Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 02:50

General

  • Target

    84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0.jar

  • Size

    196KB

  • MD5

    fb02745de7ec057a90b207602e732be6

  • SHA1

    c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

  • SHA256

    84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

  • SHA512

    5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

  • SSDEEP

    3072:KROA9tsCGC9tChoYvQlzwVa37ZGfteVTzg4U5N0iVfG6lfAANinzk4U86vLiy:I9aLC9EjYrrZGfteVTyjn12ANmo4Jy

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0.jar
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1556
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4312
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4284
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1532
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
          4⤵
            PID:3464
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4392
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
            4⤵
              PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0.jar

        Filesize

        196KB

        MD5

        fb02745de7ec057a90b207602e732be6

        SHA1

        c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

        SHA256

        84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

        SHA512

        5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        aae4a4ad0d8256562978c93724e722bb

        SHA1

        cfb3c707243626e1f7b9eebfd9412905e79451ad

        SHA256

        dfb7d6eb1d2c8df2dbf91b680c627202823ebeeb2e7200e5e6c2c294d26dbb99

        SHA512

        189af3dca007e07a66367218b64dcf2cb3faa90621e6876dced5bf2e3e6d7a6d460ac082e1c6e0200397bc25b2a4696970ab7f961fc982cddcf0e189435bbf12

      • memory/1820-28-0x0000021E06D20000-0x0000021E06D21000-memory.dmp

        Filesize

        4KB

      • memory/1820-47-0x0000021E087E0000-0x0000021E087F0000-memory.dmp

        Filesize

        64KB

      • memory/1820-18-0x0000021E08790000-0x0000021E087A0000-memory.dmp

        Filesize

        64KB

      • memory/1820-22-0x0000021E087B0000-0x0000021E087C0000-memory.dmp

        Filesize

        64KB

      • memory/1820-20-0x0000021E087A0000-0x0000021E087B0000-memory.dmp

        Filesize

        64KB

      • memory/1820-26-0x0000021E087D0000-0x0000021E087E0000-memory.dmp

        Filesize

        64KB

      • memory/1820-25-0x0000021E087C0000-0x0000021E087D0000-memory.dmp

        Filesize

        64KB

      • memory/1820-29-0x0000021E087E0000-0x0000021E087F0000-memory.dmp

        Filesize

        64KB

      • memory/1820-14-0x0000021E08770000-0x0000021E08780000-memory.dmp

        Filesize

        64KB

      • memory/1820-13-0x0000021E08760000-0x0000021E08770000-memory.dmp

        Filesize

        64KB

      • memory/1820-38-0x0000021E084F0000-0x0000021E08760000-memory.dmp

        Filesize

        2.4MB

      • memory/1820-16-0x0000021E08780000-0x0000021E08790000-memory.dmp

        Filesize

        64KB

      • memory/1820-46-0x0000021E087D0000-0x0000021E087E0000-memory.dmp

        Filesize

        64KB

      • memory/1820-45-0x0000021E087C0000-0x0000021E087D0000-memory.dmp

        Filesize

        64KB

      • memory/1820-44-0x0000021E087B0000-0x0000021E087C0000-memory.dmp

        Filesize

        64KB

      • memory/1820-43-0x0000021E087A0000-0x0000021E087B0000-memory.dmp

        Filesize

        64KB

      • memory/1820-42-0x0000021E08790000-0x0000021E087A0000-memory.dmp

        Filesize

        64KB

      • memory/1820-41-0x0000021E08780000-0x0000021E08790000-memory.dmp

        Filesize

        64KB

      • memory/1820-40-0x0000021E08770000-0x0000021E08780000-memory.dmp

        Filesize

        64KB

      • memory/1820-39-0x0000021E08760000-0x0000021E08770000-memory.dmp

        Filesize

        64KB

      • memory/1820-2-0x0000021E084F0000-0x0000021E08760000-memory.dmp

        Filesize

        2.4MB

      • memory/1952-51-0x00000156E38B0000-0x00000156E3B20000-memory.dmp

        Filesize

        2.4MB

      • memory/1952-62-0x00000156E3B20000-0x00000156E3B30000-memory.dmp

        Filesize

        64KB

      • memory/1952-64-0x00000156E3B30000-0x00000156E3B40000-memory.dmp

        Filesize

        64KB

      • memory/1952-67-0x00000156E3B40000-0x00000156E3B50000-memory.dmp

        Filesize

        64KB

      • memory/1952-68-0x00000156E3B50000-0x00000156E3B60000-memory.dmp

        Filesize

        64KB

      • memory/1952-71-0x00000156E3B60000-0x00000156E3B70000-memory.dmp

        Filesize

        64KB

      • memory/1952-74-0x00000156E3B70000-0x00000156E3B80000-memory.dmp

        Filesize

        64KB

      • memory/1952-75-0x00000156E3B80000-0x00000156E3B90000-memory.dmp

        Filesize

        64KB

      • memory/1952-77-0x00000156E3B90000-0x00000156E3BA0000-memory.dmp

        Filesize

        64KB

      • memory/1952-78-0x00000156E20B0000-0x00000156E20B1000-memory.dmp

        Filesize

        4KB

      • memory/1952-81-0x00000156E3BA0000-0x00000156E3BB0000-memory.dmp

        Filesize

        64KB

      • memory/1952-80-0x00000156E20B0000-0x00000156E20B1000-memory.dmp

        Filesize

        4KB

      • memory/1952-83-0x00000156E38B0000-0x00000156E3B20000-memory.dmp

        Filesize

        2.4MB

      • memory/1952-85-0x00000156E3B20000-0x00000156E3B30000-memory.dmp

        Filesize

        64KB

      • memory/1952-87-0x00000156E3B30000-0x00000156E3B40000-memory.dmp

        Filesize

        64KB

      • memory/1952-88-0x00000156E3B40000-0x00000156E3B50000-memory.dmp

        Filesize

        64KB

      • memory/1952-89-0x00000156E3B50000-0x00000156E3B60000-memory.dmp

        Filesize

        64KB

      • memory/1952-90-0x00000156E3B60000-0x00000156E3B70000-memory.dmp

        Filesize

        64KB

      • memory/1952-91-0x00000156E3B70000-0x00000156E3B80000-memory.dmp

        Filesize

        64KB

      • memory/1952-92-0x00000156E3B80000-0x00000156E3B90000-memory.dmp

        Filesize

        64KB

      • memory/1952-93-0x00000156E3B90000-0x00000156E3BA0000-memory.dmp

        Filesize

        64KB

      • memory/1952-94-0x00000156E3BA0000-0x00000156E3BB0000-memory.dmp

        Filesize

        64KB