Analysis
-
max time kernel
150s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 07:35
Static task
static1
Behavioral task
behavioral1
Sample
receipt.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
receipt.js
Resource
win10v2004-20220414-en
General
-
Target
receipt.js
-
Size
166KB
-
MD5
3a6e3a42eda0c68307e16774cdb155c1
-
SHA1
1d72fb4eade35e91e7ced538e6b09a0860fb44a2
-
SHA256
ae6fd665d99775c8880d301acec3edc28e44cf7e39338c5474533bb39dc3389c
-
SHA512
5414eab172dcdf89f80153e1fae756f5b3bd7c6df410980040f158b083a875e530b6791af3157b0cb1648102ff247e9c5c0d357d4004230a70bfb26c4b4a55b3
Malware Config
Extracted
vjw0rm
http://zeegod.duckdns.org:9003
Signatures
-
Blocklisted process makes network request 12 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 1156 wscript.exe 9 896 wscript.exe 12 896 wscript.exe 13 896 wscript.exe 15 896 wscript.exe 19 896 wscript.exe 21 896 wscript.exe 23 896 wscript.exe 25 896 wscript.exe 27 896 wscript.exe 29 896 wscript.exe 32 896 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\receipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IlvAZLYKFN.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IlvAZLYKFN.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\IlvAZLYKFN.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\1NBCD3W1VR = "\"C:\\Users\\Admin\\AppData\\Roaming\\receipt.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1156 wrote to memory of 896 1156 wscript.exe wscript.exe PID 1156 wrote to memory of 896 1156 wscript.exe wscript.exe PID 1156 wrote to memory of 896 1156 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\receipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\IlvAZLYKFN.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD51c113559c1837ff6519961b920957478
SHA1adb2cc9a44358d3bfaef0865494edfe5d33436a8
SHA2562f4e644833bf0a9deb2252f7b13426e94722d1ff05dfa1fe4eb4b6e031284115
SHA512731aaf49720ee68b32f96f391b35b2309acdd9821ecc791c0cedd7582dc420cad46215b7d8b3566a7c9a8bd41266aebb0268e28da9dd86d0d8eee572f02c0414