Malware Analysis Report

2024-11-13 18:33

Sample ID 231229-3qlmgacbf3
Target 075383dec7f7f734703c07ad452ec516
SHA256 1aa7af496d4c49c35a9bd663783a6ecf3d076d774ac7a53ecfe93b1837d05710
Tags
discovery strrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1aa7af496d4c49c35a9bd663783a6ecf3d076d774ac7a53ecfe93b1837d05710

Threat Level: Known bad

The file 075383dec7f7f734703c07ad452ec516 was found to be: Known bad.

Malicious Activity Summary

discovery strrat

Strrat family

Modifies file permissions

Drops file in Program Files directory

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-29 23:43

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-29 23:43

Reported

2023-12-30 17:18

Platform

win7-20231215-en

Max time kernel

244s

Max time network

283s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\075383dec7f7f734703c07ad452ec516.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\075383dec7f7f734703c07ad452ec516.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 repo1.maven.org udp
DE 140.82.121.4:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 repo1.maven.org udp
DE 140.82.121.3:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp
DE 140.82.121.3:443 github.com tcp

Files

memory/848-9-0x00000000021F0000-0x00000000051F0000-memory.dmp

memory/848-10-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-17-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-27-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-28-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-31-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-33-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-34-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-35-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-39-0x00000000021F0000-0x00000000051F0000-memory.dmp

memory/848-58-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-66-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-70-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-71-0x0000000000320000-0x0000000000321000-memory.dmp

memory/848-72-0x0000000000320000-0x0000000000321000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-29 23:43

Reported

2023-12-30 17:16

Platform

win10v2004-20231215-en

Max time kernel

149s

Max time network

133s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\075383dec7f7f734703c07ad452ec516.jar

Signatures

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3176 wrote to memory of 3448 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe
PID 3176 wrote to memory of 3448 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe

Processes

C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\075383dec7f7f734703c07ad452ec516.jar

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 82.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 57.110.18.2.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
FR 2.18.110.57:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 178.223.142.52.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 218.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 210.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
GB 96.17.178.210:80 tcp
GB 96.17.178.210:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
FR 2.18.110.57:80 tcp
US 8.8.8.8:53 udp
US 204.79.197.200:443 g.bing.com tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 g.bing.com tcp
US 204.79.197.200:443 g.bing.com tcp
US 204.79.197.200:443 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
GB 88.221.135.218:80 tcp
US 8.8.8.8:53 udp
GB 88.221.134.18:80 tcp
GB 88.221.134.18:80 tcp
US 8.8.8.8:53 udp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
US 8.8.8.8:53 udp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp
N/A 96.17.178.193:80 tcp

Files

memory/3176-4-0x000001B31B590000-0x000001B31C590000-memory.dmp

memory/3176-12-0x000001B31B570000-0x000001B31B571000-memory.dmp

memory/3176-18-0x000001B31B590000-0x000001B31C590000-memory.dmp

memory/3176-28-0x000001B31B570000-0x000001B31B571000-memory.dmp

memory/3176-39-0x000001B31B8A0000-0x000001B31B8B0000-memory.dmp

memory/3176-41-0x000001B31B840000-0x000001B31B850000-memory.dmp

memory/3176-44-0x000001B31B870000-0x000001B31B880000-memory.dmp

memory/3176-45-0x000001B31B880000-0x000001B31B890000-memory.dmp

memory/3176-46-0x000001B31B890000-0x000001B31B8A0000-memory.dmp

memory/3176-47-0x000001B31B8B0000-0x000001B31B8C0000-memory.dmp

memory/3176-43-0x000001B31B860000-0x000001B31B870000-memory.dmp

memory/3176-48-0x000001B31B590000-0x000001B31C590000-memory.dmp

memory/3176-42-0x000001B31B850000-0x000001B31B860000-memory.dmp

memory/3176-40-0x000001B31B8C0000-0x000001B31B8D0000-memory.dmp

memory/3176-38-0x000001B31B820000-0x000001B31B830000-memory.dmp

memory/3176-37-0x000001B31B810000-0x000001B31B820000-memory.dmp

memory/3176-35-0x000001B31B590000-0x000001B31C590000-memory.dmp

memory/3176-49-0x000001B31B590000-0x000001B31C590000-memory.dmp