Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 01:33
Static task
static1
Behavioral task
behavioral1
Sample
receipt.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
receipt.js
Resource
win10-en-20211104
General
-
Target
receipt.js
-
Size
22KB
-
MD5
324c008ca3575a7b40ebec55eb1e17ce
-
SHA1
8a6058d5da5ce7a45029eaff6fdc048eb22bccbc
-
SHA256
0fe9f33914e59398a946e711307b64ec4ed7bf13fdf466be1750a77602772007
-
SHA512
a193ab7dbca59c81526a00c2606e5825495cc5a6f4a7c0d04af6af2bfaaab0bf560bedbf27fb7de8a71476d0facd62ec9cb94a74ad1907eeb91e0cfb68d63732
Malware Config
Extracted
vjw0rm
http://zeegod.duckdns.org:9998
Signatures
-
Blocklisted process makes network request 23 IoCs
Processes:
wscript.exewscript.exeflow pid process 10 3692 wscript.exe 11 2396 wscript.exe 20 3692 wscript.exe 27 3692 wscript.exe 28 3692 wscript.exe 29 3692 wscript.exe 30 3692 wscript.exe 31 3692 wscript.exe 32 3692 wscript.exe 35 3692 wscript.exe 36 3692 wscript.exe 37 3692 wscript.exe 38 3692 wscript.exe 39 3692 wscript.exe 40 3692 wscript.exe 41 3692 wscript.exe 42 3692 wscript.exe 43 2396 wscript.exe 44 2396 wscript.exe 45 3692 wscript.exe 46 2396 wscript.exe 47 3692 wscript.exe 48 2396 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CEXswmRIVn.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\receipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CEXswmRIVn.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\YSAGQWKNY8 = "\"C:\\Users\\Admin\\AppData\\Roaming\\receipt.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\CEXswmRIVn.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 2396 wrote to memory of 3692 2396 wscript.exe wscript.exe PID 2396 wrote to memory of 3692 2396 wscript.exe wscript.exe PID 2396 wrote to memory of 3256 2396 wscript.exe schtasks.exe PID 2396 wrote to memory of 3256 2396 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\receipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\CEXswmRIVn.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3692
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\receipt.js2⤵
- Creates scheduled task(s)
PID:3256
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d0f1a684002735cf158c3fe44e2c0e94
SHA156e3369154b815344c30589ada5cbd198beb98fa
SHA256c293fc6c91c5a4a889bb96411d58c7af35d623ab1392f8be4ae44874d15e0073
SHA512fc1a4b3f90ec1e4fe97799cf7f248a4221747b0a226907bb53c8821498a4d0e582252a1f180de3f65e5ee0ec1f831bdc56ae8db02c60e76e71bbb72bb5c9b676