Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 14:44

General

  • Target

    slopewell-offculturedairplane.bat

  • Size

    403KB

  • MD5

    41447efea024e6158c5711c4982af676

  • SHA1

    b52c1b3849249cc0504b82833c8610b4167cd0b1

  • SHA256

    a2e6bd6582e3002fbd8230007f23047fcacd7ddc071a287e42f54cf4572db5fe

  • SHA512

    d5a29e3b264672b33049984030443f505b573137636420c9b29ddf258a118cb1089caa859ce8f89da2cc1d37607fc8454a19385b77926ea793a6c8c9f77ead1b

  • SSDEEP

    6144:SNGQJKf11ZZewEP7eXGON4FhDGTcJoBY1zWi9qgsgUpQ47GK+:SZKd7ZewaON4FhDGTcJk7i9xbUc

Malware Config

Extracted

Family

strela

C2

193.109.85.77

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

  • Loads dropped DLL 1 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\slopewell-offculturedairplane.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\system32\findstr.exe
      findstr /V officebaiteggsexpect "C:\Users\Admin\AppData\Local\Temp\slopewell-offculturedairplane.bat"
      2⤵
        PID:5092
      • C:\Windows\system32\certutil.exe
        certutil -f -decode advicediscoverjeansupbeat energeticliverelyamused.dll
        2⤵
        • Deobfuscate/Decode Files or Information
        PID:2320
      • C:\Windows\system32\regsvr32.exe
        regsvr32 energeticliverelyamused.dll
        2⤵
        • Loads dropped DLL
        PID:736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\advicediscoverjeansupbeat

      Filesize

      303KB

      MD5

      3de4c4dddf82847e0418a9d1390a7d05

      SHA1

      6f00c75e9edc101872f3619f2906e2647335e1b2

      SHA256

      2d3612d43407870a6d59beebae4f726d9cbcef2127f600facda949251fcefcc7

      SHA512

      8ab0ccaf715b37c8c180a3bab37584513c37edf734ce58a3a901fc8c13f823be42d062f2d85a3aac3fe7f28f4ab0158c198e89946f7d0b59f40e44b3ebb4f4b5

    • C:\Users\Admin\AppData\Local\Temp\energeticliverelyamused.dll

      Filesize

      227KB

      MD5

      b87b94262e7ee819933cc0ed51cf665c

      SHA1

      0094d6ead5447d3e74f6c08a03d65b8ed47b2bde

      SHA256

      e534b69015fec9196a1cbd77664b40f8ac474385c06ed2385321417b7c1b26a4

      SHA512

      d05a9d48f612ef88f43f84da351dfce73f3c7c2c536b4e5512d4449288a478b5102e572266efdbf0c0f70e4bdbd1561b2c040e4a6306e27f9f7f01fa562ec1a9

    • memory/736-5-0x0000000002C00000-0x0000000002C21000-memory.dmp

      Filesize

      132KB

    • memory/736-7-0x0000000002C00000-0x0000000002C21000-memory.dmp

      Filesize

      132KB

    • memory/736-6-0x000000006D7C0000-0x000000006D800000-memory.dmp

      Filesize

      256KB