Analysis Overview
SHA256
24d1e734345b0206fd0c673cb5a98f876cf4392c79c5f5dc5237b61ca37afb7c
Threat Level: Known bad
The file PAYMENT-9262023.js was found to be: Known bad.
Malicious Activity Summary
STRRAT
Checks computer location settings
Drops file in Program Files directory
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-10-11 14:51
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-11 14:51
Reported
2023-10-12 04:27
Platform
win7-20230831-en
Max time kernel
149s
Max time network
157s
Command Line
Signatures
STRRAT
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2548 wrote to memory of 3052 | N/A | C:\Windows\system32\wscript.exe | C:\Windows\System32\java.exe |
| PID 2548 wrote to memory of 3052 | N/A | C:\Windows\system32\wscript.exe | C:\Windows\System32\java.exe |
| PID 2548 wrote to memory of 3052 | N/A | C:\Windows\system32\wscript.exe | C:\Windows\System32\java.exe |
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\PAYMENT-9262023.js
C:\Windows\System32\java.exe
"C:\Windows\System32\java.exe" -jar "C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | repo1.maven.org | udp |
| US | 8.8.8.8:53 | github.com | udp |
| US | 199.232.192.209:443 | repo1.maven.org | tcp |
| US | 199.232.192.209:443 | repo1.maven.org | tcp |
| US | 199.232.192.209:443 | repo1.maven.org | tcp |
| US | 140.82.114.3:443 | github.com | tcp |
| US | 140.82.114.3:443 | github.com | tcp |
| US | 140.82.114.3:443 | github.com | tcp |
| US | 140.82.114.3:443 | github.com | tcp |
| US | 140.82.114.3:443 | github.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar
| MD5 | ee415321c29634b711dd60a761364aaa |
| SHA1 | f62440bcd9c9c2f5e41f289de239a263bf64286f |
| SHA256 | 858723e08c08e1f795d8d99516b6c74571ceef624fd91c5b14cea7db982a758c |
| SHA512 | c7bffe51260280b98ed624d73374477e56e9a03cc1b1d181c9b1f6a3d6e6f5b7917d8594335d11f39759ad7b62e8ffa3a258d4ab4758a5d1aed6b7c4402b129e |
memory/3052-4-0x0000000002260000-0x0000000005260000-memory.dmp
memory/3052-7-0x0000000002260000-0x0000000005260000-memory.dmp
memory/3052-13-0x0000000000220000-0x0000000000221000-memory.dmp
memory/3052-15-0x0000000000220000-0x0000000000221000-memory.dmp
memory/3052-36-0x0000000000220000-0x0000000000221000-memory.dmp
memory/3052-43-0x0000000000220000-0x0000000000221000-memory.dmp
memory/3052-58-0x0000000000220000-0x0000000000221000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-11 14:51
Reported
2023-10-12 04:28
Platform
win10v2004-20230915-en
Max time kernel
182s
Max time network
199s
Command Line
Signatures
STRRAT
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation | C:\Windows\system32\wscript.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb | C:\Program Files\Java\jre1.8.0_66\bin\java.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1184 wrote to memory of 1112 | N/A | C:\Windows\system32\wscript.exe | C:\Program Files\Java\jre1.8.0_66\bin\java.exe |
| PID 1184 wrote to memory of 1112 | N/A | C:\Windows\system32\wscript.exe | C:\Program Files\Java\jre1.8.0_66\bin\java.exe |
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\PAYMENT-9262023.js
C:\Program Files\Java\jre1.8.0_66\bin\java.exe
"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.81.57.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.208.79.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 54.120.234.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.57.101.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\PO-21-2023.jar
| MD5 | ee415321c29634b711dd60a761364aaa |
| SHA1 | f62440bcd9c9c2f5e41f289de239a263bf64286f |
| SHA256 | 858723e08c08e1f795d8d99516b6c74571ceef624fd91c5b14cea7db982a758c |
| SHA512 | c7bffe51260280b98ed624d73374477e56e9a03cc1b1d181c9b1f6a3d6e6f5b7917d8594335d11f39759ad7b62e8ffa3a258d4ab4758a5d1aed6b7c4402b129e |
memory/1112-4-0x0000000002E70000-0x0000000003E70000-memory.dmp
memory/1112-13-0x0000000002B70000-0x0000000002B71000-memory.dmp
memory/1112-14-0x0000000002E70000-0x0000000003E70000-memory.dmp
memory/1112-16-0x0000000002B70000-0x0000000002B71000-memory.dmp