Malware Analysis Report

2024-11-13 18:32

Sample ID 231227-fw5afafdd7
Target a4d701ab9770dada452925a014163a36
SHA256 48ba29328ad82dfd72bfac6eede576867ebf6f39ec0a7f1691201d1a10d299c9
Tags
strrat discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

48ba29328ad82dfd72bfac6eede576867ebf6f39ec0a7f1691201d1a10d299c9

Threat Level: Known bad

The file a4d701ab9770dada452925a014163a36 was found to be: Known bad.

Malicious Activity Summary

strrat discovery

Strrat family

Modifies file permissions

Drops file in Program Files directory

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-27 05:14

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-27 05:14

Reported

2024-01-07 15:12

Platform

win7-20231215-en

Max time kernel

125s

Max time network

131s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\a4d701ab9770dada452925a014163a36.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\a4d701ab9770dada452925a014163a36.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 github.com udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.4:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.4:443 github.com tcp

Files

memory/2096-9-0x0000000002260000-0x0000000005260000-memory.dmp

memory/2096-10-0x0000000000430000-0x0000000000431000-memory.dmp

memory/2096-17-0x0000000000430000-0x0000000000431000-memory.dmp

memory/2096-27-0x0000000000430000-0x0000000000431000-memory.dmp

memory/2096-35-0x0000000000430000-0x0000000000431000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-27 05:14

Reported

2024-01-07 15:12

Platform

win10v2004-20231222-en

Max time kernel

148s

Max time network

131s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\a4d701ab9770dada452925a014163a36.jar

Signatures

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2380 wrote to memory of 992 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe
PID 2380 wrote to memory of 992 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe

Processes

C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\a4d701ab9770dada452925a014163a36.jar

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 github.com udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 8.8.8.8:53 209.192.232.199.in-addr.arpa udp
DE 140.82.121.4:443 github.com tcp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 4.121.82.140.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 182.178.17.96.in-addr.arpa udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 104.241.123.92.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 209.178.17.96.in-addr.arpa udp
GB 96.17.178.209:80 tcp
GB 96.17.178.181:80 tcp
US 8.8.8.8:53 udp
GB 96.17.178.181:80 tcp
US 8.8.8.8:53 udp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
GB 96.17.178.209:80 tcp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
GB 96.17.178.209:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
N/A 20.223.36.55:443 tcp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
GB 88.221.134.50:80 tcp
N/A 52.111.227.14:443 tcp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
GB 88.221.134.50:80 tcp
GB 88.221.134.50:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 96.17.178.199:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 96.17.178.199:80 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 8.8.8.8:53 udp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp
N/A 96.17.178.199:80 tcp

Files

memory/2380-4-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-12-0x0000018B33560000-0x0000018B33561000-memory.dmp

memory/2380-17-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-32-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-42-0x0000018B33560000-0x0000018B33561000-memory.dmp

memory/2380-43-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-46-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-47-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-54-0x0000018B34F90000-0x0000018B34FA0000-memory.dmp

memory/2380-55-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp

memory/2380-56-0x0000018B34BA0000-0x0000018B35BA0000-memory.dmp