Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 12:31
Behavioral task
behavioral1
Sample
Shipping Bill6239999 dated 13122024.PDF.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping Bill6239999 dated 13122024.PDF.jar
Resource
win10v2004-20241007-en
General
-
Target
Shipping Bill6239999 dated 13122024.PDF.jar
-
Size
196KB
-
MD5
01fd77362fbe5b158352d203bf4e264d
-
SHA1
b707961bf70f6798103b0f9dcf516ca3fb63a52f
-
SHA256
9dbfb2b2c624a39591fd60397997ae7d9c09896862b5d97c5db3c7dd6c6d902b
-
SHA512
c64d87211760ece2e76ed4bd9255d2f728159ced3a03bdfac28fa17d9b0f452d73e0ef62521ec354a44657028acea8e620620c1a4d3c0c4a91612d5c347288d7
-
SSDEEP
3072:lROA9tlCGC9tKioY4Ql1wVa3CZGfteVTIglU5N0cVfG6lLAANinz94ZC6vr5:/9/LC9sGVNSZGfteVTAjJ1qANmx4x
Malware Config
Signatures
-
Strrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Shipping Bill6239999 dated 13122024.PDF.jar java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shipping Bill6239999 dated 13122024.PDF = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Shipping Bill6239999 dated 13122024.PDF.jar\"" java.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shipping Bill6239999 dated 13122024.PDF = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\Shipping Bill6239999 dated 13122024.PDF.jar\"" java.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2340 java.exe 4260 cmd.exe 3932 java.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2904 WMIC.exe Token: SeSecurityPrivilege 2904 WMIC.exe Token: SeTakeOwnershipPrivilege 2904 WMIC.exe Token: SeLoadDriverPrivilege 2904 WMIC.exe Token: SeSystemProfilePrivilege 2904 WMIC.exe Token: SeSystemtimePrivilege 2904 WMIC.exe Token: SeProfSingleProcessPrivilege 2904 WMIC.exe Token: SeIncBasePriorityPrivilege 2904 WMIC.exe Token: SeCreatePagefilePrivilege 2904 WMIC.exe Token: SeBackupPrivilege 2904 WMIC.exe Token: SeRestorePrivilege 2904 WMIC.exe Token: SeShutdownPrivilege 2904 WMIC.exe Token: SeDebugPrivilege 2904 WMIC.exe Token: SeSystemEnvironmentPrivilege 2904 WMIC.exe Token: SeRemoteShutdownPrivilege 2904 WMIC.exe Token: SeUndockPrivilege 2904 WMIC.exe Token: SeManageVolumePrivilege 2904 WMIC.exe Token: 33 2904 WMIC.exe Token: 34 2904 WMIC.exe Token: 35 2904 WMIC.exe Token: 36 2904 WMIC.exe Token: SeIncreaseQuotaPrivilege 2904 WMIC.exe Token: SeSecurityPrivilege 2904 WMIC.exe Token: SeTakeOwnershipPrivilege 2904 WMIC.exe Token: SeLoadDriverPrivilege 2904 WMIC.exe Token: SeSystemProfilePrivilege 2904 WMIC.exe Token: SeSystemtimePrivilege 2904 WMIC.exe Token: SeProfSingleProcessPrivilege 2904 WMIC.exe Token: SeIncBasePriorityPrivilege 2904 WMIC.exe Token: SeCreatePagefilePrivilege 2904 WMIC.exe Token: SeBackupPrivilege 2904 WMIC.exe Token: SeRestorePrivilege 2904 WMIC.exe Token: SeShutdownPrivilege 2904 WMIC.exe Token: SeDebugPrivilege 2904 WMIC.exe Token: SeSystemEnvironmentPrivilege 2904 WMIC.exe Token: SeRemoteShutdownPrivilege 2904 WMIC.exe Token: SeUndockPrivilege 2904 WMIC.exe Token: SeManageVolumePrivilege 2904 WMIC.exe Token: 33 2904 WMIC.exe Token: 34 2904 WMIC.exe Token: 35 2904 WMIC.exe Token: 36 2904 WMIC.exe Token: SeIncreaseQuotaPrivilege 4532 