Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 10:42

General

  • Target

    Shipping Bill No6239999Dt09122024.PDF.jar

  • Size

    196KB

  • MD5

    fb02745de7ec057a90b207602e732be6

  • SHA1

    c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

  • SHA256

    84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

  • SHA512

    5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

  • SSDEEP

    3072:KROA9tsCGC9tChoYvQlzwVa37ZGfteVTzg4U5N0iVfG6lfAANinzk4U86vLiy:I9aLC9EjYrrZGfteVTyjn12ANmo4Jy

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Shipping Bill No6239999Dt09122024.PDF.jar"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Shipping Bill No6239999Dt09122024.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Shipping Bill No6239999Dt09122024.PDF.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4292
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\Shipping Bill No6239999Dt09122024.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2772
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:440
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4820
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
          4⤵
            PID:2032
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3724
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
            4⤵
              PID:5056

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Shipping Bill No6239999Dt09122024.PDF.jar

        Filesize

        196KB

        MD5

        fb02745de7ec057a90b207602e732be6

        SHA1

        c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

        SHA256

        84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

        SHA512

        5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        710eddc113aa2201fafe2b8f0c8cc34e

        SHA1

        80830f050ffa115c52ba6770466437efd3330915

        SHA256

        7442ddae0a3b7025fb833d038adf4e41cfa806b3f74af439293cb68794efea45

        SHA512

        fb10839481f3a8ea3e2d06c6e109ae554820d042374685db0d73a51ac520f135f91ee6d21a2cf21bb229f967b964336d96cff29a868da246172ea7448a887165

      • memory/2976-79-0x0000023480270000-0x0000023480280000-memory.dmp

        Filesize

        64KB

      • memory/2976-83-0x0000023480290000-0x00000234802A0000-memory.dmp

        Filesize

        64KB

      • memory/2976-61-0x0000023480290000-0x00000234802A0000-memory.dmp

        Filesize

        64KB

      • memory/2976-92-0x0000023480300000-0x0000023480310000-memory.dmp

        Filesize

        64KB

      • memory/2976-91-0x00000234802F0000-0x0000023480300000-memory.dmp

        Filesize

        64KB

      • memory/2976-90-0x00000234802E0000-0x00000234802F0000-memory.dmp

        Filesize

        64KB

      • memory/2976-88-0x00000234802D0000-0x00000234802E0000-memory.dmp

        Filesize

        64KB

      • memory/2976-59-0x0000023480280000-0x0000023480290000-memory.dmp

        Filesize

        64KB

      • memory/2976-87-0x00000234802C0000-0x00000234802D0000-memory.dmp

        Filesize

        64KB

      • memory/2976-86-0x00000234802B0000-0x00000234802C0000-memory.dmp

        Filesize

        64KB

      • memory/2976-85-0x00000234802A0000-0x00000234802B0000-memory.dmp

        Filesize

        64KB

      • memory/2976-65-0x00000234802B0000-0x00000234802C0000-memory.dmp

        Filesize

        64KB

      • memory/2976-57-0x0000023480270000-0x0000023480280000-memory.dmp

        Filesize

        64KB

      • memory/2976-82-0x0000023480280000-0x0000023480290000-memory.dmp

        Filesize

        64KB

      • memory/2976-80-0x0000023480300000-0x0000023480310000-memory.dmp

        Filesize

        64KB

      • memory/2976-77-0x0000023480000000-0x0000023480270000-memory.dmp

        Filesize

        2.4MB

      • memory/2976-75-0x00000234F6C20000-0x00000234F6C21000-memory.dmp

        Filesize

        4KB

      • memory/2976-73-0x00000234802F0000-0x0000023480300000-memory.dmp

        Filesize

        64KB

      • memory/2976-46-0x0000023480000000-0x0000023480270000-memory.dmp

        Filesize

        2.4MB

      • memory/2976-69-0x00000234802C0000-0x00000234802D0000-memory.dmp

        Filesize

        64KB

      • memory/2976-71-0x00000234802E0000-0x00000234802F0000-memory.dmp

        Filesize

        64KB

      • memory/2976-70-0x00000234802D0000-0x00000234802E0000-memory.dmp

        Filesize

        64KB

      • memory/2976-64-0x00000234802A0000-0x00000234802B0000-memory.dmp

        Filesize

        64KB

      • memory/3164-14-0x0000018451780000-0x0000018451790000-memory.dmp

        Filesize

        64KB

      • memory/3164-20-0x00000184517B0000-0x00000184517C0000-memory.dmp

        Filesize

        64KB

      • memory/3164-16-0x0000018451790000-0x00000184517A0000-memory.dmp

        Filesize

        64KB

      • memory/3164-40-0x00000184517C0000-0x00000184517D0000-memory.dmp

        Filesize

        64KB

      • memory/3164-12-0x0000018451770000-0x0000018451780000-memory.dmp

        Filesize

        64KB

      • memory/3164-36-0x0000018451780000-0x0000018451790000-memory.dmp

        Filesize

        64KB

      • memory/3164-38-0x00000184517A0000-0x00000184517B0000-memory.dmp

        Filesize

        64KB

      • memory/3164-34-0x0000018451500000-0x0000018451770000-memory.dmp

        Filesize

        2.4MB

      • memory/3164-2-0x0000018451500000-0x0000018451770000-memory.dmp

        Filesize

        2.4MB

      • memory/3164-35-0x0000018451770000-0x0000018451780000-memory.dmp

        Filesize

        64KB

      • memory/3164-37-0x0000018451790000-0x00000184517A0000-memory.dmp

        Filesize

        64KB

      • memory/3164-41-0x00000184517D0000-0x00000184517E0000-memory.dmp

        Filesize

        64KB

      • memory/3164-42-0x00000184517E0000-0x00000184517F0000-memory.dmp

        Filesize

        64KB

      • memory/3164-39-0x00000184517B0000-0x00000184517C0000-memory.dmp

        Filesize

        64KB

      • memory/3164-32-0x000001844FC60000-0x000001844FC61000-memory.dmp

        Filesize

        4KB

      • memory/3164-26-0x00000184517E0000-0x00000184517F0000-memory.dmp

        Filesize

        64KB

      • memory/3164-24-0x00000184517D0000-0x00000184517E0000-memory.dmp

        Filesize

        64KB

      • memory/3164-23-0x00000184517C0000-0x00000184517D0000-memory.dmp

        Filesize

        64KB

      • memory/3164-19-0x00000184517A0000-0x00000184517B0000-memory.dmp

        Filesize

        64KB