Analysis
-
max time kernel
315s -
max time network
390s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21-07-2023 12:18
Static task
static1
Behavioral task
behavioral1
Sample
PDF152551386013601.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PDF152551386013601.js
Resource
win10-20230703-en
General
-
Target
PDF152551386013601.js
-
Size
1.1MB
-
MD5
2401ec9ab6c8a2c5ebcfdd3542411ad6
-
SHA1
5f7eb86500f85f53cc1647db6b8571cfc044a115
-
SHA256
80c7906a7e228cb7612cb94ef9f25de02c8520a5c7ec983cc117fe5f75c11f1f
-
SHA512
02a2f8eb4640b7f0b67d2689a37fc587c6f2489d0f6a01f80ba632a3f41264a64cc2d05aca6e399d89b6674083f543cb994385c67c8eca030d8748ef01728873
-
SSDEEP
24576:AACtn8Kmt03FWjMjGsyZWuPFOLqCF/Hp2w8Qr/8Nhctk+gniMKlF7vc39gW:3N
Malware Config
Extracted
strela
91.215.85.209
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 380 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4896 wrote to memory of 1400 4896 wscript.exe 70 PID 4896 wrote to memory of 1400 4896 wscript.exe 70 PID 1400 wrote to memory of 3808 1400 cmd.exe 72 PID 1400 wrote to memory of 3808 1400 cmd.exe 72 PID 1400 wrote to memory of 4492 1400 cmd.exe 73 PID 1400 wrote to memory of 4492 1400 cmd.exe 73 PID 1400 wrote to memory of 380 1400 cmd.exe 74 PID 1400 wrote to memory of 380 1400 cmd.exe 74
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PDF152551386013601.js1⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\PDF152551386013601.js" "C:\Users\Admin\AppData\Local\Temp\\dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat" && "C:\Users\Admin\AppData\Local\Temp\\dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\findstr.exefindstr /V nstmepzyyvvpdvehydgghripesbrbamwixbxvicbkuwlsiceby ""C:\Users\Admin\AppData\Local\Temp\\dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat""3⤵PID:3808
-
-
C:\Windows\system32\certutil.execertutil -f -decode mspylzvhrjafeijdzzeocqdyfpshrzaqwainvoxzdoofedkvpr bmjblukalwjdjppvzhlrwyccchwlwkbxcrouzdyeklwzsqzbbz.dll3⤵PID:4492
-
-
C:\Windows\system32\rundll32.exerundll32 bmjblukalwjdjppvzhlrwyccchwlwkbxcrouzdyeklwzsqzbbz.dll,x3⤵
- Loads dropped DLL
PID:380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee
-
Filesize
1.1MB
MD52401ec9ab6c8a2c5ebcfdd3542411ad6
SHA15f7eb86500f85f53cc1647db6b8571cfc044a115
SHA25680c7906a7e228cb7612cb94ef9f25de02c8520a5c7ec983cc117fe5f75c11f1f
SHA51202a2f8eb4640b7f0b67d2689a37fc587c6f2489d0f6a01f80ba632a3f41264a64cc2d05aca6e399d89b6674083f543cb994385c67c8eca030d8748ef01728873
-
Filesize
1.1MB
MD52401ec9ab6c8a2c5ebcfdd3542411ad6
SHA15f7eb86500f85f53cc1647db6b8571cfc044a115
SHA25680c7906a7e228cb7612cb94ef9f25de02c8520a5c7ec983cc117fe5f75c11f1f
SHA51202a2f8eb4640b7f0b67d2689a37fc587c6f2489d0f6a01f80ba632a3f41264a64cc2d05aca6e399d89b6674083f543cb994385c67c8eca030d8748ef01728873
-
Filesize
1.1MB
MD5b9970d0652e0ae78de4def9c6bcd3f69
SHA11c305f1db905de98dc67718700e8e63c3ec704da
SHA256ff7bb09f545ca7a8f470275c6c4314d9cac95a6ca46ef42276dfef0be6213811
SHA5122a77eb5d4bc88949df1d607c04e0c7e9f64b059d3090e82fd7c5c9d9aded4336b3c4450fd8465aa6ad2c20b53826b15aa40cfbccb8e6556d6c241fdc6ed08212
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee