Analysis

  • max time kernel
    295s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 16:48

General

  • Target

    39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar

  • Size

    64KB

  • MD5

    5d16505a5abfcfc99095a676f1f0bd64

  • SHA1

    facfb1f1014ba5f8c8618678a1a9a7f5bf5c35e5

  • SHA256

    39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d

  • SHA512

    a49885eb60f6429c1247ae44bcf806836031a7191078a3b14b47c26b577bd2824d64ab17df8244361e114235600043188eae2794f58f299094976682865dc2cb

  • SSDEEP

    1536:UNWRlwUsz/P+zKG2X2CWYqLvSUWD+YBFBbOl+H/Zm:UNisz/6YriYFfH/Zm

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Drops startup file 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3028
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar"
        3⤵
        • Creates scheduled task(s)
        PID:1672
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar"
      2⤵
        PID:2384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d.jar

      Filesize

      64KB

      MD5

      5d16505a5abfcfc99095a676f1f0bd64

      SHA1

      facfb1f1014ba5f8c8618678a1a9a7f5bf5c35e5

      SHA256

      39694a390267d62c814460cb461426a78d3d43a701f5877896c8cbec48c7827d

      SHA512

      a49885eb60f6429c1247ae44bcf806836031a7191078a3b14b47c26b577bd2824d64ab17df8244361e114235600043188eae2794f58f299094976682865dc2cb

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      48f798f5ff70390d6b91a405d896cf27

      SHA1

      645230228c5ad422d32ca0f2703d32d7ad3c2d50

      SHA256

      d494d4e48c72b0f974c206f6cf8b3ec1d984db2dcfc8cda038a1e32520f86d7e

      SHA512

      60034ddad6aab9abb1505f2d5de7a4631d2024ebe207e69874e089e19f0b5d67bf9425b908c6171b8730e67e05143f1edfff6e1a7494a192a8317c1f187d87c8

    • memory/536-62-0x00000251D0BB0000-0x00000251D1BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/536-10-0x00000251D0BB0000-0x00000251D1BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/536-19-0x00000251D0BB0000-0x00000251D1BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/536-34-0x00000251D0E90000-0x00000251D0EA0000-memory.dmp

      Filesize

      64KB

    • memory/536-33-0x00000251D0E80000-0x00000251D0E90000-memory.dmp

      Filesize

      64KB

    • memory/536-32-0x00000251D0E70000-0x00000251D0E80000-memory.dmp

      Filesize

      64KB

    • memory/536-31-0x00000251D0E60000-0x00000251D0E70000-memory.dmp

      Filesize

      64KB

    • memory/536-30-0x00000251D0E50000-0x00000251D0E60000-memory.dmp

      Filesize

      64KB

    • memory/536-29-0x00000251D0E40000-0x00000251D0E50000-memory.dmp

      Filesize

      64KB

    • memory/536-28-0x00000251D0E30000-0x00000251D0E40000-memory.dmp

      Filesize

      64KB

    • memory/536-12-0x00000251CF360000-0x00000251CF361000-memory.dmp

      Filesize

      4KB

    • memory/2384-69-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-55-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-57-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-58-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-59-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-46-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-63-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-64-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-65-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-66-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-68-0x0000021300000000-0x0000021301000000-memory.dmp

      Filesize

      16.0MB

    • memory/2384-47-0x000002137E2A0000-0x000002137E2A1000-memory.dmp

      Filesize

      4KB