Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2024 01:20

General

  • Target

    838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar

  • Size

    452KB

  • MD5

    188614b72a3baaf3f018157d12223538

  • SHA1

    f9d7a5a4f743c4d22f6563436761912dacba2a90

  • SHA256

    838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667

  • SHA512

    988445b15fc4b3a9fe28a15c859becaaf3692ec76399e17618e9d1382d73f85549130801210b82e41b76c779bc4ea2bc94c4fafe6a462510d4a0ccc75945e8c8

  • SSDEEP

    12288:CU9r+Wu+x8qH/M10nJQpGrodvkg3/MhGQt3j0dWT:X+Wu+KqfkY6Kodvx3/MhGQtzms

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2864
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3396
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Windows\system32\schtasks.exe
          schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar"
          4⤵
          • Creates scheduled task(s)
          PID:1116
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2008
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4584
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4916
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3372
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
            5⤵
              PID:472
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1492
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
              5⤵
                PID:456

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        536e665060c86543d82c58a7ec921214

        SHA1

        d3e648c67922e5863717453aad1deeaead6bf3eb

        SHA256

        aa7619a1af21db7180f9ee4897c5ef638da8df75d0f1e96e2f60428a3b796786

        SHA512

        287a8229fc713ba0ad7d197408970ed497c0d222d0084f35f8b18c7f4e6dd160cf5aee973bcfe2cb48ca18af90aec2bc8fd4a02e8a7acb7a073d90652dea3ed1

      • C:\Users\Admin\838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667.jar

        Filesize

        452KB

        MD5

        188614b72a3baaf3f018157d12223538

        SHA1

        f9d7a5a4f743c4d22f6563436761912dacba2a90

        SHA256

        838feba9c3f59776a04d380c1f94f7d93a84e8256ce07d94482528d373470667

        SHA512

        988445b15fc4b3a9fe28a15c859becaaf3692ec76399e17618e9d1382d73f85549130801210b82e41b76c779bc4ea2bc94c4fafe6a462510d4a0ccc75945e8c8

      • C:\Users\Admin\AppData\Local\Temp\jna-63116079\jna2808587559269582224.dll

        Filesize

        241KB

        MD5

        e02979ecd43bcc9061eb2b494ab5af50

        SHA1

        3122ac0e751660f646c73b10c4f79685aa65c545

        SHA256

        a66959bec2ef5af730198db9f3b3f7cab0d4ae70ce01bec02bf1d738e6d1ee7a

        SHA512

        1e6f7dcb6a557c9b896412a48dd017c16f7a52fa2b9ab513593c9ecd118e86083979821ca7a3e2f098ee349200c823c759cec6599740dd391cb5f354dc29b372

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1162180587-977231257-2194346871-1000\83aa4cc77f591dfc2374580bbd95f6ba_44d43ff8-91cd-4ca7-92c9-6495b4f546fa

        Filesize

        45B

        MD5

        c8366ae350e7019aefc9d1e6e6a498c6

        SHA1

        5731d8a3e6568a5f2dfbbc87e3db9637df280b61

        SHA256

        11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

        SHA512

        33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

      • C:\Users\Admin\AppData\Roaming\lib\jna-5.5.0.jar

        Filesize

        1.2MB

        MD5

        b8c986a58da2dfc172613e128e07284c

        SHA1

        896edd97015d863cada1c4bfd94afbe76842a26a

        SHA256

        0f7e45e45a7e5cc9c42101e15e96a0830c67495f24d25e4ed2841d3ecc48ff4c

        SHA512

        f7e67829e793c389b3a623f1499ca1845ddaf350f12d7f3e0983eae56bad1283e7a7edf7d594e79ec0c6cee1532a2cbd106a0a0b18fa46587b25970c36e3fc88

      • C:\Users\Admin\lib\jna-5.5.0.jar

        Filesize

        1.4MB

        MD5

        acfb5b5fd9ee10bf69497792fd469f85

        SHA1

        0e0845217c4907822403912ad6828d8e0b256208

        SHA256

        b308faebfe4ed409de8410e0a632d164b2126b035f6eacff968d3908cafb4d9e

        SHA512

        e52575f58a195ceb3bd16b9740eadf5bc5b1d4d63c0734e8e5fd1d1776aa2d068d2e4c7173b83803f95f72c0a6759ae1c9b65773c734250d4cfcdf47a19f82aa

      • C:\Users\Admin\lib\jna-platform-5.5.0.jar

        Filesize

        2.1MB

        MD5

        00a45b35bb40f7ffe362859f09d6308e

        SHA1

        6674743ad88918c6156d1c6831c808ba04038f31

        SHA256

        f202650104317eb3f83579442d266a72719f8da9b10a0a13e1d17aedeba6ae25

        SHA512

        c78371f6ff46f8ca6b5ebe434d815b0747da6a7a7c27170ad6d4f0966ac4cf820a2500c08b9df609983a749f01e1591a654fbdfbebbeb4ccdbb9da5cd46fbee7

      • C:\Users\Admin\lib\sqlite-jdbc-3.14.2.1.jar

        Filesize

        2.1MB

        MD5

        13f335e260ec8fe4ece1dc7f42c94743

        SHA1

        b4a939538553b1598094b3877cf7290d22620ffe

        SHA256

        3cd67ab31e1b3bcf3e01c0ea01f1555d3af133978c56906b1508012e0c60044a

        SHA512

        4abcbec8289e49b06e3a293fc1139aaba3b507ce50e068a20513e5498e10bf9b40d69b17dbe9f27791419076f3209801464e8c4d431cbe6761e051c8d9daab72

      • C:\Users\Admin\lib\system-hook-3.5.jar

        Filesize

        772KB

        MD5

        e1aa38a1e78a76a6de73efae136cdb3a

        SHA1

        c463da71871f780b2e2e5dba115d43953b537daf

        SHA256

        2ddda8af6faef8bde46acf43ec546603180bcf8dcb2e5591fff8ac9cd30b5609

        SHA512

        fee16fe9364926ec337e52f551fd62ed81984808a847de2fd68ff29b6c5da0dcc04ef6d8977f0fe675662a7d2ea1065cdcdd2a5259446226a7c7c5516bd7d60d

      • memory/2720-174-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/2720-14-0x0000013A14700000-0x0000013A14710000-memory.dmp

        Filesize

        64KB

      • memory/2720-38-0x0000013A147C0000-0x0000013A147D0000-memory.dmp

        Filesize

        64KB

      • memory/2720-44-0x0000013A147E0000-0x0000013A147F0000-memory.dmp

        Filesize

        64KB

      • memory/2720-51-0x0000013A14800000-0x0000013A14810000-memory.dmp

        Filesize

        64KB

      • memory/2720-60-0x0000013A14750000-0x0000013A14760000-memory.dmp

        Filesize

        64KB

      • memory/2720-69-0x0000013A14770000-0x0000013A14780000-memory.dmp

        Filesize

        64KB

      • memory/2720-85-0x0000013A148A0000-0x0000013A148B0000-memory.dmp

        Filesize

        64KB

      • memory/2720-91-0x0000013A147D0000-0x0000013A147E0000-memory.dmp

        Filesize

        64KB

      • memory/2720-93-0x0000013A148C0000-0x0000013A148D0000-memory.dmp

        Filesize

        64KB

      • memory/2720-92-0x0000013A147E0000-0x0000013A147F0000-memory.dmp

        Filesize

        64KB

      • memory/2720-87-0x0000013A148B0000-0x0000013A148C0000-memory.dmp

        Filesize

        64KB

      • memory/2720-97-0x0000013A148D0000-0x0000013A148E0000-memory.dmp

        Filesize

        64KB

      • memory/2720-101-0x0000013A148E0000-0x0000013A148F0000-memory.dmp

        Filesize

        64KB

      • memory/2720-100-0x0000013A14800000-0x0000013A14810000-memory.dmp

        Filesize

        64KB

      • memory/2720-108-0x0000013A148F0000-0x0000013A14900000-memory.dmp

        Filesize

        64KB

      • memory/2720-114-0x0000013A14910000-0x0000013A14920000-memory.dmp

        Filesize

        64KB

      • memory/2720-121-0x0000013A14850000-0x0000013A14860000-memory.dmp

        Filesize

        64KB

      • memory/2720-127-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/2720-136-0x0000013A148A0000-0x0000013A148B0000-memory.dmp

        Filesize

        64KB

      • memory/2720-139-0x0000013A14980000-0x0000013A14990000-memory.dmp

        Filesize

        64KB

      • memory/2720-142-0x0000013A14990000-0x0000013A149A0000-memory.dmp

        Filesize

        64KB

      • memory/2720-141-0x0000013A148C0000-0x0000013A148D0000-memory.dmp

        Filesize

        64KB

      • memory/2720-146-0x0000013A149A0000-0x0000013A149B0000-memory.dmp

        Filesize

        64KB

      • memory/2720-145-0x0000013A148D0000-0x0000013A148E0000-memory.dmp

        Filesize

        64KB

      • memory/2720-149-0x0000013A149B0000-0x0000013A149C0000-memory.dmp

        Filesize

        64KB

      • memory/2720-107-0x0000013A14900000-0x0000013A14910000-memory.dmp

        Filesize

        64KB

      • memory/2720-159-0x0000013A14940000-0x0000013A14950000-memory.dmp

        Filesize

        64KB

      • memory/2720-162-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/2720-167-0x0000013A149F0000-0x0000013A14A00000-memory.dmp

