Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js
Resource
win7-20230824-en
General
-
Target
7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js
-
Size
3.7MB
-
MD5
f3b0e72e66e1324a2ab94285f069501a
-
SHA1
d96cb05ee0d622d3cab1c163bddc5e1d8e5280d2
-
SHA256
7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca
-
SHA512
9c2847a3f9bda12f75afbb4c46cbd8c00177f290722ffe83f819fea9802d6d896c719f0910ca1eb4192a09c786d3134f504e54a93df9bb77b9d82f899b9db197
-
SSDEEP
49152:KHEsW6XqiNJhdW2QwkV++sNUrw2CatUbUt:vcC
Malware Config
Extracted
strela
193.109.85.77
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1508 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2128 1968 wscript.exe 81 PID 1968 wrote to memory of 2128 1968 wscript.exe 81 PID 2128 wrote to memory of 3352 2128 cmd.exe 89 PID 2128 wrote to memory of 3352 2128 cmd.exe 89 PID 2128 wrote to memory of 452 2128 cmd.exe 90 PID 2128 wrote to memory of 452 2128 cmd.exe 90 PID 2128 wrote to memory of 1508 2128 cmd.exe 91 PID 2128 wrote to memory of 1508 2128 cmd.exe 91
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js" "C:\Users\Admin\AppData\Local\Temp\\undressgreet.bat" && "C:\Users\Admin\AppData\Local\Temp\\undressgreet.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\findstr.exefindstr /V ruindoctor ""C:\Users\Admin\AppData\Local\Temp\\undressgreet.bat""3⤵PID:3352
-
-
C:\Windows\system32\certutil.execertutil -f -decode carpenternotice reflectfrighten.dll3⤵PID:452
-
-
C:\Windows\system32\regsvr32.exeregsvr32 reflectfrighten.dll3⤵
- Loads dropped DLL
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD57aadb9da416942764469b6c0c8e12922
SHA19858f24cb90eff1d571797d2ff63037399e53731
SHA256449102b6c23dbcd82a0814b0339a874a0364cff84cb4243509e923612fe6c5f6
SHA512c9ea821823489b2cea21302585c39fd848abb62381af5ac532fe9566afee81d8c516914ed2e67c7ec59d1a8a8dd6867d6970edeebb235ba512e422698ff2e96b
-
Filesize
2.7MB
MD5d827a8436775f234c70014c84a5b172a
SHA1783487578a110c001c1f4bac0f6738219851aaaa
SHA2561cce53f25e060a91c796fe15d2f400821a638d20b25ea4209448ecfb1ea273f3
SHA51253715b7ea60134c624c3015cb0a480b0857fd14bf64a0984a09b84daf5e84ec80abd4f93d7081c95acd7594bafa903a17465c5741b71d65d7be574e5ee4afb2f
-
Filesize
2.7MB
MD5d827a8436775f234c70014c84a5b172a
SHA1783487578a110c001c1f4bac0f6738219851aaaa
SHA2561cce53f25e060a91c796fe15d2f400821a638d20b25ea4209448ecfb1ea273f3
SHA51253715b7ea60134c624c3015cb0a480b0857fd14bf64a0984a09b84daf5e84ec80abd4f93d7081c95acd7594bafa903a17465c5741b71d65d7be574e5ee4afb2f
-
Filesize
3.7MB
MD5f3b0e72e66e1324a2ab94285f069501a
SHA1d96cb05ee0d622d3cab1c163bddc5e1d8e5280d2
SHA2567c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca
SHA5129c2847a3f9bda12f75afbb4c46cbd8c00177f290722ffe83f819fea9802d6d896c719f0910ca1eb4192a09c786d3134f504e54a93df9bb77b9d82f899b9db197
-
Filesize
3.7MB
MD5f3b0e72e66e1324a2ab94285f069501a
SHA1d96cb05ee0d622d3cab1c163bddc5e1d8e5280d2
SHA2567c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca
SHA5129c2847a3f9bda12f75afbb4c46cbd8c00177f290722ffe83f819fea9802d6d896c719f0910ca1eb4192a09c786d3134f504e54a93df9bb77b9d82f899b9db197