Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 10:15
Static task
static1
Behavioral task
behavioral1
Sample
233792750017048.js
Resource
win7-20230712-en
General
-
Target
233792750017048.js
-
Size
4.9MB
-
MD5
ae7f9803781551542ce72c9c226f696a
-
SHA1
cc757b95c3156c28009e60e71e8e55b751384d12
-
SHA256
00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33
-
SHA512
fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9
-
SSDEEP
49152:C57jrh80ODxbzepJrMzqQPLgAs+26hgUJf2pUbU5:ycc
Malware Config
Extracted
strela
193.109.85.77
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3176 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2712 wrote to memory of 1796 2712 wscript.exe 81 PID 2712 wrote to memory of 1796 2712 wscript.exe 81 PID 1796 wrote to memory of 3264 1796 cmd.exe 91 PID 1796 wrote to memory of 3264 1796 cmd.exe 91 PID 1796 wrote to memory of 2252 1796 cmd.exe 92 PID 1796 wrote to memory of 2252 1796 cmd.exe 92 PID 1796 wrote to memory of 3176 1796 cmd.exe 93 PID 1796 wrote to memory of 3176 1796 cmd.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\233792750017048.js1⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\233792750017048.js" "C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat" && "C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\findstr.exefindstr /V pastroute ""C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat""3⤵PID:3264
-
-
C:\Windows\system32\certutil.execertutil -f -decode wholesalespectacular psychoticauthority.dll3⤵PID:2252
-
-
C:\Windows\system32\regsvr32.exeregsvr32 psychoticauthority.dll3⤵
- Loads dropped DLL
PID:3176
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5b040c158a4692899d994fe22f9cc29ed
SHA1056cc8064087e7adaa2089a6d885bceb8cd05a76
SHA2567e6d8a3bc6471df73fd3b428fa09cc4ae583dce540ec05c81a3bd9445331657a
SHA512b83502d855bc1ffe99295d12c19d3641d9c180fbd0259399470e084e45d5f2c66ca246404111b925dc0f76df30b42d4419b4d77a3f614c31e21ba3b6c086e459
-
Filesize
3.6MB
MD5b040c158a4692899d994fe22f9cc29ed
SHA1056cc8064087e7adaa2089a6d885bceb8cd05a76
SHA2567e6d8a3bc6471df73fd3b428fa09cc4ae583dce540ec05c81a3bd9445331657a
SHA512b83502d855bc1ffe99295d12c19d3641d9c180fbd0259399470e084e45d5f2c66ca246404111b925dc0f76df30b42d4419b4d77a3f614c31e21ba3b6c086e459
-
Filesize
4.9MB
MD5ae7f9803781551542ce72c9c226f696a
SHA1cc757b95c3156c28009e60e71e8e55b751384d12
SHA25600a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33
SHA512fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9
-
Filesize
4.9MB
MD5ae7f9803781551542ce72c9c226f696a
SHA1cc757b95c3156c28009e60e71e8e55b751384d12
SHA25600a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33
SHA512fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9
-
Filesize
4.8MB
MD59f1f1a15336f8b541541186475c8d8fd
SHA117614b8c2e2c3f4dc28e1eac8bbc81afcd2d43d0
SHA2566db907d4f11d466bf1039f8a223796f6a0e212f193b9af0829ecd6f6d002b2c5
SHA5120d15ac9fb0cd73cce5a9ed3605a061708ec7b4a4caf70ddb7a701f27fd4d999b4c1b595a0c8a5ae54b00fd276510f9460be7625e9d9bf211111f4c487ad902bb