Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 22:41

General

  • Target

    INV32762.jar

  • Size

    198KB

  • MD5

    0326cd8bc7583d4ef9bd89e158f504e4

  • SHA1

    87a3f552568e6b5209fb8b44c2c6c0b50c8ca46f

  • SHA256

    a5d4d6644f4c0fbacd3781a2d151e76bcd45de2da0dbf458cba84b8e34c9c1d0

  • SHA512

    ebf29aeaa9f4ad8a613cab52278568efc70aed6c1032c1f92b53ba9a258cb80b4b5d209e588d8a169493754a34c9495a9ab3e9157983d65c0e9291c8af8c6b5c

  • SSDEEP

    3072:HEythVs8HXV0aq4fKjV/36nipUuAVfgSBfQWyn2wV6Vs21dl+ZXJCU7XRQ:HEEhVs8lrKkieuiBly2GMsodgXMgXRQ

Malware Config

Signatures

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Strrat family
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\INV32762.jar
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\INV32762.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3128
      • C:\Windows\system32\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\INV32762.jar"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:624
    • C:\Program Files\Java\jre-1.8\bin\java.exe
      "C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\INV32762.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1940
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4836
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3224
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list
          4⤵
            PID:1240
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list
            4⤵
              PID:5012

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\INV32762.jar

        Filesize

        198KB

        MD5

        0326cd8bc7583d4ef9bd89e158f504e4

        SHA1

        87a3f552568e6b5209fb8b44c2c6c0b50c8ca46f

        SHA256

        a5d4d6644f4c0fbacd3781a2d151e76bcd45de2da0dbf458cba84b8e34c9c1d0

        SHA512

        ebf29aeaa9f4ad8a613cab52278568efc70aed6c1032c1f92b53ba9a258cb80b4b5d209e588d8a169493754a34c9495a9ab3e9157983d65c0e9291c8af8c6b5c

      • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

        Filesize

        46B

        MD5

        e4b58ef769d2105bb2eeda89fb302fba

        SHA1

        90907e80d73b35165d0796abd6524ad5c5873a51

        SHA256

        9250e55adbc810ee91a0db36715e429cedbb1a08b5664976af81255aa24db0cb

        SHA512

        b57202c4824b5f56da404dd2f3ea6b0ae7c3442e3f461a6ca90b22a6ee757fe73c50ffb9a5ca88561116bc3eaaa04ae6692914fb1a4e7e0f7fc66e2bce324574

      • memory/2328-33-0x000002219A4B0000-0x000002219A4B1000-memory.dmp

        Filesize

        4KB

      • memory/2328-39-0x000002219C020000-0x000002219C030000-memory.dmp

        Filesize

        64KB

      • memory/2328-20-0x000002219C030000-0x000002219C040000-memory.dmp

        Filesize

        64KB

      • memory/2328-19-0x000002219C020000-0x000002219C030000-memory.dmp

        Filesize

        64KB

      • memory/2328-23-0x000002219C040000-0x000002219C050000-memory.dmp

        Filesize

        64KB

      • memory/2328-27-0x000002219C060000-0x000002219C070000-memory.dmp

        Filesize

        64KB

      • memory/2328-25-0x000002219C050000-0x000002219C060000-memory.dmp

        Filesize

        64KB

      • memory/2328-14-0x000002219C000000-0x000002219C010000-memory.dmp

        Filesize

        64KB

      • memory/2328-13-0x000002219BFF0000-0x000002219C000000-memory.dmp

        Filesize

        64KB

      • memory/2328-16-0x000002219C010000-0x000002219C020000-memory.dmp

        Filesize

        64KB

      • memory/2328-38-0x000002219C010000-0x000002219C020000-memory.dmp

        Filesize

        64KB

      • memory/2328-43-0x000002219C060000-0x000002219C070000-memory.dmp

        Filesize

        64KB

      • memory/2328-42-0x000002219C050000-0x000002219C060000-memory.dmp

        Filesize

        64KB

      • memory/2328-41-0x000002219C040000-0x000002219C050000-memory.dmp

        Filesize

        64KB

      • memory/2328-40-0x000002219BD80000-0x000002219BFF0000-memory.dmp

        Filesize

        2.4MB

      • memory/2328-37-0x000002219C000000-0x000002219C010000-memory.dmp

        Filesize

        64KB

      • memory/2328-36-0x000002219BFF0000-0x000002219C000000-memory.dmp

        Filesize

        64KB

      • memory/2328-35-0x000002219C030000-0x000002219C040000-memory.dmp

        Filesize

        64KB

      • memory/2328-2-0x000002219BD80000-0x000002219BFF0000-memory.dmp

        Filesize

        2.4MB

      • memory/5016-47-0x0000020713FC0000-0x0000020714230000-memory.dmp

        Filesize

        2.4MB

      • memory/5016-58-0x0000020714230000-0x0000020714240000-memory.dmp

        Filesize

        64KB

      • memory/5016-60-0x0000020714240000-0x0000020714250000-memory.dmp

        Filesize

        64KB

      • memory/5016-63-0x0000020714250000-0x0000020714260000-memory.dmp

        Filesize

        64KB

      • memory/5016-64-0x0000020714260000-0x0000020714270000-memory.dmp

        Filesize

        64KB

      • memory/5016-66-0x0000020714270000-0x0000020714280000-memory.dmp

        Filesize

        64KB

      • memory/5016-70-0x0000020714280000-0x0000020714290000-memory.dmp

        Filesize

        64KB

      • memory/5016-71-0x0000020714290000-0x00000207142A0000-memory.dmp

        Filesize

        64KB

      • memory/5016-74-0x00000207142B0000-0x00000207142C0000-memory.dmp

        Filesize

        64KB

      • memory/5016-73-0x00000207142A0000-0x00000207142B0000-memory.dmp

        Filesize

        64KB

      • memory/5016-76-0x0000020713FA0000-0x0000020713FA1000-memory.dmp

        Filesize

        4KB

      • memory/5016-78-0x0000020713FC0000-0x0000020714230000-memory.dmp

        Filesize

        2.4MB

      • memory/5016-80-0x0000020714230000-0x0000020714240000-memory.dmp

        Filesize

        64KB

      • memory/5016-82-0x0000020714240000-0x0000020714250000-memory.dmp

        Filesize

        64KB

      • memory/5016-84-0x0000020714250000-0x0000020714260000-memory.dmp

        Filesize

        64KB

      • memory/5016-85-0x0000020714260000-0x0000020714270000-memory.dmp

        Filesize

        64KB

      • memory/5016-86-0x0000020714270000-0x0000020714280000-memory.dmp

        Filesize

        64KB

      • memory/5016-87-0x0000020714280000-0x0000020714290000-memory.dmp

        Filesize

        64KB

      • memory/5016-88-0x0000020714290000-0x00000207142A0000-memory.dmp

        Filesize

        64KB

      • memory/5016-89-0x00000207142A0000-0x00000207142B0000-memory.dmp

        Filesize

        64KB

      • memory/5016-90-0x00000207142B0000-0x00000207142C0000-memory.dmp

        Filesize

        64KB

      • memory/5016-94-0x00000207142C0000-0x00000207142D0000-memory.dmp

        Filesize

        64KB