Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
Receipt.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Receipt.js
Resource
win10v2004-20220414-en
General
-
Target
Receipt.js
-
Size
90KB
-
MD5
e5b59195d361dcb825f4f8d37b2cb5ee
-
SHA1
68457e878a1b2a3302c605282e3c69c6438d07f5
-
SHA256
67b8f61733545f594194b178e41949e88ac493a5027eb9cd2b1000f5cba3922e
-
SHA512
23220d9ad19f79f94106bf250f87bb2a9ef8e78fb695b63c19e7327c60ae0bea3202396433a0d249e5bb73455d434ff7870c70903a4d2dc848d4e0b49e40dd73
Malware Config
Extracted
njrat
0.7d
HACKED JFK
103.149.13.61:4545
782e4e93b9158d4d448232ed139fc0db
-
reg_key
782e4e93b9158d4d448232ed139fc0db
-
splitter
|'|'|
Extracted
njrat
0.7d
HACKED... W2B
103.149.13.61:4545
f33599fc8954f4bf201159e017f34658
-
reg_key
f33599fc8954f4bf201159e017f34658
-
splitter
|'|'|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
-
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1
-
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)
-
Blocklisted process makes network request 44 IoCs
Processes:
wscript.exewscript.exewscript.exeflow pid process 5 3756 wscript.exe 6 488 wscript.exe 15 488 wscript.exe 18 488 wscript.exe 34 3756 wscript.exe 35 488 wscript.exe 38 3756 wscript.exe 39 488 wscript.exe 46 488 wscript.exe 47 4416 wscript.exe 50 488 wscript.exe 51 4416 wscript.exe 52 4416 wscript.exe 53 3756 wscript.exe 54 488 wscript.exe 55 4416 wscript.exe 56 3756 wscript.exe 57 488 wscript.exe 58 4416 wscript.exe 59 4416 wscript.exe 62 3756 wscript.exe 63 488 wscript.exe 64 4416 wscript.exe 65 4416 wscript.exe 66 3756 wscript.exe 67 488 wscript.exe 68 4416 wscript.exe 69 3756 wscript.exe 70 488 wscript.exe 71 4416 wscript.exe 72 4416 wscript.exe 73 3756 wscript.exe 74 488 wscript.exe 75 4416 wscript.exe 76 4416 wscript.exe 77 3756 wscript.exe 78 488 wscript.exe 79 4416 wscript.exe 80 3756 wscript.exe 81 488 wscript.exe 82 4416 wscript.exe 84 4416 wscript.exe 85 3756 wscript.exe 86 488 wscript.exe -
Executes dropped EXE 3 IoCs
Processes:
Server.exetmp5010.tmp.exeServer.exepid process 4372 Server.exe 4808 tmp5010.tmp.exe 1644 Server.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exeServer.exeWScript.exetmp5010.tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Server.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation tmp5010.tmp.exe -
Drops startup file 10 IoCs
Processes:
wscript.exeServer.exeWScript.exewscript.exeServer.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iFNNVMKeTo.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\782e4e93b9158d4d448232ed139fc0db.exe Server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmp4391.tmp.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmp4391.tmp.vbs wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f33599fc8954f4bf201159e017f34658.exe Server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f33599fc8954f4bf201159e017f34658.exe Server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iFNNVMKeTo.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fUpoWkUvrS.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fUpoWkUvrS.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\782e4e93b9158d4d448232ed139fc0db.exe Server.exe -
Adds Run key to start application 2 TTPs 16 IoCs
Processes:
