Malware Analysis Report

2024-11-13 18:33

Sample ID 231013-dc52hsbe41
Target 4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061_JC.jar
SHA256 4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061
Tags
strrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061

Threat Level: Known bad

The file 4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061_JC.jar was found to be: Known bad.

Malicious Activity Summary

strrat

Strrat family

Drops file in Program Files directory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-10-13 02:52

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-13 02:52

Reported

2023-10-18 01:36

Platform

win7-20230831-en

Max time kernel

157s

Max time network

170s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061_JC.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061_JC.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 github.com udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 140.82.112.3:443 github.com tcp
US 8.8.8.8:53 github.com udp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp

Files

memory/1100-9-0x0000000002260000-0x0000000005260000-memory.dmp

memory/1100-10-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-17-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-18-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-25-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-26-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-27-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-29-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-30-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-38-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-42-0x0000000002260000-0x0000000005260000-memory.dmp

memory/1100-44-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-48-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-71-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-83-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1100-84-0x0000000000320000-0x0000000000321000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-13 02:52

Reported

2023-10-18 01:35

Platform

win10v2004-20230915-en

Max time kernel

139s

Max time network

155s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061_JC.jar

Signatures

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A

Processes

C:\ProgramData\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\4e01f52192ab0212716a2ac06c4e2eb539b93c3fc08fa429aacc7e683d74b061_JC.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 25.73.42.20.in-addr.arpa udp

Files

memory/4500-2-0x0000000002650000-0x0000000003650000-memory.dmp

memory/4500-11-0x0000000002530000-0x0000000002531000-memory.dmp

memory/4500-18-0x0000000002650000-0x0000000003650000-memory.dmp

memory/4500-28-0x00000000028D0000-0x00000000028E0000-memory.dmp

memory/4500-30-0x00000000028F0000-0x0000000002900000-memory.dmp

memory/4500-31-0x0000000002910000-0x0000000002920000-memory.dmp

memory/4500-32-0x0000000002650000-0x0000000003650000-memory.dmp

memory/4500-29-0x00000000028E0000-0x00000000028F0000-memory.dmp

memory/4500-33-0x0000000002920000-0x0000000002930000-memory.dmp

memory/4500-34-0x0000000002650000-0x0000000003650000-memory.dmp