Analysis
-
max time kernel
175s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 05:56
Static task
static1
Behavioral task
behavioral1
Sample
e-Receipt#009.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e-Receipt#009.js
Resource
win10v2004-20220414-en
General
-
Target
e-Receipt#009.js
-
Size
163KB
-
MD5
1b4e9f90c6dcd35504ea999ba8aa54a1
-
SHA1
06721639da5b24773f5543e0684a2247911bda92
-
SHA256
793e966b5c476e439785b630c25d47748b528efb0c4b337e41aa6b64e70fd117
-
SHA512
da5bb7d79fadda9b4a5207e411bc689b805990388ed2cf0f98570ddc2a2b0c81d64c6b9a2c8db505a57ffbb67cdb432a5427810f1c6c0daac8175336cad959f7
Malware Config
Signatures
-
Blocklisted process makes network request 30 IoCs
Processes:
wscript.exewscript.exeflow pid process 7 1656 wscript.exe 8 336 wscript.exe 10 336 wscript.exe 12 1656 wscript.exe 13 336 wscript.exe 15 1656 wscript.exe 18 336 wscript.exe 20 1656 wscript.exe 21 336 wscript.exe 23 1656 wscript.exe 24 336 wscript.exe 26 1656 wscript.exe 29 336 wscript.exe 31 1656 wscript.exe 32 336 wscript.exe 34 1656 wscript.exe 35 336 wscript.exe 36 1656 wscript.exe 40 336 wscript.exe 41 1656 wscript.exe 43 336 wscript.exe 45 1656 wscript.exe 46 336 wscript.exe 47 1656 wscript.exe 51 336 wscript.exe 52 1656 wscript.exe 54 336 wscript.exe 56 1656 wscript.exe 57 336 wscript.exe 59 1656 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nlDPzaYWSj.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e-Receipt#009.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nlDPzaYWSj.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\nlDPzaYWSj.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\KYXNMD0WI5 = "\"C:\\Users\\Admin\\e-Receipt#009.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 336 wrote to memory of 1656 336 wscript.exe wscript.exe PID 336 wrote to memory of 1656 336 wscript.exe wscript.exe PID 336 wrote to memory of 1656 336 wscript.exe wscript.exe PID 336 wrote to memory of 1252 336 wscript.exe schtasks.exe PID 336 wrote to memory of 1252 336 wscript.exe schtasks.exe PID 336 wrote to memory of 1252 336 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\e-Receipt#009.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\nlDPzaYWSj.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\e-Receipt#009.js2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\nlDPzaYWSj.jsFilesize
58KB
MD554f543b5d40a98120f956b0bde522fa9
SHA1bedab14ffa732c74366d192b8d3c9b393682960e
SHA256446646baa7534faf7066fb842934ae5e6167680c0383b44e0fef9513549bc0ac
SHA512e463ed8564d8fb88ab45dd68d29936a068f36cbbdf2623903e68b173a24e907ebad48ab05836dfc30b58fc278dc170a301364cb396b42cf787efd9fbf3ccb76e
-
memory/336-54-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmpFilesize
8KB
-
memory/1252-57-0x0000000000000000-mapping.dmp
-
memory/1656-55-0x0000000000000000-mapping.dmp