Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
11074822014705.js
Resource
win7-20231020-en
General
-
Target
11074822014705.js
-
Size
6.5MB
-
MD5
8e75c8837c8288c2abd1c4ae364bb553
-
SHA1
5cf4550318b5f2eaca312149f06f5872f531785a
-
SHA256
15cacb4f952177a2bbe3834a8c2217aa6ef5b78a8cd8af42ada9ff5a992292fc
-
SHA512
1a7cacdeca0fbc0115674e41ce4ed68051c706928a2ee87121218908af2e9bbf01c7f3bce12f9facaf98a9b0a86a10f8f6e51cd073ff346ccda3c0e020275aa1
-
SSDEEP
24576:aM28t5oydiys4k1XWk6uyBWXJCirWqXNGLH5HvuVLptpWqm6xVowk8dppKEvzVBi:Ns47TiwQ5x2uA1Y0fm1nmlUiUbUN
Malware Config
Extracted
strela
193.109.85.77
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2716 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2716 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2088 1264 wscript.exe 28 PID 1264 wrote to memory of 2088 1264 wscript.exe 28 PID 1264 wrote to memory of 2088 1264 wscript.exe 28 PID 2088 wrote to memory of 1712 2088 cmd.exe 30 PID 2088 wrote to memory of 1712 2088 cmd.exe 30 PID 2088 wrote to memory of 1712 2088 cmd.exe 30 PID 2088 wrote to memory of 2312 2088 cmd.exe 31 PID 2088 wrote to memory of 2312 2088 cmd.exe 31 PID 2088 wrote to memory of 2312 2088 cmd.exe 31 PID 2088 wrote to memory of 2716 2088 cmd.exe 32 PID 2088 wrote to memory of 2716 2088 cmd.exe 32 PID 2088 wrote to memory of 2716 2088 cmd.exe 32 PID 2088 wrote to memory of 2716 2088 cmd.exe 32 PID 2088 wrote to memory of 2716 2088 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\11074822014705.js1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\11074822014705.js" "C:\Users\Admin\AppData\Local\Temp\\smoggywhiteoddelectric.bat" && "C:\Users\Admin\AppData\Local\Temp\\smoggywhiteoddelectric.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\findstr.exefindstr /V amusescintillatingthunderingdeadpan ""C:\Users\Admin\AppData\Local\Temp\\smoggywhiteoddelectric.bat""3⤵PID:1712
-
-
C:\Windows\system32\certutil.execertutil -f -decode trueterrificdebonairfireman harassbegabhorrentnotice.dll3⤵PID:2312
-
-
C:\Windows\system32\regsvr32.exeregsvr32 harassbegabhorrentnotice.dll3⤵
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5384dac3b43bea5b51b862675b3f46cad
SHA10ff5b5440e2fee3b5846c887d38560fc9e99bb00
SHA2563efc0fc3ce934509a40e83f2414bcc2708b5c111a1ddb2441f3704243fb4e2dc
SHA512cdbf723866cc2aee637f840e351493a839a9614c7f4f6b1740ae8ee5aa676c76c5093085ff57c101188e48a2ca4480ee6ed6f6285fe9de43b0a9e6df77f154c2
-
Filesize
6.5MB
MD58e75c8837c8288c2abd1c4ae364bb553
SHA15cf4550318b5f2eaca312149f06f5872f531785a
SHA25615cacb4f952177a2bbe3834a8c2217aa6ef5b78a8cd8af42ada9ff5a992292fc
SHA5121a7cacdeca0fbc0115674e41ce4ed68051c706928a2ee87121218908af2e9bbf01c7f3bce12f9facaf98a9b0a86a10f8f6e51cd073ff346ccda3c0e020275aa1
-
Filesize
6.5MB
MD58e75c8837c8288c2abd1c4ae364bb553
SHA15cf4550318b5f2eaca312149f06f5872f531785a
SHA25615cacb4f952177a2bbe3834a8c2217aa6ef5b78a8cd8af42ada9ff5a992292fc
SHA5121a7cacdeca0fbc0115674e41ce4ed68051c706928a2ee87121218908af2e9bbf01c7f3bce12f9facaf98a9b0a86a10f8f6e51cd073ff346ccda3c0e020275aa1
-
Filesize
6.4MB
MD5987844df8910f57e337f9309419d3998
SHA1f95606120a8cdd0305d889df88a128d4d396824d
SHA2562347fe92811a8952b8783b2419872500f08060a58bb2415429f802044233da0b
SHA512a72383aa46bbfae75480fd2347da1a50df69ddb3b8dc1cb1cab1604e41b9732dbd2021ae656a3a74671194a272d9c4aedffa5ad036b46882049a640986807c66
-
Filesize
4.8MB
MD5384dac3b43bea5b51b862675b3f46cad
SHA10ff5b5440e2fee3b5846c887d38560fc9e99bb00
SHA2563efc0fc3ce934509a40e83f2414bcc2708b5c111a1ddb2441f3704243fb4e2dc
SHA512cdbf723866cc2aee637f840e351493a839a9614c7f4f6b1740ae8ee5aa676c76c5093085ff57c101188e48a2ca4480ee6ed6f6285fe9de43b0a9e6df77f154c2