Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 11:46

General

  • Target

    2024-07-09_8b4a17138f7eb1975175d80da23c0a64_bkransomware.exe

  • Size

    71KB

  • MD5

    8b4a17138f7eb1975175d80da23c0a64

  • SHA1

    bc6716d1776c32dbd61fe8c00e655b29840fe2d8

  • SHA256

    9f3527471f241bbaf25c09b0aaaf6bbbe42a768e3d6dc2611ad99b4c64775705

  • SHA512

    fa10a51351c93f3b451958725e5fa14b87bf9f7691cf958b3b1eae24fd16f5db2f5b67a116ef0aad4ca95f12d9f29d191e24bfb15c61b0cf65d0b12a55c84f05

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTn:ZhpAyazIlyazTn

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_8b4a17138f7eb1975175d80da23c0a64_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_8b4a17138f7eb1975175d80da23c0a64_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2792

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\AUaSUznc0BBTylo.exe

          Filesize

          71KB

          MD5

          2fa9fc10887536be82370d1108becf29

          SHA1

          c7d143e27c011647d91320ff37593b29f8a76e29

          SHA256

          352c105f73b6294942bfa4f0230946a68c6265872ec813fe62f632281dc178f7

          SHA512

          a747cffcf6bcced080ddb64a900a1cdce1b71e3f49b2cde609899c525600791bc66c3040d9caf8b99cd91afc0ec39ff5b1028bbcae21845ac53f70f1c3be1667

        • C:\Windows\CTS.exe

          Filesize

          71KB

          MD5

          66df4ffab62e674af2e75b163563fc0b

          SHA1

          dec8a197312e41eeb3cfef01cb2a443f0205cd6e

          SHA256

          075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

          SHA512

          1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25