Analysis

  • max time kernel
    92s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 18:28

General

  • Target

    2024-07-09_cfea47ad4f7c40302b1394a365e0c1a4_bkransomware.exe

  • Size

    71KB

  • MD5

    cfea47ad4f7c40302b1394a365e0c1a4

  • SHA1

    c5f4e93f04c083f339b74be635b0f454d4723c65

  • SHA256

    a116fa311590ee45ddad7d2022a58017cdc3e33ecf1450c6398e316c0d0e91fd

  • SHA512

    7eaa8184559d4728e9c5b201e6ae3fe3c8a86824d9737861703cd3def2790216c97bb9200fe8840371b4d9812180c94bce598b6e2bd7c2538ca84c809ddb59b4

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazT5:ZhpAyazIlyazT5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_cfea47ad4f7c40302b1394a365e0c1a4_bkransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_cfea47ad4f7c40302b1394a365e0c1a4_bkransomware.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    394KB

    MD5

    1ed443cb105d29c5d60bd80c6e1dd3df

    SHA1

    7807537bb103e8da39e3242a42d251d0c80a180d

    SHA256

    09249dc9fab058857d46cece8ee7f67b835b0f75ea0e1d2695184c3f275cf811

    SHA512

    1298f26ff18e5a58b7725664cea58dd401b20818ca10a0b3919b5c4cf977324e98d0f31afde0ac92e9acfdb239de00d2c243745b57bfadfc40b1d8cb3c5482ad

  • C:\Users\Admin\AppData\Local\Temp\SXIe9NWIyPlyYSk.exe

    Filesize

    71KB

    MD5

    5645ccccf90c135766176281ade488e9

    SHA1

    5a7594273c1bec7a645946f1c5de6988fce82c83

    SHA256

    b3102df110f49d484cfd29b704c4ed5d50c12f085fc0a4cbfa7186a56c9f05b8

    SHA512

    3fd2f5a5d4d4351fd38fe775ac04618f0d9a8205508f7cfb8774df265ff65d8213f0f9e986421634502f114e203a670400386f6e1d79a5020cd4a27fa0c399bb

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25