Malware Analysis Report

2024-11-13 18:33

Sample ID 231026-hwh4baec43
Target Delivery Information GCBAC71854_PDF.jar
SHA256 6d641ee8729ed4c218ef958b79eef3729ec6317b7da31a41803407f41b68337a
Tags
strrat discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6d641ee8729ed4c218ef958b79eef3729ec6317b7da31a41803407f41b68337a

Threat Level: Known bad

The file Delivery Information GCBAC71854_PDF.jar was found to be: Known bad.

Malicious Activity Summary

strrat discovery

Strrat family

Modifies file permissions

Drops file in Program Files directory

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-26 07:05

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-26 07:05

Reported

2023-10-26 07:07

Platform

win7-20231023-en

Max time kernel

121s

Max time network

129s

Command Line

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery Information GCBAC71854_PDF.jar"

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery Information GCBAC71854_PDF.jar"

Network

N/A

Files

memory/2188-9-0x0000000002060000-0x0000000005060000-memory.dmp

memory/2188-11-0x0000000001C50000-0x0000000001C51000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-26 07:05

Reported

2023-10-26 07:07

Platform

win10v2004-20231023-en

Max time kernel

127s

Max time network

160s

Command Line

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery Information GCBAC71854_PDF.jar"

Signatures

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4324 wrote to memory of 1888 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe
PID 4324 wrote to memory of 1888 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe

Processes

C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe

java -jar "C:\Users\Admin\AppData\Local\Temp\Delivery Information GCBAC71854_PDF.jar"

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 198.209.218.23.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp

Files

memory/4324-2-0x0000022F43B70000-0x0000022F44B70000-memory.dmp

C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

MD5 688460d94a92032519419e979da46583
SHA1 eae7cf78c71cc2b854cf990858780af7f9e53479
SHA256 4121e75e18a42503915d728dfc14b8b1cf61034c8d19382de6ac0d759af1f6e9
SHA512 f3bae1b4f2e9de96d10c8badf394151b89b37fe827430de778efdfa4a6a07bb8aba09e26bef33e64826b5b2cb0cd3d8a73de25558718b113cb09c7c1fb3df0e0

memory/4324-12-0x0000022F421A0000-0x0000022F421A1000-memory.dmp

memory/4324-20-0x0000022F43B70000-0x0000022F44B70000-memory.dmp

memory/4324-30-0x0000022F421A0000-0x0000022F421A1000-memory.dmp

memory/4324-34-0x0000022F43B70000-0x0000022F44B70000-memory.dmp

memory/4324-41-0x0000022F421A0000-0x0000022F421A1000-memory.dmp

memory/4324-42-0x0000022F43DF0000-0x0000022F43E00000-memory.dmp

memory/4324-43-0x0000022F43E00000-0x0000022F43E10000-memory.dmp

memory/4324-45-0x0000022F43E70000-0x0000022F43E80000-memory.dmp

memory/4324-44-0x0000022F43B70000-0x0000022F44B70000-memory.dmp

memory/4324-46-0x0000022F43E30000-0x0000022F43E40000-memory.dmp

memory/4324-47-0x0000022F43E40000-0x0000022F43E50000-memory.dmp

memory/4324-48-0x0000022F43E50000-0x0000022F43E60000-memory.dmp

memory/4324-49-0x0000022F43E60000-0x0000022F43E70000-memory.dmp

memory/4324-50-0x0000022F43E80000-0x0000022F43E90000-memory.dmp

memory/4324-51-0x0000022F43E90000-0x0000022F43EA0000-memory.dmp

memory/4324-52-0x0000022F43EB0000-0x0000022F43EC0000-memory.dmp

memory/4324-54-0x0000022F43B70000-0x0000022F44B70000-memory.dmp

memory/4324-53-0x0000022F43EC0000-0x0000022F43ED0000-memory.dmp

memory/4324-55-0x0000022F43ED0000-0x0000022F43EE0000-memory.dmp

memory/4324-56-0x0000022F43EE0000-0x0000022F43EF0000-memory.dmp

memory/4324-57-0x0000022F43B70000-0x0000022F44B70000-memory.dmp