Overview
overview
10Static
static
1½�...�/1.js
windows7-x64
10½�...�/1.js
windows10-2004-x64
10½�.../10.js
windows7-x64
8½�.../10.js
windows10-2004-x64
8½�.../11.js
windows7-x64
3½�.../11.js
windows10-2004-x64
8½�.../12.js
windows7-x64
8½�.../12.js
windows10-2004-x64
8½�.../13.js
windows7-x64
3½�.../13.js
windows10-2004-x64
8½�.../14.js
windows7-x64
3½�.../14.js
windows10-2004-x64
8½�.../15.js
windows7-x64
10½�.../15.js
windows10-2004-x64
10½�.../16.js
windows7-x64
10½�.../16.js
windows10-2004-x64
10½�.../17.js
windows7-x64
3½�.../17.js
windows10-2004-x64
7½�.../18.js
windows7-x64
3½�.../18.js
windows10-2004-x64
7½�.../19.js
windows7-x64
3½�.../19.js
windows10-2004-x64
8½�...�/2.js
windows7-x64
10½�...�/2.js
windows10-2004-x64
10½�.../20.js
windows7-x64
10½�.../20.js
windows10-2004-x64
10½�.../21.js
windows7-x64
1½�.../21.js
windows10-2004-x64
1½�.../22.js
windows7-x64
10½�.../22.js
windows10-2004-x64
10½�.../23.js
windows7-x64
3½�.../23.js
windows10-2004-x64
8Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 03:57
Static task
static1
Behavioral task
behavioral1
Sample
½ļ/1.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
½ļ/1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
½ļ/10.js
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
½ļ/10.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
½ļ/11.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
½ļ/11.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
½ļ/12.js
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
½ļ/12.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
½ļ/13.js
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
½ļ/13.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
½ļ/14.js
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
½ļ/14.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
½ļ/15.js
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
½ļ/15.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
½ļ/16.js
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
½ļ/16.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
½ļ/17.js
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
½ļ/17.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
½ļ/18.js
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
½ļ/18.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
½ļ/19.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
½ļ/19.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
½ļ/2.js
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
½ļ/2.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
½ļ/20.js
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
½ļ/20.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
½ļ/21.js
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
½ļ/21.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
½ļ/22.js
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
½ļ/22.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
½ļ/23.js
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
½ļ/23.js
Resource
win10v2004-20230915-en
General
-
Target
½ļ/20.js
-
Size
982KB
-
MD5
17f46833b1bc68b633d87096e2554211
-
SHA1
caec4514c2ffeeb990f060f7d23939b3fae3616f
-
SHA256
d01f48387858ae24bd9cb56464a3583d4c63b3ff1429c9dd78b1b5b6fc1ac969
-
SHA512
bdcf3ee58572c2c08cb4d4ebe55113c48b126b97d143d153699f79f6d64e28bf52a848b5e6c938af3e11400ebc80995e8805829e14dda4da0c8731245ca2054f
-
SSDEEP
24576:4whGo0174uWj+JO459UceUOPwHuVUVJHBcF1+kNXoIv9kB94LLb+J:e
Malware Config
Extracted
strela
91.215.85.209