        Filesize

        64KB

      • memory/2720-166-0x0000013A14920000-0x0000013A14930000-memory.dmp

        Filesize

        64KB

      • memory/2720-158-0x0000013A14930000-0x0000013A14940000-memory.dmp

        Filesize

        64KB

      • memory/2720-157-0x0000013A14910000-0x0000013A14920000-memory.dmp

        Filesize

        64KB

      • memory/2720-156-0x0000013A149D0000-0x0000013A149E0000-memory.dmp

        Filesize

        64KB

      • memory/2720-155-0x0000013A149C0000-0x0000013A149D0000-memory.dmp

        Filesize

        64KB

      • memory/2720-153-0x0000013A148F0000-0x0000013A14900000-memory.dmp

        Filesize

        64KB

      • memory/2720-152-0x0000013A14900000-0x0000013A14910000-memory.dmp

        Filesize

        64KB

      • memory/2720-148-0x0000013A148E0000-0x0000013A148F0000-memory.dmp

        Filesize

        64KB

      • memory/2720-138-0x0000013A148B0000-0x0000013A148C0000-memory.dmp

        Filesize

        64KB

      • memory/2720-135-0x0000013A14970000-0x0000013A14980000-memory.dmp

        Filesize

        64KB

      • memory/2720-134-0x0000013A14960000-0x0000013A14970000-memory.dmp

        Filesize

        64KB

      • memory/2720-133-0x0000013A14890000-0x0000013A148A0000-memory.dmp

        Filesize

        64KB

      • memory/2720-132-0x0000013A14880000-0x0000013A14890000-memory.dmp

        Filesize

        64KB

      • memory/2720-131-0x0000013A14870000-0x0000013A14880000-memory.dmp

        Filesize

        64KB

      • memory/2720-130-0x0000013A14860000-0x0000013A14870000-memory.dmp

        Filesize

        64KB

      • memory/2720-120-0x0000013A14950000-0x0000013A14960000-memory.dmp

        Filesize

        64KB

      • memory/2720-119-0x0000013A14840000-0x0000013A14850000-memory.dmp

        Filesize

        64KB

      • memory/2720-117-0x0000013A14920000-0x0000013A14930000-memory.dmp

        Filesize

        64KB

      • memory/2720-30-0x0000013A14780000-0x0000013A14790000-memory.dmp

        Filesize

        64KB

      • memory/2720-116-0x0000013A14940000-0x0000013A14950000-memory.dmp

        Filesize

        64KB

      • memory/2720-115-0x0000013A14930000-0x0000013A14940000-memory.dmp

        Filesize

        64KB

      • memory/2720-118-0x0000013A14830000-0x0000013A14840000-memory.dmp

        Filesize

        64KB

      • memory/2720-126-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/2720-29-0x0000013A14770000-0x0000013A14780000-memory.dmp

        Filesize

        64KB

      • memory/2720-160-0x0000013A149E0000-0x0000013A149F0000-memory.dmp

        Filesize

        64KB

      • memory/2720-106-0x0000013A14810000-0x0000013A14820000-memory.dmp

        Filesize

        64KB

      • memory/2720-96-0x0000013A147F0000-0x0000013A14800000-memory.dmp

        Filesize

        64KB

      • memory/2720-86-0x0000013A147C0000-0x0000013A147D0000-memory.dmp

        Filesize

        64KB

      • memory/2720-84-0x0000013A147B0000-0x0000013A147C0000-memory.dmp

        Filesize

        64KB

      • memory/2720-83-0x0000013A147A0000-0x0000013A147B0000-memory.dmp

        Filesize

        64KB

      • memory/2720-80-0x0000013A14890000-0x0000013A148A0000-memory.dmp

        Filesize

        64KB

      • memory/2720-79-0x0000013A14880000-0x0000013A14890000-memory.dmp

        Filesize

        64KB

      • memory/2720-78-0x0000013A14870000-0x0000013A14880000-memory.dmp

        Filesize

        64KB

      • memory/2720-77-0x0000013A14860000-0x0000013A14870000-memory.dmp

        Filesize

        64KB

      • memory/2720-76-0x0000013A14790000-0x0000013A147A0000-memory.dmp

        Filesize

        64KB

      • memory/2720-74-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/2720-71-0x0000013A14850000-0x0000013A14860000-memory.dmp