WMIC.exe Token: SeSecurityPrivilege 4532 WMIC.exe Token: SeTakeOwnershipPrivilege 4532 WMIC.exe Token: SeLoadDriverPrivilege 4532 WMIC.exe Token: SeSystemProfilePrivilege 4532 WMIC.exe Token: SeSystemtimePrivilege 4532 WMIC.exe Token: SeProfSingleProcessPrivilege 4532 WMIC.exe Token: SeIncBasePriorityPrivilege 4532 WMIC.exe Token: SeCreatePagefilePrivilege 4532 WMIC.exe Token: SeBackupPrivilege 4532 WMIC.exe Token: SeRestorePrivilege 4532 WMIC.exe Token: SeShutdownPrivilege 4532 WMIC.exe Token: SeDebugPrivilege 4532 WMIC.exe Token: SeSystemEnvironmentPrivilege 4532 WMIC.exe Token: SeRemoteShutdownPrivilege 4532 WMIC.exe Token: SeUndockPrivilege 4532 WMIC.exe Token: SeManageVolumePrivilege 4532 WMIC.exe Token: 33 4532 WMIC.exe Token: 34 4532 WMIC.exe Token: 35 4532 WMIC.exe Token: 36 4532 WMIC.exe Token: SeIncreaseQuotaPrivilege 4532 WMIC.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4260 2340 java.exe 83 PID 2340 wrote to memory of 4260 2340 java.exe 83 PID 2340 wrote to memory of 3932 2340 java.exe 84 PID 2340 wrote to memory of 3932 2340 java.exe 84 PID 4260 wrote to memory of 1408 4260 cmd.exe 87 PID 4260 wrote to memory of 1408 4260 cmd.exe 87 PID 3932 wrote to memory of 3096 3932 java.exe 88 PID 3932 wrote to memory of 3096 3932 java.exe 88 PID 3096 wrote to memory of 2904 3096 cmd.exe 90 PID 3096 wrote to memory of 2904 3096 cmd.exe 90 PID 3932 wrote to memory of 4456 3932 java.exe 92 PID 3932 wrote to memory of 4456 3932 java.exe 92 PID 4456 wrote to memory of 4532 4456 cmd.exe 94 PID 4456 wrote to memory of 4532 4456 cmd.exe 94 PID 3932 wrote to memory of 2344 3932 java.exe 95 PID 3932 wrote to memory of 2344 3932 java.exe 95 PID 2344 wrote to memory of 2492 2344 cmd.exe 97 PID 2344 wrote to memory of 2492 2344 cmd.exe 97 PID 3932 wrote to memory of 4596 3932 java.exe 98 PID 3932 wrote to memory of 4596 3932 java.exe 98 PID 4596 wrote to memory of 2280 4596 cmd.exe 100 PID 4596 wrote to memory of 2280 4596 cmd.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Shipping Bill6239999 dated 13122024.PDF.jar"1⤵
- Drops startup file
- Adds Run key to start application
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1408
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\Shipping Bill6239999 dated 13122024.PDF.jar"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list4⤵PID:2492
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list4⤵PID:2280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Shipping Bill6239999 dated 13122024.PDF.jar
Filesize196KB
MD501fd77362fbe5b158352d203bf4e264d
SHA1b707961bf70f6798103b0f9dcf516ca3fb63a52f
SHA2569dbfb2b2c624a39591fd60397997ae7d9c09896862b5d97c5db3c7dd6c6d902b
SHA512c64d87211760ece2e76ed4bd9255d2f728159ced3a03bdfac28fa17d9b0f452d73e0ef62521ec354a44657028acea8e620620c1a4d3c0c4a91612d5c347288d7
-
Filesize
46B
MD55e3c2588a469ef2dd794f24144d20f59
SHA15a7d055907757905bca1e81a14f884c120a1dd60
SHA256436a5f2dc913434f242c77ad5ec143e92fa215f7c302068b064c647fc0947d23
SHA51224dc58b84629493181d5ae12d85cf773b04ff0687fbc854d950471d9ca55195a7e37b879acad5eceeadeb31d3bb293e0a92ace14f7142de250712ca63bd58472