Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-02-2023 14:01
Static task
static1
Behavioral task
behavioral1
Sample
receipt-0213023pdf.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
receipt-0213023pdf.js
Resource
win10v2004-20221111-en
General
-
Target
receipt-0213023pdf.js
-
Size
3KB
-
MD5
c64bdd0d2ddf04507b70b6062d48c1c5
-
SHA1
cedaba613aefca83c103b8f50399dfa9a6a3981c
-
SHA256
2d0241f0ed9b0a8e902b6e402e33c7a5dfaea0f9e9105e11a62a83d9e289f9fa
-
SHA512
1896c80066e8fa44faf10456f98181a99f2c8c52059e5afa4d607363e75b27a9be7ddda12854cca33a700e4baf4ea809c0dda4f1865ba6d109e534dcf395ab33
Malware Config
Extracted
vjw0rm
http://66.154.102.135:9401
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 1792 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\receipt-0213023pdf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\receipt-0213023pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\4YORQEQAUX = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\receipt-0213023pdf.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2004 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2004 1792 wscript.exe 29 PID 1792 wrote to memory of 2004 1792 wscript.exe 29 PID 1792 wrote to memory of 2004 1792 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\receipt-0213023pdf.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\receipt-0213023pdf.js2⤵
- Creates scheduled task(s)
PID:2004
-