Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 14:44
Static task
static1
Behavioral task
behavioral1
Sample
slopewell-offculturedairplane.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
slopewell-offculturedairplane.bat
Resource
win10v2004-20241007-en
General
-
Target
slopewell-offculturedairplane.bat
-
Size
403KB
-
MD5
41447efea024e6158c5711c4982af676
-
SHA1
b52c1b3849249cc0504b82833c8610b4167cd0b1
-
SHA256
a2e6bd6582e3002fbd8230007f23047fcacd7ddc071a287e42f54cf4572db5fe
-
SHA512
d5a29e3b264672b33049984030443f505b573137636420c9b29ddf258a118cb1089caa859ce8f89da2cc1d37607fc8454a19385b77926ea793a6c8c9f77ead1b
-
SSDEEP
6144:SNGQJKf11ZZewEP7eXGON4FhDGTcJoBY1zWi9qgsgUpQ47GK+:SZKd7ZewaON4FhDGTcJk7i9xbUc
Malware Config
Extracted
strela
193.109.85.77
-
url_path
/server.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537
Signatures
-
Detects Strela Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/736-5-0x0000000002C00000-0x0000000002C21000-memory.dmp family_strela behavioral2/memory/736-7-0x0000000002C00000-0x0000000002C21000-memory.dmp family_strela behavioral2/memory/736-6-0x000000006D7C0000-0x000000006D800000-memory.dmp family_strela -
Strela family
-
Loads dropped DLL 1 IoCs
pid Process 736 regsvr32.exe -
pid Process 2320 certutil.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4900 wrote to memory of 5092 4900 cmd.exe 84 PID 4900 wrote to memory of 5092 4900 cmd.exe 84 PID 4900 wrote to memory of 2320 4900 cmd.exe 85 PID 4900 wrote to memory of 2320 4900 cmd.exe 85 PID 4900 wrote to memory of 736 4900 cmd.exe 86 PID 4900 wrote to memory of 736 4900 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\slopewell-offculturedairplane.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\findstr.exefindstr /V officebaiteggsexpect "C:\Users\Admin\AppData\Local\Temp\slopewell-offculturedairplane.bat"2⤵PID:5092
-
-
C:\Windows\system32\certutil.execertutil -f -decode advicediscoverjeansupbeat energeticliverelyamused.dll2⤵
- Deobfuscate/Decode Files or Information
PID:2320
-
-
C:\Windows\system32\regsvr32.exeregsvr32 energeticliverelyamused.dll2⤵
- Loads dropped DLL
PID:736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD53de4c4dddf82847e0418a9d1390a7d05
SHA16f00c75e9edc101872f3619f2906e2647335e1b2
SHA2562d3612d43407870a6d59beebae4f726d9cbcef2127f600facda949251fcefcc7
SHA5128ab0ccaf715b37c8c180a3bab37584513c37edf734ce58a3a901fc8c13f823be42d062f2d85a3aac3fe7f28f4ab0158c198e89946f7d0b59f40e44b3ebb4f4b5
-
Filesize
227KB
MD5b87b94262e7ee819933cc0ed51cf665c
SHA10094d6ead5447d3e74f6c08a03d65b8ed47b2bde
SHA256e534b69015fec9196a1cbd77664b40f8ac474385c06ed2385321417b7c1b26a4
SHA512d05a9d48f612ef88f43f84da351dfce73f3c7c2c536b4e5512d4449288a478b5102e572266efdbf0c0f70e4bdbd1561b2c040e4a6306e27f9f7f01fa562ec1a9