Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 10:49

General

  • Target

    ShippingBillNo6239999Dt09122024.PDF.jar

  • Size

    196KB

  • MD5

    fb02745de7ec057a90b207602e732be6

  • SHA1

    c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

  • SHA256

    84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

  • SHA512

    5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

  • SSDEEP

    3072:KROA9tsCGC9tChoYvQlzwVa37ZGfteVTzg4U5N0iVfG6lfAANinzk4U86vLiy:I9aLC9EjYrrZGfteVTyjn12ANmo4Jy

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\ShippingBillNo6239999Dt09122024.PDF.jar
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\ShippingBillNo6239999Dt09122024.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\ShippingBillNo6239999Dt09122024.PDF.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2948
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\ShippingBillNo6239999Dt09122024.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4456
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4780
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
          4⤵
            PID:1552
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1904
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
            4⤵
              PID:3032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ShippingBillNo6239999Dt09122024.PDF.jar

        Filesize

        196KB

        MD5

        fb02745de7ec057a90b207602e732be6

        SHA1

        c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

        SHA256

        84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

        SHA512

        5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

      • memory/1680-43-0x00000189BC110000-0x00000189BC120000-memory.dmp

        Filesize

        64KB

      • memory/1680-13-0x00000189BC0F0000-0x00000189BC100000-memory.dmp

        Filesize

        64KB

      • memory/1680-19-0x00000189BC120000-0x00000189BC130000-memory.dmp

        Filesize

        64KB

      • memory/1680-41-0x00000189BC0F0000-0x00000189BC100000-memory.dmp

        Filesize

        64KB

      • memory/1680-24-0x00000189BC150000-0x00000189BC160000-memory.dmp

        Filesize

        64KB

      • memory/1680-23-0x00000189BC140000-0x00000189BC150000-memory.dmp

        Filesize

        64KB

      • memory/1680-27-0x00000189BC160000-0x00000189BC170000-memory.dmp

        Filesize

        64KB

      • memory/1680-29-0x00000189BC170000-0x00000189BC180000-memory.dmp

        Filesize

        64KB

      • memory/1680-30-0x00000189BBE80000-0x00000189BC0F0000-memory.dmp

        Filesize

        2.4MB

      • memory/1680-31-0x00000189BC180000-0x00000189BC190000-memory.dmp

        Filesize

        64KB

      • memory/1680-33-0x00000189BBE60000-0x00000189BBE61000-memory.dmp

        Filesize

        4KB

      • memory/1680-40-0x00000189BBE80000-0x00000189BC0F0000-memory.dmp

        Filesize

        2.4MB

      • memory/1680-50-0x00000189BC180000-0x00000189BC190000-memory.dmp

        Filesize

        64KB

      • memory/1680-49-0x00000189BC170000-0x00000189BC180000-memory.dmp

        Filesize

        64KB

      • memory/1680-48-0x00000189BC160000-0x00000189BC170000-memory.dmp

        Filesize

        64KB

      • memory/1680-47-0x00000189BC150000-0x00000189BC160000-memory.dmp

        Filesize

        64KB

      • memory/1680-46-0x00000189BC140000-0x00000189BC150000-memory.dmp

        Filesize

        64KB

      • memory/1680-14-0x00000189BC100000-0x00000189BC110000-memory.dmp

        Filesize

        64KB

      • memory/1680-45-0x00000189BC130000-0x00000189BC140000-memory.dmp

        Filesize

        64KB

      • memory/1680-44-0x00000189BC120000-0x00000189BC130000-memory.dmp

        Filesize

        64KB

      • memory/1680-2-0x00000189BBE80000-0x00000189BC0F0000-memory.dmp

        Filesize

        2.4MB

      • memory/1680-42-0x00000189BC100000-0x00000189BC110000-memory.dmp

        Filesize

        64KB

      • memory/1680-20-0x00000189BC130000-0x00000189BC140000-memory.dmp

        Filesize

        64KB

      • memory/1680-16-0x00000189BC110000-0x00000189BC120000-memory.dmp

        Filesize

        64KB

      • memory/4680-93-0x000002805CCF0000-0x000002805CD00000-memory.dmp

        Filesize

        64KB

      • memory/4680-65-0x000002805CC80000-0x000002805CC90000-memory.dmp

        Filesize

        64KB

      • memory/4680-67-0x000002805CC90000-0x000002805CCA0000-memory.dmp

        Filesize

        64KB

      • memory/4680-69-0x000002805CCA0000-0x000002805CCB0000-memory.dmp

        Filesize

        64KB

      • memory/4680-73-0x000002805CCC0000-0x000002805CCD0000-memory.dmp

        Filesize

        64KB

      • memory/4680-72-0x000002805CCB0000-0x000002805CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4680-76-0x000002805CCD0000-0x000002805CCE0000-memory.dmp

        Filesize

        64KB

      • memory/4680-80-0x000002805CCE0000-0x000002805CCF0000-memory.dmp

        Filesize

        64KB

      • memory/4680-79-0x000002805CCF0000-0x000002805CD00000-memory.dmp

        Filesize

        64KB

      • memory/4680-82-0x000002805B140000-0x000002805B141000-memory.dmp

        Filesize

        4KB

      • memory/4680-83-0x000002805CD00000-0x000002805CD10000-memory.dmp

        Filesize

        64KB

      • memory/4680-84-0x000002805CA10000-0x000002805CC80000-memory.dmp

        Filesize

        2.4MB

      • memory/4680-86-0x000002805CC80000-0x000002805CC90000-memory.dmp

        Filesize

        64KB

      • memory/4680-87-0x000002805CC90000-0x000002805CCA0000-memory.dmp

        Filesize

        64KB

      • memory/4680-89-0x000002805CCA0000-0x000002805CCB0000-memory.dmp

        Filesize

        64KB

      • memory/4680-90-0x000002805CCB0000-0x000002805CCC0000-memory.dmp

        Filesize

        64KB

      • memory/4680-91-0x000002805CCC0000-0x000002805CCD0000-memory.dmp

        Filesize

        64KB

      • memory/4680-92-0x000002805CCD0000-0x000002805CCE0000-memory.dmp

        Filesize

        64KB

      • memory/4680-94-0x000002805CCE0000-0x000002805CCF0000-memory.dmp

        Filesize

        64KB

      • memory/4680-54-0x000002805CA10000-0x000002805CC80000-memory.dmp

        Filesize

        2.4MB

      • memory/4680-95-0x000002805CD00000-0x000002805CD10000-memory.dmp

        Filesize

        64KB