697a4fed8dddbc5f8746671594685cc38bd6f724de

    SHA512

    e6976eeea562e5f0144adcf6a16692521d1ce61a477d8c8dedc7e70732cc5e265ba64e38b60d4048780d86185b9bec5207ae81c4ad11569dcff3914b9270ab24

  • C:\Users\Admin\AppData\Local\Temp\F2tYzypGiBpESfx.exe

    Filesize

    71KB

    MD5

    43a8d0fee879c995f3d5ae01af807f76

    SHA1

    37e188461cb8b54ccca42a5628572649d42dc1b6

    SHA256

    f7268e40eb1a1d4b1e7f4700200bd7120773d8bf3267c56305c2f13cf9c2a864

    SHA512

    18aaa21fc836730e83f4791e1e3d44ce5b8cead755c26286d08e315c6210a904ebb2359bc4b24155b0ce7d5a080b252093d22cde9c07b4cac3295b9f18ee6797

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432