Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
eReceipt.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eReceipt.js
Resource
win10v2004-20241007-en
General
-
Target
eReceipt.js
-
Size
23KB
-
MD5
f041d2da1a5839119c042afda5c966ad
-
SHA1
78dee5cee82ae393737ddbff9ccf13ad460f6711
-
SHA256
88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677
-
SHA512
1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81
-
SSDEEP
384:Jm3uw3bALv6vsBkAB0W8/u3ZOYEu/99BEm9e0M8LIgyfAmKI2KlVgPIfQI4AqRh3:klrAr+zNWpOC99Gm3BLIgy4mKI22V8QE
Malware Config
Signatures
-
Vjw0rm family
-
Blocklisted process makes network request 15 IoCs
flow pid Process 9 4812 wscript.exe 18 4812 wscript.exe 23 4812 wscript.exe 31 4812 wscript.exe 47 4812 wscript.exe 50 4812 wscript.exe 54 4812 wscript.exe 58 4812 wscript.exe 61 4812 wscript.exe 67 4812 wscript.exe 70 4812 wscript.exe 72 4812 wscript.exe 74 4812 wscript.exe 77 4812 wscript.exe 79 4812 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReceipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XIKPFFU2BI = "\"C:\\Users\\Admin\\AppData\\Roaming\\eReceipt.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\hHHTUAlbjt.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4612 4812 wscript.exe 84 PID 4812 wrote to memory of 4612 4812 wscript.exe 84
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eReceipt.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\hHHTUAlbjt.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD592267ddaf97462922152ddb1e0165db8
SHA199d87937a9844ce24481a4499ae9bc5dd39a0604
SHA25661c77f0004a30e87cb6a0b27b56b54e50436b1e532342f01790b398847640b02
SHA5126d349ce485a573700990c26b845fe559172097c58bf2fee31d61e6feebd73d2be17b61957c582bb4be5f6f6671abe40ec9f8ebe24e360ce26dca9988343220a9