Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en -
submitted
06-09-2021 16:57
Static task
static1
Behavioral task
behavioral1
Sample
eReceipt.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
eReceipt.js
Resource
win10-en
General
-
Target
eReceipt.js
-
Size
30KB
-
MD5
1c345fdbf8e3bf6a7dbb61b509175e65
-
SHA1
f3800f54053638da76f04f34251a886ca39cb79e
-
SHA256
39515cd670a3b68b1a6dfa22ee5f8b32872ce98c5f0da3d9aeccff18932128a9
-
SHA512
a305be6509a01b00c67aedb87782c852b8a77db28475bee3d9bc1e62946e3d72f1f81d421b70c3f4b2cd2c66d6312cf19a6ba66c564798b99ce4c7bf8a480f84
Malware Config
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
wscript.exewscript.exeflow pid process 6 3172 wscript.exe 7 924 wscript.exe 13 924 wscript.exe 14 924 wscript.exe 15 924 wscript.exe 16 924 wscript.exe 17 924 wscript.exe 18 924 wscript.exe 19 924 wscript.exe 20 924 wscript.exe 21 924 wscript.exe 22 924 wscript.exe 23 924 wscript.exe 24 924 wscript.exe 25 924 wscript.exe 26 924 wscript.exe 27 924 wscript.exe 28 924 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UcPLrIKxHY.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReceipt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReceipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UcPLrIKxHY.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\QTI627R350 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\eReceipt.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\UcPLrIKxHY.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 3172 wrote to memory of 924 3172 wscript.exe wscript.exe PID 3172 wrote to memory of 924 3172 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eReceipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\UcPLrIKxHY.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b62bd809653a1ae3dcaeeb7b31c728f0
SHA1db818b03821f9e25a81864e5dcb4128eb37722a8
SHA256eee5274eae70bdcf1af045798f853a09e612bdb7bc36af57f2b7df99b44afeb3
SHA512b3b75b5ddf8f90d518cec4ba876738049ab24e9e54829abe70e1836e9f7145e552bfb5f9ecac999340db3b6e24a4e92a0e20f73fe1d22f635743ef42de7755ba