Malware Analysis Report

2024-12-07 20:47

Sample ID 230817-nvmm1aag8v
Target Payment_Advice.zip
SHA256 21a6cbda0d8cd522b1098ac56ee1693e704289c3fa8c05d00c111e8f061d0aa8
Tags
strrat persistence stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

21a6cbda0d8cd522b1098ac56ee1693e704289c3fa8c05d00c111e8f061d0aa8

Threat Level: Known bad

The file Payment_Advice.zip was found to be: Known bad.

Malicious Activity Summary

strrat persistence stealer trojan

STRRAT

Drops startup file

Adds Run key to start application

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-17 11:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-17 11:43

Reported

2023-08-17 11:45

Platform

win7-20230712-en

Max time kernel

119s

Max time network

123s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\Payment_Advice.jar

Signatures

STRRAT

trojan stealer strrat

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment_Advice.jar C:\Windows\system32\java.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\Payment_Advice = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Payment_Advice.jar\"" C:\Windows\system32\java.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment_Advice = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Payment_Advice.jar\"" C:\Windows\system32\java.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2556 wrote to memory of 2928 N/A C:\Windows\system32\java.exe C:\Windows\system32\cmd.exe
PID 2556 wrote to memory of 2928 N/A C:\Windows\system32\java.exe C:\Windows\system32\cmd.exe
PID 2556 wrote to memory of 2928 N/A C:\Windows\system32\java.exe C:\Windows\system32\cmd.exe
PID 2556 wrote to memory of 2956 N/A C:\Windows\system32\java.exe C:\Program Files\Java\jre7\bin\java.exe
PID 2556 wrote to memory of 2956 N/A C:\Windows\system32\java.exe C:\Program Files\Java\jre7\bin\java.exe
PID 2556 wrote to memory of 2956 N/A C:\Windows\system32\java.exe C:\Program Files\Java\jre7\bin\java.exe
PID 2928 wrote to memory of 2460 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2928 wrote to memory of 2460 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2928 wrote to memory of 2460 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\Payment_Advice.jar

C:\Windows\system32\cmd.exe

cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Payment_Advice.jar"

C:\Program Files\Java\jre7\bin\java.exe

"C:\Program Files\Java\jre7\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\Payment_Advice.jar"

C:\Windows\system32\schtasks.exe

schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Payment_Advice.jar"

Network

N/A

Files

memory/2556-62-0x0000000002060000-0x0000000005060000-memory.dmp

memory/2556-64-0x0000000000430000-0x0000000000431000-memory.dmp

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Payment_Advice.jar

MD5 81672f4c4a4b89a9753e55e26d393678
SHA1 134e34b47bd0e38424472903f358be7a913051a6
SHA256 155945b133a7d5fe816d79c352268273f7150c695ada43ee9c5d7565f8a1e550
SHA512 6d3976df4a86e038d528c932562142817cba8ff8f00958032440673b13bc110af4e9837700a2b0ccf59f3de84aa0fe0de82e8195f1213b71fa93d9cd18f97010

C:\Users\Admin\AppData\Roaming\Payment_Advice.jar

MD5 81672f4c4a4b89a9753e55e26d393678
SHA1 134e34b47bd0e38424472903f358be7a913051a6
SHA256 155945b133a7d5fe816d79c352268273f7150c695ada43ee9c5d7565f8a1e550
SHA512 6d3976df4a86e038d528c932562142817cba8ff8f00958032440673b13bc110af4e9837700a2b0ccf59f3de84aa0fe0de82e8195f1213b71fa93d9cd18f97010

memory/2956-79-0x0000000002230000-0x0000000005230000-memory.dmp

memory/2956-82-0x0000000000120000-0x0000000000121000-memory.dmp

memory/2956-83-0x0000000002230000-0x0000000005230000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-17 11:43

Reported

2023-08-17 11:45

Platform

win10v2004-20230703-en

Max time kernel

147s

Max time network

154s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\Payment_Advice.jar

Signatures

STRRAT

trojan stealer strrat

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment_Advice.jar C:\ProgramData\Oracle\Java\javapath\java.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment_Advice = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Payment_Advice.jar\"" C:\ProgramData\Oracle\Java\javapath\java.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment_Advice = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Payment_Advice.jar\"" C:\ProgramData\Oracle\Java\javapath\java.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Processes

C:\ProgramData\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\Payment_Advice.jar

C:\Windows\SYSTEM32\cmd.exe

cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Payment_Advice.jar"

C:\Program Files\Java\jre1.8.0_66\bin\java.exe

"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\Payment_Advice.jar"

C:\Windows\system32\schtasks.exe

schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Payment_Advice.jar"

Network

Country Destination Domain Proto
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 efcc.duckdns.org udp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
N/A 127.0.0.1:1243 tcp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
US 8.8.8.8:53 efcc.duckdns.org udp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
US 8.8.8.8:53 27.178.89.13.in-addr.arpa udp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp
NL 103.212.81.155:1243 efcc.duckdns.org tcp
N/A 127.0.0.1:1243 tcp

Files

memory/4432-137-0x0000000002550000-0x0000000003550000-memory.dmp

memory/4432-144-0x0000000000970000-0x0000000000971000-memory.dmp

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Payment_Advice.jar

MD5 81672f4c4a4b89a9753e55e26d393678
SHA1 134e34b47bd0e38424472903f358be7a913051a6
SHA256 155945b133a7d5fe816d79c352268273f7150c695ada43ee9c5d7565f8a1e550
SHA512 6d3976df4a86e038d528c932562142817cba8ff8f00958032440673b13bc110af4e9837700a2b0ccf59f3de84aa0fe0de82e8195f1213b71fa93d9cd18f97010

C:\Users\Admin\AppData\Roaming\Payment_Advice.jar

MD5 81672f4c4a4b89a9753e55e26d393678
SHA1 134e34b47bd0e38424472903f358be7a913051a6
SHA256 155945b133a7d5fe816d79c352268273f7150c695ada43ee9c5d7565f8a1e550
SHA512 6d3976df4a86e038d528c932562142817cba8ff8f00958032440673b13bc110af4e9837700a2b0ccf59f3de84aa0fe0de82e8195f1213b71fa93d9cd18f97010

memory/2088-158-0x0000000002BA0000-0x0000000003BA0000-memory.dmp

C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp

MD5 50c9dc889cea99938b9d6c582c83a6ee
SHA1 140f70e7675e30756277037f1911680b460cc168
SHA256 cedff0fe5b262df48d729f84c1d00e93985e72af0280ab577119da0e18e8d5cf
SHA512 ad04b0dfc875dd79c213fac2440c447bca90ce14d808b0edec2b3649e8c8c63732b36cd7c72c1cb59f5efc98054fbc828277180bfb78854738b848a83f904c2f

memory/2088-170-0x0000000002BA0000-0x0000000003BA0000-memory.dmp