Analysis

  • max time kernel
    128s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2023 10:15

General

  • Target

    233792750017048.js

  • Size

    4.9MB

  • MD5

    ae7f9803781551542ce72c9c226f696a

  • SHA1

    cc757b95c3156c28009e60e71e8e55b751384d12

  • SHA256

    00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33

  • SHA512

    fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9

  • SSDEEP

    49152:C57jrh80ODxbzepJrMzqQPLgAs+26hgUJf2pUbU5:ycc

Score
10/10

Malware Config

Extracted

Family

strela

C2

193.109.85.77

Signatures

  • Strela

    An info stealer targeting mail credentials first seen in late 2022.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\233792750017048.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\233792750017048.js" "C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat" && "C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\system32\findstr.exe
        findstr /V pastroute ""C:\Users\Admin\AppData\Local\Temp\\unsuitablediscussion.bat""
        3⤵
          PID:3264
        • C:\Windows\system32\certutil.exe
          certutil -f -decode wholesalespectacular psychoticauthority.dll
          3⤵
            PID:2252
          • C:\Windows\system32\regsvr32.exe
            regsvr32 psychoticauthority.dll
            3⤵
            • Loads dropped DLL
            PID:3176
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
          PID:3160

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\psychoticauthority.dll

          Filesize

          3.6MB

          MD5

          b040c158a4692899d994fe22f9cc29ed

          SHA1

          056cc8064087e7adaa2089a6d885bceb8cd05a76

          SHA256

          7e6d8a3bc6471df73fd3b428fa09cc4ae583dce540ec05c81a3bd9445331657a

          SHA512

          b83502d855bc1ffe99295d12c19d3641d9c180fbd0259399470e084e45d5f2c66ca246404111b925dc0f76df30b42d4419b4d77a3f614c31e21ba3b6c086e459

        • C:\Users\Admin\AppData\Local\Temp\psychoticauthority.dll

          Filesize

          3.6MB

          MD5

          b040c158a4692899d994fe22f9cc29ed

          SHA1

          056cc8064087e7adaa2089a6d885bceb8cd05a76

          SHA256

          7e6d8a3bc6471df73fd3b428fa09cc4ae583dce540ec05c81a3bd9445331657a

          SHA512

          b83502d855bc1ffe99295d12c19d3641d9c180fbd0259399470e084e45d5f2c66ca246404111b925dc0f76df30b42d4419b4d77a3f614c31e21ba3b6c086e459

        • C:\Users\Admin\AppData\Local\Temp\unsuitablediscussion.bat

          Filesize

          4.9MB

          MD5

          ae7f9803781551542ce72c9c226f696a

          SHA1

          cc757b95c3156c28009e60e71e8e55b751384d12

          SHA256

          00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33

          SHA512

          fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9

        • C:\Users\Admin\AppData\Local\Temp\unsuitablediscussion.bat

          Filesize

          4.9MB

          MD5

          ae7f9803781551542ce72c9c226f696a

          SHA1

          cc757b95c3156c28009e60e71e8e55b751384d12

          SHA256

          00a8d34b48ca1f7d4f05c17c467b4d54632be4deae51ea66cd72b25e95b70a33

          SHA512

          fca4b968ab43cf6a46aead353906d4d20a1cd81774116d6fb17adc84b4fb402f130b77ce3a9e62cbc519dd69368d4336e0fa9ed8d780691ded472b451aebada9

        • C:\Users\Admin\AppData\Local\Temp\wholesalespectacular

          Filesize

          4.8MB

          MD5

          9f1f1a15336f8b541541186475c8d8fd

          SHA1

          17614b8c2e2c3f4dc28e1eac8bbc81afcd2d43d0

          SHA256

          6db907d4f11d466bf1039f8a223796f6a0e212f193b9af0829ecd6f6d002b2c5

          SHA512

          0d15ac9fb0cd73cce5a9ed3605a061708ec7b4a4caf70ddb7a701f27fd4d999b4c1b595a0c8a5ae54b00fd276510f9460be7625e9d9bf211111f4c487ad902bb

        • memory/3176-8122-0x0000000000760000-0x0000000000781000-memory.dmp

          Filesize

          132KB

        • memory/3176-8123-0x000000006D7C0000-0x000000006DB66000-memory.dmp

          Filesize

          3.6MB

        • memory/3176-8124-0x0000000000760000-0x0000000000781000-memory.dmp

          Filesize

          132KB