Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
eReceipt.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eReceipt.js
Resource
win10v2004-20241007-en
General
-
Target
eReceipt.js
-
Size
23KB
-
MD5
f041d2da1a5839119c042afda5c966ad
-
SHA1
78dee5cee82ae393737ddbff9ccf13ad460f6711
-
SHA256
88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677
-
SHA512
1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81
-
SSDEEP
384:Jm3uw3bALv6vsBkAB0W8/u3ZOYEu/99BEm9e0M8LIgyfAmKI2KlVgPIfQI4AqRh3:klrAr+zNWpOC99Gm3BLIgy4mKI22V8QE
Malware Config
Signatures
-
Vjw0rm family
-
Blocklisted process makes network request 17 IoCs
flow pid Process 6 2952 wscript.exe 9 2952 wscript.exe 12 2952 wscript.exe 15 2952 wscript.exe 17 2952 wscript.exe 20 2952 wscript.exe 24 2952 wscript.exe 27 2952 wscript.exe 29 2952 wscript.exe 32 2952 wscript.exe 35 2952 wscript.exe 38 2952 wscript.exe 42 2952 wscript.exe 44 2952 wscript.exe 46 2952 wscript.exe 50 2952 wscript.exe 53 2952 wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReceipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\hHHTUAlbjt.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\XIKPFFU2BI = "\"C:\\Users\\Admin\\AppData\\Roaming\\eReceipt.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2800 2952 wscript.exe 30 PID 2952 wrote to memory of 2800 2952 wscript.exe 30 PID 2952 wrote to memory of 2800 2952 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eReceipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\hHHTUAlbjt.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD592267ddaf97462922152ddb1e0165db8
SHA199d87937a9844ce24481a4499ae9bc5dd39a0604
SHA25661c77f0004a30e87cb6a0b27b56b54e50436b1e532342f01790b398847640b02
SHA5126d349ce485a573700990c26b845fe559172097c58bf2fee31d61e6feebd73d2be17b61957c582bb4be5f6f6671abe40ec9f8ebe24e360ce26dca9988343220a9