Analysis
-
max time kernel
174s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-06-2022 07:35
Static task
static1
Behavioral task
behavioral1
Sample
receipt.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
receipt.js
Resource
win10v2004-20220414-en
General
-
Target
receipt.js
-
Size
166KB
-
MD5
3a6e3a42eda0c68307e16774cdb155c1
-
SHA1
1d72fb4eade35e91e7ced538e6b09a0860fb44a2
-
SHA256
ae6fd665d99775c8880d301acec3edc28e44cf7e39338c5474533bb39dc3389c
-
SHA512
5414eab172dcdf89f80153e1fae756f5b3bd7c6df410980040f158b083a875e530b6791af3157b0cb1648102ff247e9c5c0d357d4004230a70bfb26c4b4a55b3
Malware Config
Extracted
vjw0rm
http://zeegod.duckdns.org:9003
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
wscript.exewscript.exeflow pid process 11 1948 wscript.exe 12 4028 wscript.exe 16 4028 wscript.exe 20 4028 wscript.exe 36 4028 wscript.exe 37 4028 wscript.exe 42 4028 wscript.exe 59 4028 wscript.exe 61 4028 wscript.exe 62 4028 wscript.exe 63 4028 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\receipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IlvAZLYKFN.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IlvAZLYKFN.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\IlvAZLYKFN.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1NBCD3W1VR = "\"C:\\Users\\Admin\\AppData\\Roaming\\receipt.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 1948 wrote to memory of 4028 1948 wscript.exe wscript.exe PID 1948 wrote to memory of 4028 1948 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\receipt.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\IlvAZLYKFN.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD51c113559c1837ff6519961b920957478
SHA1adb2cc9a44358d3bfaef0865494edfe5d33436a8
SHA2562f4e644833bf0a9deb2252f7b13426e94722d1ff05dfa1fe4eb4b6e031284115
SHA512731aaf49720ee68b32f96f391b35b2309acdd9821ecc791c0cedd7582dc420cad46215b7d8b3566a7c9a8bd41266aebb0268e28da9dd86d0d8eee572f02c0414