Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 07:25

General

  • Target

    Shipping Bill No6239999Dt09122024.PDF.jar

  • Size

    196KB

  • MD5

    fb02745de7ec057a90b207602e732be6

  • SHA1

    c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

  • SHA256

    84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

  • SHA512

    5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

  • SSDEEP

    3072:KROA9tsCGC9tChoYvQlzwVa37ZGfteVTzg4U5N0iVfG6lfAANinzk4U86vLiy:I9aLC9EjYrrZGfteVTyjn12ANmo4Jy

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Shipping Bill No6239999Dt09122024.PDF.jar"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Shipping Bill No6239999Dt09122024.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\Shipping Bill No6239999Dt09122024.PDF.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2228
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\Shipping Bill No6239999Dt09122024.PDF.jar"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4528
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3916
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4092
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
          4⤵
            PID:744
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1828
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
            4⤵
              PID:2784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Shipping Bill No6239999Dt09122024.PDF.jar

        Filesize

        196KB

        MD5

        fb02745de7ec057a90b207602e732be6

        SHA1

        c1ecc13f6f7b8043918cc17a4fb88fb29c6ba9d0

        SHA256

        84481aed848a500ec03fb0e95443a125eac073999aaf8391e221f72f75a33cb0

        SHA512

        5e3c21bba3cc652bacb2b32187d62682f441f2e484386c850372dfb39cf2adce3b092dd4aa418bc7aa913f0f3a9527e68cabbe9a93158efd5ae3b997d05faa2e

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        6ddd1db8dc3b3a5f8bf571816611f5ca

        SHA1

        5d28db6e5e84a8c966cd1efd4c347e242821ae43

        SHA256

        d57a651822566b62455acce7767440643291badfa043492bfcef54e68313509a

        SHA512

        f8de133779f12e3d56a9e7c7f5a1f0a8d0085aa118f92e121d90ebc81cf226b436c40e7043f4f9871cf632ff89a0006a99c5b3ef1be19f69bf7404dc250e8970

      • memory/1144-79-0x000001BE7A250000-0x000001BE7A251000-memory.dmp

        Filesize

        4KB

      • memory/1144-64-0x000001BE00280000-0x000001BE00290000-memory.dmp

        Filesize

        64KB

      • memory/1144-62-0x000001BE00270000-0x000001BE00280000-memory.dmp

        Filesize

        64KB

      • memory/1144-94-0x000001BE002F0000-0x000001BE00300000-memory.dmp

        Filesize

        64KB

      • memory/1144-93-0x000001BE002E0000-0x000001BE002F0000-memory.dmp

        Filesize

        64KB

      • memory/1144-91-0x000001BE002C0000-0x000001BE002D0000-memory.dmp

        Filesize

        64KB

      • memory/1144-92-0x000001BE002D0000-0x000001BE002E0000-memory.dmp

        Filesize

        64KB

      • memory/1144-90-0x000001BE002B0000-0x000001BE002C0000-memory.dmp

        Filesize

        64KB

      • memory/1144-89-0x000001BE002A0000-0x000001BE002B0000-memory.dmp

        Filesize

        64KB

      • memory/1144-88-0x000001BE00290000-0x000001BE002A0000-memory.dmp

        Filesize

        64KB

      • memory/1144-86-0x000001BE00280000-0x000001BE00290000-memory.dmp

        Filesize

        64KB

      • memory/1144-84-0x000001BE00270000-0x000001BE00280000-memory.dmp

        Filesize

        64KB

      • memory/1144-80-0x000001BE00000000-0x000001BE00270000-memory.dmp

        Filesize

        2.4MB

      • memory/1144-77-0x000001BE002E0000-0x000001BE002F0000-memory.dmp

        Filesize

        64KB

      • memory/1144-78-0x000001BE002F0000-0x000001BE00300000-memory.dmp

        Filesize

        64KB

      • memory/1144-73-0x000001BE002C0000-0x000001BE002D0000-memory.dmp

        Filesize

        64KB

      • memory/1144-74-0x000001BE002D0000-0x000001BE002E0000-memory.dmp

        Filesize

        64KB

      • memory/1144-51-0x000001BE00000000-0x000001BE00270000-memory.dmp

        Filesize

        2.4MB

      • memory/1144-69-0x000001BE002A0000-0x000001BE002B0000-memory.dmp

        Filesize

        64KB

      • memory/1144-70-0x000001BE002B0000-0x000001BE002C0000-memory.dmp

        Filesize

        64KB

      • memory/1144-66-0x000001BE00290000-0x000001BE002A0000-memory.dmp

        Filesize

        64KB

      • memory/3396-30-0x0000023D002F0000-0x0000023D00300000-memory.dmp

        Filesize

        64KB

      • memory/3396-39-0x0000023D00270000-0x0000023D00280000-memory.dmp

        Filesize

        64KB

      • memory/3396-14-0x0000023D00270000-0x0000023D00280000-memory.dmp

        Filesize

        64KB

      • memory/3396-47-0x0000023D002F0000-0x0000023D00300000-memory.dmp

        Filesize

        64KB

      • memory/3396-41-0x0000023D00290000-0x0000023D002A0000-memory.dmp

        Filesize

        64KB

      • memory/3396-42-0x0000023D002A0000-0x0000023D002B0000-memory.dmp

        Filesize

        64KB

      • memory/3396-43-0x0000023D002B0000-0x0000023D002C0000-memory.dmp

        Filesize

        64KB

      • memory/3396-44-0x0000023D002C0000-0x0000023D002D0000-memory.dmp

        Filesize

        64KB

      • memory/3396-45-0x0000023D002D0000-0x0000023D002E0000-memory.dmp

        Filesize

        64KB

      • memory/3396-46-0x0000023D002E0000-0x0000023D002F0000-memory.dmp

        Filesize

        64KB

      • memory/3396-2-0x0000023D00000000-0x0000023D00270000-memory.dmp

        Filesize

        2.4MB

      • memory/3396-18-0x0000023D002A0000-0x0000023D002B0000-memory.dmp

        Filesize

        64KB

      • memory/3396-38-0x0000023D00000000-0x0000023D00270000-memory.dmp

        Filesize

        2.4MB

      • memory/3396-40-0x0000023D00280000-0x0000023D00290000-memory.dmp

        Filesize

        64KB

      • memory/3396-16-0x0000023D00290000-0x0000023D002A0000-memory.dmp

        Filesize

        64KB

      • memory/3396-29-0x0000023D002E0000-0x0000023D002F0000-memory.dmp

        Filesize

        64KB

      • memory/3396-15-0x0000023D00280000-0x0000023D00290000-memory.dmp

        Filesize

        64KB

      • memory/3396-23-0x0000023D002C0000-0x0000023D002D0000-memory.dmp

        Filesize

        64KB

      • memory/3396-25-0x0000023D002D0000-0x0000023D002E0000-memory.dmp

        Filesize

        64KB

      • memory/3396-20-0x0000023D002B0000-0x0000023D002C0000-memory.dmp

        Filesize

        64KB

      • memory/3396-21-0x0000023D7B3C0000-0x0000023D7B3C1000-memory.dmp

        Filesize

        4KB