Malware Analysis Report

2024-11-13 18:33

Sample ID 231019-jsn1tsgb58
Target Delivery information GCBAC71854.jar
SHA256 20f218010b4a83ad4af68bfe387b4275a86eef84354e279bde5b11c07b7433a7
Tags
strrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

20f218010b4a83ad4af68bfe387b4275a86eef84354e279bde5b11c07b7433a7

Threat Level: Known bad

The file Delivery information GCBAC71854.jar was found to be: Known bad.

Malicious Activity Summary

strrat

Strrat family

Drops file in Program Files directory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-10-19 07:56

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-19 07:56

Reported

2023-10-19 07:58

Platform

win7-20230831-en

Max time kernel

145s

Max time network

148s

Command Line

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery information GCBAC71854.jar"

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery information GCBAC71854.jar"

Network

Country Destination Domain Proto
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 github.com udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
US 8.8.8.8:53 repo1.maven.org udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 8.8.8.8:53 github.com udp
DE 140.82.121.3:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.3:443 github.com tcp

Files

memory/1832-6-0x00000000023B0000-0x00000000053B0000-memory.dmp

memory/1832-10-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-15-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-18-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-20-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-21-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-27-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-35-0x00000000023B0000-0x00000000053B0000-memory.dmp

memory/1832-52-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-60-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-64-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-65-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/1832-71-0x00000000001B0000-0x00000000001B1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-19 07:56

Reported

2023-10-19 07:58

Platform

win10v2004-20230915-en

Max time kernel

142s

Max time network

150s

Command Line

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery information GCBAC71854.jar"

Signatures

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb C:\ProgramData\Oracle\Java\javapath\java.exe N/A

Processes

C:\ProgramData\Oracle\Java\javapath\java.exe

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery information GCBAC71854.jar"

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 254.109.26.67.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 repo1.maven.org udp
DE 140.82.121.3:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 8.8.8.8:53 3.121.82.140.in-addr.arpa udp
US 8.8.8.8:53 209.192.232.199.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 10.173.189.20.in-addr.arpa udp

Files

memory/3340-4-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-14-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-15-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-29-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-30-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-42-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-45-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-51-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-53-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-57-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-58-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-63-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-65-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-67-0x00000000026D0000-0x00000000026D1000-memory.dmp

memory/3340-69-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

memory/3340-70-0x0000000002D20000-0x0000000002D30000-memory.dmp

memory/3340-71-0x0000000002D70000-0x0000000002D80000-memory.dmp

memory/3340-72-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-73-0x0000000002D90000-0x0000000002DA0000-memory.dmp

memory/3340-74-0x0000000002DC0000-0x0000000002DD0000-memory.dmp

memory/3340-75-0x0000000002D10000-0x0000000002D20000-memory.dmp

memory/3340-77-0x0000000002D40000-0x0000000002D50000-memory.dmp

memory/3340-76-0x0000000002D30000-0x0000000002D40000-memory.dmp

memory/3340-79-0x0000000002D50000-0x0000000002D60000-memory.dmp

memory/3340-78-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-80-0x0000000002D60000-0x0000000002D70000-memory.dmp

memory/3340-81-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

memory/3340-82-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

memory/3340-83-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

memory/3340-84-0x0000000002A20000-0x0000000003A20000-memory.dmp

memory/3340-85-0x0000000002A20000-0x0000000003A20000-memory.dmp