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe 2872 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2656 1916 wscript.exe 28 PID 1916 wrote to memory of 2656 1916 wscript.exe 28 PID 1916 wrote to memory of 2656 1916 wscript.exe 28 PID 2656 wrote to memory of 2668 2656 cmd.exe 30 PID 2656 wrote to memory of 2668 2656 cmd.exe 30 PID 2656 wrote to memory of 2668 2656 cmd.exe 30 PID 2656 wrote to memory of 2688 2656 cmd.exe 31 PID 2656 wrote to memory of 2688 2656 cmd.exe 31 PID 2656 wrote to memory of 2688 2656 cmd.exe 31 PID 2656 wrote to memory of 2872 2656 cmd.exe 32 PID 2656 wrote to memory of 2872 2656 cmd.exe 32 PID 2656 wrote to memory of 2872 2656 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\½ļ\20.js1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\½ļ\20.js" "C:\Users\Admin\AppData\Local\TempP1QG0Z.bat" && "C:\Users\Admin\AppData\Local\TempP1QG0Z.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\findstr.exefindstr /V FYR0TO ""C:\Users\Admin\AppData\Local\TempP1QG0Z.bat""3⤵PID:2668
-
-
C:\Windows\system32\certutil.execertutil -f -decodehex 044NGP O42NRC.dll3⤵PID:2688
-
-
C:\Windows\system32\rundll32.exerundll32 O42NRC.dll,f3⤵
- Loads dropped DLL
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
982KB
MD517f46833b1bc68b633d87096e2554211
SHA1caec4514c2ffeeb990f060f7d23939b3fae3616f
SHA256d01f48387858ae24bd9cb56464a3583d4c63b3ff1429c9dd78b1b5b6fc1ac969
SHA512bdcf3ee58572c2c08cb4d4ebe55113c48b126b97d143d153699f79f6d64e28bf52a848b5e6c938af3e11400ebc80995e8805829e14dda4da0c8731245ca2054f
-
Filesize
982KB
MD517f46833b1bc68b633d87096e2554211
SHA1caec4514c2ffeeb990f060f7d23939b3fae3616f
SHA256d01f48387858ae24bd9cb56464a3583d4c63b3ff1429c9dd78b1b5b6fc1ac969
SHA512bdcf3ee58572c2c08cb4d4ebe55113c48b126b97d143d153699f79f6d64e28bf52a848b5e6c938af3e11400ebc80995e8805829e14dda4da0c8731245ca2054f
-
Filesize
981KB
MD57432042a84d254f5fdd894c2ba8b9e31
SHA16770385dc62dea6c00e486a85d587657282b10e6
SHA2567c90cc82c8ac916885d4916de7cdff3e20e10d2ef643c5787d7e9637ad517518
SHA5125d0c0ace5903f1d2eca67db84a0cf260e37391baa57b64e68d3968e530aed67d7f1c3f6ca7320c6a4c1c647b277c8f2e60232882cb3347a4d73507a77aa01098
-
Filesize
327KB
MD53fd89b48eea601e19ce958333d617f7a
SHA10bd0068492d45cd1be3f023122f52b8f453df4da
SHA256ceb73e9ef84bcdf0538ae8084c482fd21d7501672fb95010e424c9af5596bf6d
SHA51271a6aba16b53b6e61192708172a572afef61205289e506ef8d026e584424f10a976361ca8a438384438696d5ba756ad3b66d7150bef2125a3691009b55f198fc
-
Filesize
327KB
MD53fd89b48eea601e19ce958333d617f7a
SHA10bd0068492d45cd1be3f023122f52b8f453df4da
SHA256ceb73e9ef84bcdf0538ae8084c482fd21d7501672fb95010e424c9af5596bf6d
SHA51271a6aba16b53b6e61192708172a572afef61205289e506ef8d026e584424f10a976361ca8a438384438696d5ba756ad3b66d7150bef2125a3691009b55f198fc
-
Filesize
327KB
MD53fd89b48eea601e19ce958333d617f7a
SHA10bd0068492d45cd1be3f023122f52b8f453df4da
SHA256ceb73e9ef84bcdf0538ae8084c482fd21d7501672fb95010e424c9af5596bf6d
SHA51271a6aba16b53b6e61192708172a572afef61205289e506ef8d026e584424f10a976361ca8a438384438696d5ba756ad3b66d7150bef2125a3691009b55f198fc
-
Filesize
327KB
MD53fd89b48eea601e19ce958333d617f7a
SHA10bd0068492d45cd1be3f023122f52b8f453df4da
SHA256ceb73e9ef84bcdf0538ae8084c482fd21d7501672fb95010e424c9af5596bf6d
SHA51271a6aba16b53b6e61192708172a572afef61205289e506ef8d026e584424f10a976361ca8a438384438696d5ba756ad3b66d7150bef2125a3691009b55f198fc
-
Filesize
327KB
MD53fd89b48eea601e19ce958333d617f7a
SHA10bd0068492d45cd1be3f023122f52b8f453df4da
SHA256ceb73e9ef84bcdf0538ae8084c482fd21d7501672fb95010e424c9af5596bf6d
SHA51271a6aba16b53b6e61192708172a572afef61205289e506ef8d026e584424f10a976361ca8a438384438696d5ba756ad3b66d7150bef2125a3691009b55f198fc