Analysis Overview
SHA256
6d641ee8729ed4c218ef958b79eef3729ec6317b7da31a41803407f41b68337a
Threat Level: Known bad
The file Delivery Information GCBAC71854_PDF.jar was found to be: Known bad.
Malicious Activity Summary
Strrat family
Modifies file permissions
Drops file in Program Files directory
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-10-26 07:05
Signatures
Strrat family
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-26 07:05
Reported
2023-10-26 07:07
Platform
win7-20231023-en
Max time kernel
121s
Max time network
129s
Command Line
Signatures
Processes
C:\Windows\system32\java.exe
java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery Information GCBAC71854_PDF.jar"
Network
Files
memory/2188-9-0x0000000002060000-0x0000000005060000-memory.dmp
memory/2188-11-0x0000000001C50000-0x0000000001C51000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-26 07:05
Reported
2023-10-26 07:07
Platform
win10v2004-20231023-en
Max time kernel
127s
Max time network
160s
Command Line
Signatures
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\icacls.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\jvm.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\ntdll.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4324 wrote to memory of 1888 | N/A | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | C:\Windows\system32\icacls.exe |
| PID 4324 wrote to memory of 1888 | N/A | C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe | C:\Windows\system32\icacls.exe |
Processes
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery Information GCBAC71854_PDF.jar"
C:\Windows\system32\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.209.218.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
Files
memory/4324-2-0x0000022F43B70000-0x0000022F44B70000-memory.dmp
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp
| MD5 | 688460d94a92032519419e979da46583 |
| SHA1 | eae7cf78c71cc2b854cf990858780af7f9e53479 |
| SHA256 | 4121e75e18a42503915d728dfc14b8b1cf61034c8d19382de6ac0d759af1f6e9 |
| SHA512 | f3bae1b4f2e9de96d10c8badf394151b89b37fe827430de778efdfa4a6a07bb8aba09e26bef33e64826b5b2cb0cd3d8a73de25558718b113cb09c7c1fb3df0e0 |
memory/4324-12-0x0000022F421A0000-0x0000022F421A1000-memory.dmp
memory/4324-20-0x0000022F43B70000-0x0000022F44B70000-memory.dmp
memory/4324-30-0x0000022F421A0000-0x0000022F421A1000-memory.dmp
memory/4324-34-0x0000022F43B70000-0x0000022F44B70000-memory.dmp
memory/4324-41-0x0000022F421A0000-0x0000022F421A1000-memory.dmp
memory/4324-42-0x0000022F43DF0000-0x0000022F43E00000-memory.dmp
memory/4324-43-0x0000022F43E00000-0x0000022F43E10000-memory.dmp
memory/4324-45-0x0000022F43E70000-0x0000022F43E80000-memory.dmp
memory/4324-44-0x0000022F43B70000-0x0000022F44B70000-memory.dmp
memory/4324-46-0x0000022F43E30000-0x0000022F43E40000-memory.dmp
memory/4324-47-0x0000022F43E40000-0x0000022F43E50000-memory.dmp
memory/4324-48-0x0000022F43E50000-0x0000022F43E60000-memory.dmp
memory/4324-49-0x0000022F43E60000-0x0000022F43E70000-memory.dmp
memory/4324-50-0x0000022F43E80000-0x0000022F43E90000-memory.dmp
memory/4324-51-0x0000022F43E90000-0x0000022F43EA0000-memory.dmp
memory/4324-52-0x0000022F43EB0000-0x0000022F43EC0000-memory.dmp
memory/4324-54-0x0000022F43B70000-0x0000022F44B70000-memory.dmp
memory/4324-53-0x0000022F43EC0000-0x0000022F43ED0000-memory.dmp
memory/4324-55-0x0000022F43ED0000-0x0000022F43EE0000-memory.dmp
memory/4324-56-0x0000022F43EE0000-0x0000022F43EF0000-memory.dmp
memory/4324-57-0x0000022F43B70000-0x0000022F44B70000-memory.dmp