WScript.exewscript.exewscript.exeServer.exeServer.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmp4391 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmp4391.tmp.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\iFNNVMKeTo.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\782e4e93b9158d4d448232ed139fc0db = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmp4391 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmp4391.tmp.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\782e4e93b9158d4d448232ed139fc0db = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f33599fc8954f4bf201159e017f34658 = "\"C:\\Windows\\Server.exe\" .." Server.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmp4391 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmp4391.tmp.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tmp4391 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\tmp4391.tmp.vbs\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f33599fc8954f4bf201159e017f34658 = "\"C:\\Windows\\Server.exe\" .." Server.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\fUpoWkUvrS.js\"" wscript.exe -
Drops file in Windows directory 1 IoCs
Processes:
tmp5010.tmp.exedescription ioc process File created C:\Windows\Server.exe tmp5010.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Server.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings Server.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
Processes:
Server.exetmp5010.tmp.exeServer.exepid process 4372 Server.exe 4808 tmp5010.tmp.exe 1644 Server.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
Server.exeServer.exedescription pid process Token: SeDebugPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe Token: SeDebugPrivilege 1644 Server.exe Token: 33 1644 Server.exe Token: SeIncBasePriorityPrivilege 1644 Server.exe Token: 33 4372 Server.exe Token: SeIncBasePriorityPrivilege 4372 Server.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
wscript.exeServer.exeWScript.exetmp5010.tmp.exeServer.exedescription pid process target process PID 3272 wrote to memory of 3756 3272 wscript.exe wscript.exe PID 3272 wrote to memory of 3756 3272 wscript.exe wscript.exe PID 3272 wrote to memory of 488 3272 wscript.exe wscript.exe PID 3272 wrote to memory of 488 3272 wscript.exe wscript.exe PID 3272 wrote to memory of 4372 3272 wscript.exe Server.exe PID 3272 wrote to memory of 4372 3272 wscript.exe Server.exe PID 4372 wrote to memory of 4252 4372 Server.exe netsh.exe PID 4372 wrote to memory of 4252 4372 Server.exe netsh.exe PID 4372 wrote to memory of 4532 4372 Server.exe WScript.exe PID 4372 wrote to memory of 4532 4372 Server.exe WScript.exe PID 4532 wrote to memory of 4416 4532 WScript.exe wscript.exe PID 4532 wrote to memory of 4416 4532 WScript.exe wscript.exe PID 4372 wrote to memory of 4808 4372 Server.exe tmp5010.tmp.exe PID 4372 wrote to memory of 4808 4372 Server.exe tmp5010.tmp.exe PID 4808 wrote to memory of 1644 4808 tmp5010.tmp.exe Server.exe PID 4808 wrote to memory of 1644 4808 tmp5010.tmp.exe Server.exe PID 1644 wrote to memory of 3612 1644 Server.exe netsh.exe PID 1644 wrote to memory of 3612 1644 Server.exe netsh.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Receipt.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\fUpoWkUvrS.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3756
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\iFNNVMKeTo.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:488
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4252
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp4391.tmp.vbs"3⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\tmp4391.tmp.vbs"4⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5010.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5010.tmp.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Server.exe"C:\Windows\Server.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Windows\Server.exe" "Server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:3612
