Malware Analysis Report

2024-11-13 18:33

Sample ID 231011-r75k5aga84
Target PAYMENT-9262023.js
SHA256 24d1e734345b0206fd0c673cb5a98f876cf4392c79c5f5dc5237b61ca37afb7c
Tags
strrat stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

24d1e734345b0206fd0c673cb5a98f876cf4392c79c5f5dc5237b61ca37afb7c

Threat Level: Known bad

The file PAYMENT-9262023.js was found to be: Known bad.

Malicious Activity Summary

strrat stealer trojan

STRRAT

Checks computer location settings

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-11 14:51

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-11 14:51

Reported

2023-10-12 04:27

Platform

win7-20230831-en

Max time kernel

149s

Max time network

157s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\PAYMENT-9262023.js

Signatures

STRRAT

trojan stealer strrat

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2548 wrote to memory of 3052 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\java.exe
PID 2548 wrote to memory of 3052 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\java.exe
PID 2548 wrote to memory of 3052 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\java.exe

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\PAYMENT-9262023.js

C:\Windows\System32\java.exe

"C:\Windows\System32\java.exe" -jar "C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar"

Network

Country Destination Domain Proto
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 github.com udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 140.82.114.3:443 github.com tcp
US 140.82.114.3:443 github.com tcp
US 140.82.114.3:443 github.com tcp
US 140.82.114.3:443 github.com tcp
US 140.82.114.3:443 github.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar

MD5 ee415321c29634b711dd60a761364aaa
SHA1 f62440bcd9c9c2f5e41f289de239a263bf64286f
SHA256 858723e08c08e1f795d8d99516b6c74571ceef624fd91c5b14cea7db982a758c
SHA512 c7bffe51260280b98ed624d73374477e56e9a03cc1b1d181c9b1f6a3d6e6f5b7917d8594335d11f39759ad7b62e8ffa3a258d4ab4758a5d1aed6b7c4402b129e

memory/3052-4-0x0000000002260000-0x0000000005260000-memory.dmp

memory/3052-7-0x0000000002260000-0x0000000005260000-memory.dmp

memory/3052-13-0x0000000000220000-0x0000000000221000-memory.dmp

memory/3052-15-0x0000000000220000-0x0000000000221000-memory.dmp

memory/3052-36-0x0000000000220000-0x0000000000221000-memory.dmp

memory/3052-43-0x0000000000220000-0x0000000000221000-memory.dmp

memory/3052-58-0x0000000000220000-0x0000000000221000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-11 14:51

Reported

2023-10-12 04:28

Platform

win10v2004-20230915-en

Max time kernel

182s

Max time network

199s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\PAYMENT-9262023.js

Signatures

STRRAT

trojan stealer strrat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation C:\Windows\system32\wscript.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb C:\Program Files\Java\jre1.8.0_66\bin\java.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1184 wrote to memory of 1112 N/A C:\Windows\system32\wscript.exe C:\Program Files\Java\jre1.8.0_66\bin\java.exe
PID 1184 wrote to memory of 1112 N/A C:\Windows\system32\wscript.exe C:\Program Files\Java\jre1.8.0_66\bin\java.exe

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\PAYMENT-9262023.js

C:\Program Files\Java\jre1.8.0_66\bin\java.exe

"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 29.81.57.23.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 54.120.234.20.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar

MD5 ee415321c29634b711dd60a761364aaa
SHA1 f62440bcd9c9c2f5e41f289de239a263bf64286f
SHA256 858723e08c08e1f795d8d99516b6c74571ceef624fd91c5b14cea7db982a758c
SHA512 c7bffe51260280b98ed624d73374477e56e9a03cc1b1d181c9b1f6a3d6e6f5b7917d8594335d11f39759ad7b62e8ffa3a258d4ab4758a5d1aed6b7c4402b129e

memory/1112-4-0x0000000002E70000-0x0000000003E70000-memory.dmp

memory/1112-13-0x0000000002B70000-0x0000000002B71000-memory.dmp

memory/1112-14-0x0000000002E70000-0x0000000003E70000-memory.dmp

memory/1112-16-0x0000000002B70000-0x0000000002B71000-memory.dmp