        Filesize

        64KB

      • memory/2720-70-0x0000013A14780000-0x0000013A14790000-memory.dmp

        Filesize

        64KB

      • memory/2720-66-0x0000013A14830000-0x0000013A14840000-memory.dmp

        Filesize

        64KB

      • memory/2720-65-0x0000013A14760000-0x0000013A14770000-memory.dmp

        Filesize

        64KB

      • memory/2720-67-0x0000013A14840000-0x0000013A14850000-memory.dmp

        Filesize

        64KB

      • memory/2720-61-0x0000013A14820000-0x0000013A14830000-memory.dmp

        Filesize

        64KB

      • memory/2720-58-0x0000013A14810000-0x0000013A14820000-memory.dmp

        Filesize

        64KB

      • memory/2720-57-0x0000013A14740000-0x0000013A14750000-memory.dmp

        Filesize

        64KB

      • memory/2720-50-0x0000013A14730000-0x0000013A14740000-memory.dmp

        Filesize

        64KB

      • memory/2720-49-0x0000013A14720000-0x0000013A14730000-memory.dmp

        Filesize

        64KB

      • memory/2720-48-0x0000013A14710000-0x0000013A14720000-memory.dmp

        Filesize

        64KB

      • memory/2720-47-0x0000013A147F0000-0x0000013A14800000-memory.dmp

        Filesize

        64KB

      • memory/2720-46-0x0000013A14700000-0x0000013A14710000-memory.dmp

        Filesize

        64KB

      • memory/2720-176-0x0000013A14950000-0x0000013A14960000-memory.dmp

        Filesize

        64KB

      • memory/2720-41-0x0000013A14490000-0x0000013A14700000-memory.dmp

        Filesize

        2.4MB

      • memory/2720-43-0x0000013A147D0000-0x0000013A147E0000-memory.dmp

        Filesize

        64KB

      • memory/2720-37-0x0000013A147B0000-0x0000013A147C0000-memory.dmp

        Filesize

        64KB

      • memory/2720-36-0x0000013A147A0000-0x0000013A147B0000-memory.dmp

        Filesize

        64KB

      • memory/2720-32-0x0000013A14790000-0x0000013A147A0000-memory.dmp

        Filesize

        64KB

      • memory/2720-25-0x0000013A14750000-0x0000013A14760000-memory.dmp

        Filesize

        64KB

      • memory/2720-20-0x0000013A14730000-0x0000013A14740000-memory.dmp

        Filesize

        64KB

      • memory/2720-19-0x0000013A14720000-0x0000013A14730000-memory.dmp

        Filesize

        64KB

      • memory/2720-18-0x0000013A14710000-0x0000013A14720000-memory.dmp

        Filesize

        64KB

      • memory/2720-189-0x0000013A14730000-0x0000013A14740000-memory.dmp

        Filesize

        64KB

      • memory/2720-188-0x0000013A14720000-0x0000013A14730000-memory.dmp

        Filesize

        64KB

      • memory/2720-187-0x0000013A14710000-0x0000013A14720000-memory.dmp

        Filesize

        64KB

      • memory/2720-186-0x0000013A14700000-0x0000013A14710000-memory.dmp

        Filesize

        64KB

      • memory/2720-185-0x0000013A14490000-0x0000013A14700000-memory.dmp

        Filesize

        2.4MB

      • memory/2720-26-0x0000013A14760000-0x0000013A14770000-memory.dmp

        Filesize

        64KB

      • memory/2720-183-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/2720-182-0x0000013A14A10000-0x0000013A14A20000-memory.dmp

        Filesize

        64KB

      • memory/2720-181-0x0000013A14A00000-0x0000013A14A10000-memory.dmp

        Filesize

        64KB

      • memory/2720-180-0x0000013A14960000-0x0000013A14970000-memory.dmp

        Filesize

        64KB

      • memory/2720-23-0x0000013A14740000-0x0000013A14750000-memory.dmp

        Filesize

        64KB

      • memory/2720-113-0x0000013A14820000-0x0000013A14830000-memory.dmp

        Filesize

        64KB

      • memory/2720-2-0x0000013A14490000-0x0000013A14700000-memory.dmp

        Filesize

        2.4MB

      • memory/2720-12-0x0000013A14470000-0x0000013A14471000-memory.dmp

        Filesize

        4KB

      • memory/3396-299-0x0000020AE34F0000-0x0000020AE34F1000-memory.dmp

        Filesize

        4KB

      • memory/4308-358-0x000001CA7D230000-0x000001CA7D231000-memory.dmp

        Filesize

        4KB

      • memory/4308-374-0x000001CA7D230000-0x000001CA7D231000-memory.dmp

        Filesize

        4KB