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD57398714aa7e951484c0230bd1919a4d7
SHA1ba27dc586f7de6d5bc21e54a8ba7b02c980b23ac
SHA256d6355ea09274149b47d0fab0edc18d2627a1866557ac3a4cce6f4f15b586b9c2
SHA512391249bdee93f2d2bea6c2c46f791d9533de73c79804a11ac18959fbf3eaf87483988c4fd1310187bf6a8afe3757c302682025b6295380ea0dc6b383693719cf
-
Filesize
25KB
MD57398714aa7e951484c0230bd1919a4d7
SHA1ba27dc586f7de6d5bc21e54a8ba7b02c980b23ac
SHA256d6355ea09274149b47d0fab0edc18d2627a1866557ac3a4cce6f4f15b586b9c2
SHA512391249bdee93f2d2bea6c2c46f791d9533de73c79804a11ac18959fbf3eaf87483988c4fd1310187bf6a8afe3757c302682025b6295380ea0dc6b383693719cf
-
Filesize
13KB
MD53c5846a19b95e2441a049c7c2e8eeb14
SHA19d30716b1eef3995228ac87cf800d2acdec9e0fc
SHA256e72818e8c8076b6d0d4c10604f4c0681148c7e17ca0099fe5bf17c0dd27b7cd1
SHA51232e8f1e0e45f5cfc733de865fdbc3b69d2e21183a67d06e270dbbeb2d701db10d62b4048f9ece0bbff95d96a517030f5a51d1883a32d189a6d9554f001f40476
-
Filesize
25KB
MD513a393f4abc0575a0c3661a2058c6a92
SHA1c35e88355d846094a9b9aeaef3822725cd65c898
SHA256685deaa148f2ded23bfac7a5bced8399f438b6825c48fa3c4d302470d4c23ad4
SHA512f33ef8ac7264a64982873a9dc7defff8c161376c59844047cf117b64d35c1d46c708e6fa03e7b2f999233816892ea6bad62f09a81112247502cf611904709ba6
-
Filesize
25KB
MD513a393f4abc0575a0c3661a2058c6a92
SHA1c35e88355d846094a9b9aeaef3822725cd65c898
SHA256685deaa148f2ded23bfac7a5bced8399f438b6825c48fa3c4d302470d4c23ad4
SHA512f33ef8ac7264a64982873a9dc7defff8c161376c59844047cf117b64d35c1d46c708e6fa03e7b2f999233816892ea6bad62f09a81112247502cf611904709ba6
-
Filesize
13KB
MD53c5846a19b95e2441a049c7c2e8eeb14
SHA19d30716b1eef3995228ac87cf800d2acdec9e0fc
SHA256e72818e8c8076b6d0d4c10604f4c0681148c7e17ca0099fe5bf17c0dd27b7cd1
SHA51232e8f1e0e45f5cfc733de865fdbc3b69d2e21183a67d06e270dbbeb2d701db10d62b4048f9ece0bbff95d96a517030f5a51d1883a32d189a6d9554f001f40476
-
Filesize
5KB
MD552aad348d257b926fa2d4f1a82cf1b57
SHA1e7abda58f3159c4fadff80d82134af85368657ad
SHA256371579c4cd2bb1df7ffde8cf0ea994971abd4223136e2e298da1bac30f143fe1
SHA512999c8b81462f0b4cb6d5ec379090fc45dd5403a9cdf3207e5eba1d415baf4872b7070ee44bb04cba3e87b93ef5f8613a4d479e82c5f2c2669200f618977edc49
-
Filesize
5KB
MD557a4f324e829737f1e47259fa85f5c5d
SHA16815e1002cb458b2bfbd30e2f4b40a471fea70ab
SHA2566f8fb242f23dd921cf19f13ea989ee438c573c6cefc56c59cbec7cfcc9a56393
SHA512ddc62319afd4f7d03abc5c2a090468e3154f112b06e890aefcf1de8f6154e53d4cf71a895e40bbe805c893fd7f598108355106196fbb59c36e68ed52f4d847ed
-
Filesize
13KB
MD53c5846a19b95e2441a049c7c2e8eeb14
SHA19d30716b1eef3995228ac87cf800d2acdec9e0fc
SHA256e72818e8c8076b6d0d4c10604f4c0681148c7e17ca0099fe5bf17c0dd27b7cd1
SHA51232e8f1e0e45f5cfc733de865fdbc3b69d2e21183a67d06e270dbbeb2d701db10d62b4048f9ece0bbff95d96a517030f5a51d1883a32d189a6d9554f001f40476
-
Filesize
25KB
MD513a393f4abc0575a0c3661a2058c6a92
SHA1c35e88355d846094a9b9aeaef3822725cd65c898
SHA256685deaa148f2ded23bfac7a5bced8399f438b6825c48fa3c4d302470d4c23ad4
SHA512f33ef8ac7264a64982873a9dc7defff8c161376c59844047cf117b64d35c1d46c708e6fa03e7b2f999233816892ea6bad62f09a81112247502cf611904709ba6
-
Filesize
25KB
MD513a393f4abc0575a0c3661a2058c6a92
SHA1c35e88355d846094a9b9aeaef3822725cd65c898
SHA256685deaa148f2ded23bfac7a5bced8399f438b6825c48fa3c4d302470d4c23ad4
SHA512f33ef8ac7264a64982873a9dc7defff8c161376c59844047cf117b64d35c1d46c708e6fa03e7b2f999233816892ea6bad62f09a81112247502cf611904709ba6