Malware Analysis Report

2024-11-13 18:33

Sample ID 231014-a2p5taga8w
Target 82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f_JC.jar
SHA256 82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f
Tags
strrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f

Threat Level: Known bad

The file 82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f_JC.jar was found to be: Known bad.

Malicious Activity Summary

strrat

Strrat family

Drops file in Program Files directory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-10-14 00:42

Signatures

Strrat family

strrat

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-14 00:42

Reported

2023-10-14 12:46

Platform

win10v2004-20230915-en

Max time kernel

153s

Max time network

159s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f_JC.jar

Signatures

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A

Processes

C:\ProgramData\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f_JC.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 254.23.238.8.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 29.81.57.23.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 130.109.69.13.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp

Files

memory/3892-4-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

memory/3892-5-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

memory/3892-12-0x00000000011B0000-0x00000000011B1000-memory.dmp

memory/3892-16-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

memory/3892-18-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

memory/3892-27-0x00000000011B0000-0x00000000011B1000-memory.dmp

memory/3892-29-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

memory/3892-35-0x0000000003280000-0x0000000003290000-memory.dmp

memory/3892-34-0x0000000003260000-0x0000000003270000-memory.dmp

memory/3892-36-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

memory/3892-37-0x0000000002FC0000-0x0000000003FC0000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-14 00:42

Reported

2023-10-14 12:47

Platform

win7-20230831-en

Max time kernel

166s

Max time network

138s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f_JC.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\82716eae75bfbfa4727319e6b8a19984e71b0f8f53033608785af8f53b30174f_JC.jar

Network

N/A

Files

memory/2276-2-0x0000000002220000-0x0000000005220000-memory.dmp

memory/2276-3-0x0000000002220000-0x0000000005220000-memory.dmp

memory/2276-11-0x00000000000B0000-0x00000000000B1000-memory.dmp

memory/2276-12-0x00000000000B0000-0x00000000000B1000-memory.dmp