Malware Analysis Report

2024-11-13 18:33

Sample ID 231012-jwv9bahh78
Target PO_28200199HE_Pdf.jar
SHA256 d59996773811c898871ffcd59e868bda48e5d1168fcc5325f3fd597b3bb836ed
Tags
strrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d59996773811c898871ffcd59e868bda48e5d1168fcc5325f3fd597b3bb836ed

Threat Level: Known bad

The file PO_28200199HE_Pdf.jar was found to be: Known bad.

Malicious Activity Summary

strrat

Strrat family

Drops file in Program Files directory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-10-12 08:01

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-12 08:01

Reported

2023-10-13 16:13

Platform

win7-20230831-en

Max time kernel

147s

Max time network

127s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\PO_28200199HE_Pdf.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\PO_28200199HE_Pdf.jar

Network

N/A

Files

memory/2560-9-0x0000000002210000-0x0000000005210000-memory.dmp

memory/2560-10-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2560-11-0x0000000002210000-0x0000000005210000-memory.dmp

memory/2560-15-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2560-37-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2560-47-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2560-69-0x0000000000220000-0x0000000000221000-memory.dmp

memory/2560-79-0x0000000000220000-0x0000000000221000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-12 08:01

Reported

2023-10-13 16:11

Platform

win10v2004-20230915-en

Max time kernel

138s

Max time network

146s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\PO_28200199HE_Pdf.jar

Signatures

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A

Processes

C:\ProgramData\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\PO_28200199HE_Pdf.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 254.210.247.8.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 repo1.maven.org udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 140.82.113.3:443 github.com tcp
US 8.8.8.8:53 209.192.232.199.in-addr.arpa udp
US 8.8.8.8:53 3.113.82.140.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.109.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 133.109.199.185.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 254.22.238.8.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 209.143.182.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/1520-4-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-11-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-20-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-29-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-31-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-39-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-43-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-47-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-61-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-64-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-75-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-80-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-84-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-90-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-91-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/1520-93-0x0000000002C20000-0x0000000002C30000-memory.dmp

memory/1520-95-0x0000000002C40000-0x0000000002C50000-memory.dmp

memory/1520-94-0x0000000002C30000-0x0000000002C40000-memory.dmp

memory/1520-96-0x0000000002C70000-0x0000000002C80000-memory.dmp

memory/1520-97-0x0000000002C80000-0x0000000002C90000-memory.dmp

memory/1520-98-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

memory/1520-99-0x0000000002D10000-0x0000000002D20000-memory.dmp

memory/1520-100-0x0000000002D20000-0x0000000002D30000-memory.dmp

memory/1520-101-0x0000000002D30000-0x0000000002D40000-memory.dmp

memory/1520-102-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/1520-103-0x0000000002D70000-0x0000000002D80000-memory.dmp

memory/1520-104-0x0000000002D50000-0x0000000002D60000-memory.dmp

memory/1520-105-0x00000000029A0000-0x00000000039A0000-memory.dmp

memory/1520-106-0x00000000029A0000-0x00000000039A0000-memory.dmp