Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
eReceipt.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eReceipt.js
Resource
win10v2004-20241007-en
General
-
Target
eReceipt.js
-
Size
23KB
-
MD5
0a88f3eb9d11b80339b2954140feb7ba
-
SHA1
1662879c2e251946f7d5497f863220dd91160102
-
SHA256
422e287276a07bcb879d792e793c47a3720d45ed01216531a49f78aefe17bd91
-
SHA512
7019a79a66239cb290fe3a6a845386bca020348b72b2b9b28337b839a0b5f2ebb0567211f43381eb1afea4b9c9099b73019d07d7e93f6f5ab2e65adc6c0c7665
-
SSDEEP
384:tm3uw3mx5W7X/ZIFMzhaPIuYYHqWJUXA7jhSBfoeXG+2FLbP8L5vO97oxEXdf3e:ol2xw7Xe1F2eUXsjEBnt2uZ27oxElu
Malware Config
Signatures
-
Vjw0rm family
-
Blocklisted process makes network request 18 IoCs
flow pid Process 8 1852 wscript.exe 10 1852 wscript.exe 13 1852 wscript.exe 16 1852 wscript.exe 18 1852 wscript.exe 21 1852 wscript.exe 25 1852 wscript.exe 28 1852 wscript.exe 30 1852 wscript.exe 33 1852 wscript.exe 36 1852 wscript.exe 38 1852 wscript.exe 43 1852 wscript.exe 45 1852 wscript.exe 47 1852 wscript.exe 51 1852 wscript.exe 53 1852 wscript.exe 57 1852 wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReceipt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aTQVxeggsb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aTQVxeggsb.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\aTQVxeggsb.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\3W2CQPM6PM = "\"C:\\Users\\Admin\\AppData\\Roaming\\eReceipt.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2468 1852 wscript.exe 31 PID 1852 wrote to memory of 2468 1852 wscript.exe 31 PID 1852 wrote to memory of 2468 1852 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eReceipt.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\aTQVxeggsb.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54640bf09b44ca4571713b1ecb5178f44
SHA199abf89b86d719c9a91af0872f6325862a620fbf
SHA256f3f74f1914f4d54063e864afe9c93b28a3ac77bf4aa6306e42c0cedd894fc004
SHA5123b17a47f3bd6bceb57357610f93de1490436bb346c3ac62d1a5bef2d62b6148671aa1bd83e20da33576284a838f7459b205bd87e54d29b04fdf94e24bb371436