Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2023, 10:15

General

  • Target

    233792750017048.js

  • Size

    4.9MB

  • MD5

    ae7f9803781551542ce72c9c226f696a

  • SHA1

    cc757b95c3156c28009e60e71e8e55b751384d12

  • SHA256

    00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33

  • SHA512

    fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9

  • SSDEEP

    49152:C57jrh80ODxbzepJrMzqQPLgAs+26hgUJf2pUbU5:ycc

Score
10/10

Malware Config

Extracted

Family

strela

C2

193.109.85.77

Signatures

  • Strela

    An info stealer targeting mail credentials first seen in late 2022.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\233792750017048.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\233792750017048.js" "C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat" && "C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\system32\findstr.exe
        findstr /V pastroute ""C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat""
        3⤵
          PID:2120
        • C:\Windows\system32\certutil.exe
          certutil -f -decode wholesalespectacular psychoticauthority.dll
          3⤵
            PID:2568
          • C:\Windows\system32\regsvr32.exe
            regsvr32 psychoticauthority.dll
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2724

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\psychoticauthority.dll

              Filesize

              3.6MB

              MD5

              b040c158a4692899d994fe22f9cc29ed

              SHA1

              056cc8064087e7adaa2089a6d885bceb8cd05a76

              SHA256

              7e6d8a3bc6471df73fd3b428fa09cc4ae583dce540ec05c81a3bd9445331657a

              SHA512

              b83502d855bc1ffe99295d12c19d3641d9c180fbd0259399470e084e45d5f2c66ca246404111b925dc0f76df30b42d4419b4d77a3f614c31e21ba3b6c086e459

            • C:\Users\Admin\AppData\Local\Temp\unsuitablediscussion.bat

              Filesize

              4.9MB

              MD5

              ae7f9803781551542ce72c9c226f696a

              SHA1

              cc757b95c3156c28009e60e71e8e55b751384d12

              SHA256

              00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33

              SHA512

              fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9

            • C:\Users\Admin\AppData\Local\Temp\unsuitablediscussion.bat

              Filesize

              4.9MB

              MD5

              ae7f9803781551542ce72c9c226f696a

              SHA1

              cc757b95c3156c28009e60e71e8e55b751384d12

              SHA256

              00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33

              SHA512

              fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9

            • C:\Users\Admin\AppData\Local\Temp\wholesalespectacular

              Filesize

              4.8MB

              MD5

              9f1f1a15336f8b541541186475c8d8fd

              SHA1

              17614b8c2e2c3f4dc28e1eac8bbc81afcd2d43d0

              SHA256

              6db907d4f11d466bf1039f8a223796f6a0e212f193b9af0829ecd6f6d002b2c5

              SHA512

              0d15ac9fb0cd73cce5a9ed3605a061708ec7b4a4caf70ddb7a701f27fd4d999b4c1b595a0c8a5ae54b00fd276510f9460be7625e9d9bf211111f4c487ad902bb

            • \Users\Admin\AppData\Local\Temp\psychoticauthority.dll

              Filesize

              3.6MB

              MD5

              b040c158a4692899d994fe22f9cc29ed

              SHA1

              056cc8064087e7adaa2089a6d885bceb8cd05a76

              SHA256

              7e6d8a3bc6471df73fd3b428fa09cc4ae583dce540ec05c81a3bd9445331657a

              SHA512

              b83502d855bc1ffe99295d12c19d3641d9c180fbd0259399470e084e45d5f2c66ca246404111b925dc0f76df30b42d4419b4d77a3f614c31e21ba3b6c086e459

            • memory/2724-8122-0x0000000000130000-0x0000000000151000-memory.dmp

              Filesize

              132KB

            • memory/2724-8123-0x000000006D7C0000-0x000000006DB66000-memory.dmp

              Filesize

              3.6MB

            • memory/2724-8124-0x0000000000130000-0x0000000000151000-memory.dmp

              Filesize

              132KB