Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2024, 16:07

General

  • Target

    18262829011200.js

  • Size

    345KB

  • MD5

    301503edfb1ea723b231b416c2a81f0f

  • SHA1

    dd41fda85637d2593ef4aad407371ec830fe171d

  • SHA256

    544887bc3f0dccb610dd7ba35b498a03ea32fca047e133a0639d5bca61cc6f45

  • SHA512

    f5df4b28a0f012b458026ef7caa2f460f51476a67e63e63641631dc5672b4920422618afb36af17373ffdfcc678370dc965678f3d3f1dda5326589c2a471f9d5

  • SSDEEP

    6144:FSxcuKYMvWe+ch9Bi7PoOCSElpHMnOInDOWPZsngSKTj+c42pf:+cRYMv5+ctgEBmODYsw+h2pf

Malware Config

Extracted

Family

strela

C2

193.109.85.231

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

  • Loads dropped DLL 4 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\18262829011200.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\18262829011200.js" "C:\Users\Admin\AppData\Local\Temp\\trousersperpetual.bat" && "C:\Users\Admin\AppData\Local\Temp\\trousersperpetual.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\system32\findstr.exe
        findstr /V marrywise ""C:\Users\Admin\AppData\Local\Temp\\trousersperpetual.bat""
        3⤵
          PID:1856
        • C:\Windows\system32\certutil.exe
          certutil -f -decode magnificentdevelopment returnready.dll
          3⤵
          • Deobfuscate/Decode Files or Information
          PID:2784
        • C:\Windows\system32\cmd.exe
          cmd /c rundll32 returnready.dll,m
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\system32\rundll32.exe
            rundll32 returnready.dll,m
            4⤵
            • Loads dropped DLL
            PID:2468

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\magnificentdevelopment

            Filesize

            338KB

            MD5

            04d8d28e9039e6861017650bb59f24b3

            SHA1

            53741049bc23ab05658dc32ad54326a87dd0edee

            SHA256

            54d3f28c9044ca9b16d3584d7bfac00c65f8aa6369801b340e1a7348d4681bef

            SHA512

            05c9830335b82a5dd020e097e8fb3241e52d60875d951b13dfe82ad590c922ed6884ae5f9a1d2a6270c0d3456bc88ed8d373c5fdedca8a604f65ce986f00cf32

          • C:\Users\Admin\AppData\Local\Temp\returnready.dll

            Filesize

            252KB

            MD5

            9499f14143b34ea7703c73b5f9b37013

            SHA1

            ceff6b19826c9a4e9b9e8cbcc512d5241a27825e

            SHA256

            e6991b12e86629b38e178fef129dfda1d454391ffbb236703f8c026d6d55b9a1

            SHA512

            f14dec41f677fb3e2af064b4b7a6b3b15bec8429a831a78247513853d4ce7511ed37e89e52ebadbed03ab9115dcea3cc316b90e99c939d07402b5a554d722668

          • C:\Users\Admin\AppData\Local\Temp\trousersperpetual.bat

            Filesize

            345KB

            MD5

            301503edfb1ea723b231b416c2a81f0f

            SHA1

            dd41fda85637d2593ef4aad407371ec830fe171d

            SHA256

            544887bc3f0dccb610dd7ba35b498a03ea32fca047e133a0639d5bca61cc6f45

            SHA512

            f5df4b28a0f012b458026ef7caa2f460f51476a67e63e63641631dc5672b4920422618afb36af17373ffdfcc678370dc965678f3d3f1dda5326589c2a471f9d5

          • memory/2468-393-0x0000000000470000-0x0000000000493000-memory.dmp

            Filesize

            140KB

          • memory/2468-395-0x0000000000470000-0x0000000000493000-memory.dmp

            Filesize

            140KB

          • memory/2468-394-0x000007FEFAA00000-0x000007FEFAA47000-memory.dmp

            Filesize

            284KB