Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2023, 02:40

General

  • Target

    7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js

  • Size

    3.7MB

  • MD5

    f3b0e72e66e1324a2ab94285f069501a

  • SHA1

    d96cb05ee0d622d3cab1c163bddc5e1d8e5280d2

  • SHA256

    7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca

  • SHA512

    9c2847a3f9bda12f75afbb4c46cbd8c00177f290722ffe83f819fea9802d6d896c719f0910ca1eb4192a09c786d3134f504e54a93df9bb77b9d82f899b9db197

  • SSDEEP

    49152:KHEsW6XqiNJhdW2QwkV++sNUrw2CatUbUt:vcC

Score
10/10

Malware Config

Extracted

Family

strela

C2

193.109.85.77

Signatures

  • Strela

    An info stealer targeting mail credentials first seen in late 2022.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca.js" "C:\Users\Admin\AppData\Local\Temp\\undressgreet.bat" && "C:\Users\Admin\AppData\Local\Temp\\undressgreet.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\system32\findstr.exe
        findstr /V ruindoctor ""C:\Users\Admin\AppData\Local\Temp\\undressgreet.bat""
        3⤵
          PID:3352
        • C:\Windows\system32\certutil.exe
          certutil -f -decode carpenternotice reflectfrighten.dll
          3⤵
            PID:452
          • C:\Windows\system32\regsvr32.exe
            regsvr32 reflectfrighten.dll
            3⤵
            • Loads dropped DLL
            PID:1508

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\carpenternotice

        Filesize

        3.6MB

        MD5

        7aadb9da416942764469b6c0c8e12922

        SHA1

        9858f24cb90eff1d571797d2ff63037399e53731

        SHA256

        449102b6c23dbcd82a0814b0339a874a0364cff84cb4243509e923612fe6c5f6

        SHA512

        c9ea821823489b2cea21302585c39fd848abb62381af5ac532fe9566afee81d8c516914ed2e67c7ec59d1a8a8dd6867d6970edeebb235ba512e422698ff2e96b

      • C:\Users\Admin\AppData\Local\Temp\reflectfrighten.dll

        Filesize

        2.7MB

        MD5

        d827a8436775f234c70014c84a5b172a

        SHA1

        783487578a110c001c1f4bac0f6738219851aaaa

        SHA256

        1cce53f25e060a91c796fe15d2f400821a638d20b25ea4209448ecfb1ea273f3

        SHA512

        53715b7ea60134c624c3015cb0a480b0857fd14bf64a0984a09b84daf5e84ec80abd4f93d7081c95acd7594bafa903a17465c5741b71d65d7be574e5ee4afb2f

      • C:\Users\Admin\AppData\Local\Temp\reflectfrighten.dll

        Filesize

        2.7MB

        MD5

        d827a8436775f234c70014c84a5b172a

        SHA1

        783487578a110c001c1f4bac0f6738219851aaaa

        SHA256

        1cce53f25e060a91c796fe15d2f400821a638d20b25ea4209448ecfb1ea273f3

        SHA512

        53715b7ea60134c624c3015cb0a480b0857fd14bf64a0984a09b84daf5e84ec80abd4f93d7081c95acd7594bafa903a17465c5741b71d65d7be574e5ee4afb2f

      • C:\Users\Admin\AppData\Local\Temp\undressgreet.bat

        Filesize

        3.7MB

        MD5

        f3b0e72e66e1324a2ab94285f069501a

        SHA1

        d96cb05ee0d622d3cab1c163bddc5e1d8e5280d2

        SHA256

        7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca

        SHA512

        9c2847a3f9bda12f75afbb4c46cbd8c00177f290722ffe83f819fea9802d6d896c719f0910ca1eb4192a09c786d3134f504e54a93df9bb77b9d82f899b9db197

      • C:\Users\Admin\AppData\Local\Temp\undressgreet.bat

        Filesize

        3.7MB

        MD5

        f3b0e72e66e1324a2ab94285f069501a

        SHA1

        d96cb05ee0d622d3cab1c163bddc5e1d8e5280d2

        SHA256

        7c796e8277fa41ad68ee1a5bed21591ddac49195de6285b628e9d6265ecde2ca

        SHA512

        9c2847a3f9bda12f75afbb4c46cbd8c00177f290722ffe83f819fea9802d6d896c719f0910ca1eb4192a09c786d3134f504e54a93df9bb77b9d82f899b9db197

      • memory/1508-6211-0x0000000002A70000-0x0000000002A91000-memory.dmp

        Filesize

        132KB

      • memory/1508-6212-0x000000006D7C0000-0x000000006DA7B000-memory.dmp

        Filesize

        2.7MB