Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
eReceipt.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eReceipt.js
Resource
win10v2004-20241007-en
General
-
Target
eReceipt.js
-
Size
23KB
-
MD5
f041d2da1a5839119c042afda5c966ad
-
SHA1
78dee5cee82ae393737ddbff9ccf13ad460f6711
-
SHA256
88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677
-
SHA512
1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81
-
SSDEEP
384:Jm3uw3bALv6vsBkAB0W8/u3ZOYEu/99BEm9e0M8LIgyfAmKI2KlVgPIfQI4AqRh3:klrAr+zNWpOC99Gm3BLIgy4mKI22V8QE
Malware Config
Signatures
-
Vjw0rm family
-
Blocklisted process makes network request 15 IoCs
flow pid Process 9 4600 wscript.exe 20 4600 wscript.exe 28 4600 wscript.exe 31 4600 wscript.exe 47 4600 wscript.exe 50 4600 wscript.exe 54 4600 wscript.exe 57 4600 wscript.exe 60 4600 wscript.exe 62 4600 wscript.exe 68 4600 wscript.exe 71 4600 wscript.exe 73 4600 wscript.exe 76 4600 wscript.exe 79 4600 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReceipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hHHTUAlbjt.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\hHHTUAlbjt.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XIKPFFU2BI = "\"C:\\Users\\Admin\\AppData\\Roaming\\eReceipt.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3288 4600 wscript.exe 83 PID 4600 wrote to memory of 3288 4600 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eReceipt.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\hHHTUAlbjt.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD592267ddaf97462922152ddb1e0165db8
SHA199d87937a9844ce24481a4499ae9bc5dd39a0604
SHA25661c77f0004a30e87cb6a0b27b56b54e50436b1e532342f01790b398847640b02
SHA5126d349ce485a573700990c26b845fe559172097c58bf2fee31d61e6feebd73d2be17b61957c582bb4be5f6f6671abe40ec9f8ebe24e360ce26dca9988343220a9