Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/07/2023, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat
Resource
win7-20230712-en
General
-
Target
dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat
-
Size
1.1MB
-
MD5
2401ec9ab6c8a2c5ebcfdd3542411ad6
-
SHA1
5f7eb86500f85f53cc1647db6b8571cfc044a115
-
SHA256
80c7906a7e228cb7612cb94ef9f25de02c8520a5c7ec983cc117fe5f75c11f1f
-
SHA512
02a2f8eb4640b7f0b67d2689a37fc587c6f2489d0f6a01f80ba632a3f41264a64cc2d05aca6e399d89b6674083f543cb994385c67c8eca030d8748ef01728873
-
SSDEEP
24576:AACtn8Kmt03FWjMjGsyZWuPFOLqCF/Hp2w8Qr/8Nhctk+gniMKlF7vc39gW:3N
Malware Config
Extracted
strela
91.215.85.209
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3068 rundll32.exe 3068 rundll32.exe 3068 rundll32.exe 3068 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2144 2644 cmd.exe 29 PID 2644 wrote to memory of 2144 2644 cmd.exe 29 PID 2644 wrote to memory of 2144 2644 cmd.exe 29 PID 2644 wrote to memory of 2192 2644 cmd.exe 30 PID 2644 wrote to memory of 2192 2644 cmd.exe 30 PID 2644 wrote to memory of 2192 2644 cmd.exe 30 PID 2644 wrote to memory of 3068 2644 cmd.exe 31 PID 2644 wrote to memory of 3068 2644 cmd.exe 31 PID 2644 wrote to memory of 3068 2644 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\findstr.exefindstr /V nstmepzyyvvpdvehydgghripesbrbamwixbxvicbkuwlsiceby "C:\Users\Admin\AppData\Local\Temp\dasjihejcghivsccuxzjlgydmyiujyybajpdkfvyotqelwyihp.bat"2⤵PID:2144
-
-
C:\Windows\system32\certutil.execertutil -f -decode mspylzvhrjafeijdzzeocqdyfpshrzaqwainvoxzdoofedkvpr bmjblukalwjdjppvzhlrwyccchwlwkbxcrouzdyeklwzsqzbbz.dll2⤵PID:2192
-
-
C:\Windows\system32\rundll32.exerundll32 bmjblukalwjdjppvzhlrwyccchwlwkbxcrouzdyeklwzsqzbbz.dll,x2⤵
- Loads dropped DLL
PID:3068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee
-
Filesize
1.1MB
MD5b9970d0652e0ae78de4def9c6bcd3f69
SHA11c305f1db905de98dc67718700e8e63c3ec704da
SHA256ff7bb09f545ca7a8f470275c6c4314d9cac95a6ca46ef42276dfef0be6213811
SHA5122a77eb5d4bc88949df1d607c04e0c7e9f64b059d3090e82fd7c5c9d9aded4336b3c4450fd8465aa6ad2c20b53826b15aa40cfbccb8e6556d6c241fdc6ed08212
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee
-
Filesize
820KB
MD588fc768f1e1c86650a267c4c54c14607
SHA1627be98bb24119e11572d0746b31be03b72d1bff
SHA2560ab2b87d8f6e4931d9ffadd9d61e3a5c62b121687e3a8ca9a9b248360bbeaad8
SHA51278c896fcbb47ef84aab62a565ef0d147e68df6d0e3fccceb391d7770167dc51cbcb79ec097e546b740a64d552ba5697cc1ea2c8d5d3abe9b4a5f4ac81312ceee