Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-12-2021 09:37
Static task
static1
Behavioral task
behavioral1
Sample
receipt.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
receipt.js
Resource
win10-en-20211208
General
-
Target
receipt.js
-
Size
22KB
-
MD5
31178620b92ff3a6eccf7f99d0afab59
-
SHA1
8d703a22a6759103b2a1ff50d08f467dbb6dbd0f
-
SHA256
0e8c99f0e1fd9ea10d561d07a7bb1a0e26b6ae081d1324f5549489e58f4b3255
-
SHA512
ae8f0e92c4c5acc91d3bd532b00b4ef8dcfe00b58611cbd40e0093f7402f0165095661b61f2621e0f64feba356c3fafc2f55ef892cc1f6924b79c05b2c0bbe68
Malware Config
Extracted
vjw0rm
http://zeegod.duckdns.org:9999
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 1040 wscript.exe 9 1632 wscript.exe 10 1040 wscript.exe 12 1040 wscript.exe 15 1040 wscript.exe 17 1040 wscript.exe 18 1040 wscript.exe 21 1040 wscript.exe 23 1040 wscript.exe 24 1040 wscript.exe 27 1040 wscript.exe 29 1040 wscript.exe 31 1040 wscript.exe 33 1040 wscript.exe 35 1040 wscript.exe 37 1040 wscript.exe 40 1040 wscript.exe 42 1040 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\receipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eAJLfWOZNj.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eAJLfWOZNj.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\eAJLfWOZNj.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\TJIPC622E2 = "\"C:\\Users\\Admin\\AppData\\Roaming\\receipt.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 1632 wrote to memory of 1040 1632 wscript.exe wscript.exe PID 1632 wrote to memory of 1040 1632 wscript.exe wscript.exe PID 1632 wrote to memory of 1040 1632 wscript.exe wscript.exe PID 1632 wrote to memory of 1756 1632 wscript.exe schtasks.exe PID 1632 wrote to memory of 1756 1632 wscript.exe schtasks.exe PID 1632 wrote to memory of 1756 1632 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\receipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\eAJLfWOZNj.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1040
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\receipt.js2⤵
- Creates scheduled task(s)
PID:1756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a1a31dc3ddf5ec6d22c1538fd10cc20c
SHA1fb9198ed29ce113f70a31452ccf989889ac26e0a
SHA256c0a9ac7a4f98418d786fc01ce03a70b69885e5a894972a45b5aadd0a152b91c4
SHA5120f208998ae86f41e9fa694e260ecc3a44109fb29b7afdeaa2193f117a52bc028585ea766ebd3ed5253b1d678c47ce8cf487ec72f8199317acc6f86a53be52909