Malware Analysis Report

2024-11-13 18:32

Sample ID 240106-y5r1ksehek
Target 4719369301021c7fafd27809940a39e2
SHA256 0a4662f9f759781f50cecb082c783d73cf78b388ee0904fd11286417879286e2
Tags
strrat discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0a4662f9f759781f50cecb082c783d73cf78b388ee0904fd11286417879286e2

Threat Level: Known bad

The file 4719369301021c7fafd27809940a39e2 was found to be: Known bad.

Malicious Activity Summary

strrat discovery

Strrat family

Modifies file permissions

Drops file in Program Files directory

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-06 20:22

Signatures

Strrat family

strrat

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-06 20:22

Reported

2024-01-06 20:25

Platform

win7-20231215-en

Max time kernel

149s

Max time network

158s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\4719369301021c7fafd27809940a39e2.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\4719369301021c7fafd27809940a39e2.jar

Network

Country Destination Domain Proto
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 github.com udp
DE 140.82.121.4:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
US 8.8.8.8:53 github.com udp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
US 8.8.8.8:53 github.com udp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp
DE 140.82.121.4:443 github.com tcp

Files

memory/1740-3-0x0000000002360000-0x0000000005360000-memory.dmp

memory/1740-10-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-17-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-21-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-22-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-25-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-27-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-29-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-30-0x0000000002360000-0x0000000005360000-memory.dmp

memory/1740-34-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-41-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-49-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-56-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-57-0x0000000000120000-0x0000000000121000-memory.dmp

memory/1740-70-0x0000000000120000-0x0000000000121000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-06 20:22

Reported

2024-01-06 20:25

Platform

win10v2004-20231222-en

Max time kernel

142s

Max time network

146s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\4719369301021c7fafd27809940a39e2.jar

Signatures

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1356 wrote to memory of 3876 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe
PID 1356 wrote to memory of 3876 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe

Processes

C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\4719369301021c7fafd27809940a39e2.jar

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 19.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 56.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
US 8.8.8.8:53 repo1.maven.org udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
DE 140.82.121.3:443 github.com tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 3.121.82.140.in-addr.arpa udp
US 8.8.8.8:53 209.192.232.199.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
DE 140.82.121.3:443 github.com tcp
US 8.8.8.8:53 udp
DE 140.82.121.3:443 github.com tcp
US 8.8.8.8:53 udp
US 199.232.192.209:443 repo1.maven.org tcp
US 199.232.192.209:443 repo1.maven.org tcp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
DE 140.82.121.4:443 github.com tcp
US 8.8.8.8:53 4.121.82.140.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 185.199.108.133:443 objects.githubusercontent.com tcp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 16.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 182.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp

Files

memory/1356-4-0x0000021680000000-0x0000021681000000-memory.dmp

C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

MD5 9ef0609a4942de46975f999e1708ba71
SHA1 e6700789f1617d1de8579799dd43da02f91eaa04
SHA256 bd89b9809adf8b33e143bad65820e0adf9586c7b18c6c0ca807c563b53414424
SHA512 76db51ef6186e60fa044877e5baae8bf2428295fe01945a2cd6e7d93ca769a0df060039cfaac1fbea797011d86803657402fd34c38b54022964f84ef6bef35e9

memory/1356-17-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-19-0x00000216FACD0000-0x00000216FACD1000-memory.dmp

memory/1356-28-0x00000216FACD0000-0x00000216FACD1000-memory.dmp

memory/1356-29-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-39-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-45-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-50-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-56-0x00000216FACD0000-0x00000216FACD1000-memory.dmp

memory/1356-136-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-137-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-139-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-140-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-141-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-142-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-150-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-155-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-157-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-161-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-176-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-185-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-186-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-187-0x0000021680000000-0x0000021681000000-memory.dmp

memory/1356-189-0x0000021680000000-0x0000021681000000-memory.dmp