Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 02:36
Static task
static1
Behavioral task
behavioral1
Sample
b7e9e72922bbafab57989a81d72e1dee75ae384bd975cce8a707417cc1df725a.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7e9e72922bbafab57989a81d72e1dee75ae384bd975cce8a707417cc1df725a.js
Resource
win10v2004-20241007-en
General
-
Target
b7e9e72922bbafab57989a81d72e1dee75ae384bd975cce8a707417cc1df725a.js
-
Size
955KB
-
MD5
46585cfdb357b9c32e0aed02376dea2c
-
SHA1
3525ccecb41582261ba6401d34b56cfdb7ec0d1e
-
SHA256
b7e9e72922bbafab57989a81d72e1dee75ae384bd975cce8a707417cc1df725a
-
SHA512
52b9a853aec1268ed4304a3712a50a59d12ae4777eb5108920b7e8518ee6800449597d43a29fc73e33e4e3375c8a9fc99e55c7a47b54bed03aea7ef48e238929
-
SSDEEP
6144:nj8EnXTkIEmXTSPAKujxQ2ZFnQsa45Z44HQ6YGhz00KY6RRs44lEhc6cgPEtcExS:nwmsGKcdssa474tYR0rGlfcEo
Malware Config
Extracted
strrat
chongmei33.publicvm.com:44662
chongmei33.myddns.rocks:44662
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
true
-
secondary_startup
true
-
startup
true
Signatures
-
Strrat family
-
Blocklisted process makes network request 13 IoCs
flow pid Process 4 2652 wscript.exe 6 2652 wscript.exe 7 2652 wscript.exe 9 2652 wscript.exe 10 2652 wscript.exe 11 2652 wscript.exe 13 2652 wscript.exe 14 2652 wscript.exe 15 2652 wscript.exe 17 2652 wscript.exe 18 2652 wscript.exe 19 2652 wscript.exe 21 2652 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\word.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\word.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\word = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\word.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\word = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\word.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\word = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\word.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\word = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\word.js\"" WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2812 2084 wscript.exe 31 PID 2084 wrote to memory of 2812 2084 wscript.exe 31 PID 2084 wrote to memory of 2812 2084 wscript.exe 31 PID 2084 wrote to memory of 2708 2084 wscript.exe 32 PID 2084 wrote to memory of 2708 2084 wscript.exe 32 PID 2084 wrote to memory of 2708 2084 wscript.exe 32 PID 2708 wrote to memory of 2652 2708 WScript.exe 33 PID 2708 wrote to memory of 2652 2708 WScript.exe 33 PID 2708 wrote to memory of 2652 2708 WScript.exe 33 PID 2812 wrote to memory of 2624 2812 WScript.exe 34 PID 2812 wrote to memory of 2624 2812 WScript.exe 34 PID 2812 wrote to memory of 2624 2812 WScript.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\b7e9e72922bbafab57989a81d72e1dee75ae384bd975cce8a707417cc1df725a.js1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\adobe.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\TZQ.jar"3⤵PID:2624
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\word.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\word.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD549b06e70255a9d233ee47e15d9a2e23b
SHA1a4c33ef1c39d7715216c27dc93d417c3eb3ec39e
SHA256db396f9ae63eab45892eed0964926126301abaec49d356765b8cd181572551e5
SHA5121ae0d43afaffb6ea57c493f8ab77b5b5bb2a74203cc5e9c0cb6256443f5f4095eb927d7e2ef276c24c91f7aa370dfd6903bc152a791f7ce69c91061d0c805e84
-
Filesize
376KB
MD566557642aadcc9634d9fd1201d730ed7
SHA1c0aeeaa215a04a1f87385dfa1395420969a40fa8
SHA2566db12be58fe93da654afb1f98737e2e1fa05be9c3acce26413792cf30f9e482e
SHA512820f7783339e77d6b2c3f308b0df3e56888216fee2d1aee099fb2e09dcbc4ec6926070976b8b948e56ab351c03052b34562ed406681f5cfe8aad92a8a90e66f3
-
Filesize
305KB
MD57baf3694a88ff874e20a3d68a6c060d0
SHA1fd9e22e3d52e0100dc963f776137cb6068e44825
SHA2567693d4d8b365e1e7592dab1df24c67c133d0327a82cfab4f806f894b713b7847
SHA5123ed74145253f5658ee8f253952dd0cbbf7f8f41cfe75a69f36bc954b3eb3a8c1b8bba66459ac3344214ac708aed16abe50be9899dd7b2ee3abc7bf89cc93c2a4