Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 22:41
Behavioral task
behavioral1
Sample
INV32762.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INV32762.jar
Resource
win10v2004-20241007-en
General
-
Target
INV32762.jar
-
Size
198KB
-
MD5
0326cd8bc7583d4ef9bd89e158f504e4
-
SHA1
87a3f552568e6b5209fb8b44c2c6c0b50c8ca46f
-
SHA256
a5d4d6644f4c0fbacd3781a2d151e76bcd45de2da0dbf458cba84b8e34c9c1d0
-
SHA512
ebf29aeaa9f4ad8a613cab52278568efc70aed6c1032c1f92b53ba9a258cb80b4b5d209e588d8a169493754a34c9495a9ab3e9157983d65c0e9291c8af8c6b5c
-
SSDEEP
3072:HEythVs8HXV0aq4fKjV/36nipUuAVfgSBfQWyn2wV6Vs21dl+ZXJCU7XRQ:HEEhVs8lrKkieuiBly2GMsodgXMgXRQ
Malware Config
Signatures
-
Strrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\INV32762.jar java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\INV32762 = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\INV32762.jar\"" java.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\INV32762 = "\"C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\INV32762.jar\"" java.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 624 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1940 WMIC.exe Token: SeSecurityPrivilege 1940 WMIC.exe Token: SeTakeOwnershipPrivilege 1940 WMIC.exe Token: SeLoadDriverPrivilege 1940 WMIC.exe Token: SeSystemProfilePrivilege 1940 WMIC.exe Token: SeSystemtimePrivilege 1940 WMIC.exe Token: SeProfSingleProcessPrivilege 1940 WMIC.exe Token: SeIncBasePriorityPrivilege 1940 WMIC.exe Token: SeCreatePagefilePrivilege 1940 WMIC.exe Token: SeBackupPrivilege 1940 WMIC.exe Token: SeRestorePrivilege 1940 WMIC.exe Token: SeShutdownPrivilege 1940 WMIC.exe Token: SeDebugPrivilege 1940 WMIC.exe Token: SeSystemEnvironmentPrivilege 1940 WMIC.exe Token: SeRemoteShutdownPrivilege 1940 WMIC.exe Token: SeUndockPrivilege 1940 WMIC.exe Token: SeManageVolumePrivilege 1940 WMIC.exe Token: 33 1940 WMIC.exe Token: 34 1940 WMIC.exe Token: 35 1940 WMIC.exe Token: 36 1940 WMIC.exe Token: SeIncreaseQuotaPrivilege 1940 WMIC.exe Token: SeSecurityPrivilege 1940 WMIC.exe Token: SeTakeOwnershipPrivilege 1940 WMIC.exe Token: SeLoadDriverPrivilege 1940 WMIC.exe Token: SeSystemProfilePrivilege 1940 WMIC.exe Token: SeSystemtimePrivilege 1940 WMIC.exe Token: SeProfSingleProcessPrivilege 1940 WMIC.exe Token: SeIncBasePriorityPrivilege 1940 WMIC.exe Token: SeCreatePagefilePrivilege 1940 WMIC.exe Token: SeBackupPrivilege 1940 WMIC.exe Token: SeRestorePrivilege 1940 WMIC.exe Token: SeShutdownPrivilege 1940 WMIC.exe Token: SeDebugPrivilege 1940 WMIC.exe Token: SeSystemEnvironmentPrivilege 1940 WMIC.exe Token: SeRemoteShutdownPrivilege 1940 WMIC.exe Token: SeUndockPrivilege 1940 WMIC.exe Token: SeManageVolumePrivilege 1940 WMIC.exe Token: 33 1940 WMIC.exe Token: 34 1940 WMIC.exe Token: 35 1940 WMIC.exe Token: 36 1940 WMIC.exe Token: SeIncreaseQuotaPrivilege 4836 WMIC.exe Token: SeSecurityPrivilege 4836 WMIC.exe Token: SeTakeOwnershipPrivilege 4836 WMIC.exe Token: SeLoadDriverPrivilege 4836 WMIC.exe Token: SeSystemProfilePrivilege 4836 WMIC.exe Token: SeSystemtimePrivilege 4836 WMIC.exe Token: SeProfSingleProcessPrivilege 4836 WMIC.exe Token: SeIncBasePriorityPrivilege 4836 WMIC.exe Token: SeCreatePagefilePrivilege 4836 WMIC.exe Token: SeBackupPrivilege 4836 WMIC.exe Token: SeRestorePrivilege 4836 WMIC.exe Token: SeShutdownPrivilege 4836 WMIC.exe Token: SeDebugPrivilege 4836 WMIC.exe Token: SeSystemEnvironmentPrivilege 4836 WMIC.exe Token: SeRemoteShutdownPrivilege 4836 WMIC.exe Token: SeUndockPrivilege 4836 WMIC.exe Token: SeManageVolumePrivilege 4836 WMIC.exe Token: 33 4836 WMIC.exe Token: 34 4836 WMIC.exe Token: 35 4836 WMIC.exe Token: 36 4836 WMIC.exe Token: SeIncreaseQuotaPrivilege 4836 WMIC.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3128 2328 java.exe 83 PID 2328 wrote to memory of 3128 2328 java.exe 83 PID 2328 wrote to memory of 5016 2328 java.exe 84 PID 2328 wrote to memory of 5016 2328 java.exe 84 PID 3128 wrote to memory of 624 3128 cmd.exe 87 PID 3128 wrote to memory of 624 3128 cmd.exe 87 PID 5016 wrote to memory of 320 5016 java.exe 88 PID 5016 wrote to memory of 320 5016 java.exe 88 PID 320 wrote to memory of 1940 320 cmd.exe 90 PID 320 wrote to memory of 1940 320 cmd.exe 90 PID 5016 wrote to memory of 4104 5016 java.exe 92 PID 5016 wrote to memory of 4104 5016 java.exe 92 PID 4104 wrote to memory of 4836 4104 cmd.exe 94 PID 4104 wrote to memory of 4836 4104 cmd.exe 94 PID 5016 wrote to memory of 3224 5016 java.exe 95 PID 5016 wrote to memory of 3224 5016 java.exe 95 PID 3224 wrote to memory of 1240 3224 cmd.exe 97 PID 3224 wrote to memory of 1240 3224 cmd.exe 97 PID 5016 wrote to memory of 1388 5016 java.exe 98 PID 5016 wrote to memory of 1388 5016 java.exe 98 PID 1388 wrote to memory of 5012 1388 cmd.exe 100 PID 1388 wrote to memory of 5012 1388 cmd.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\INV32762.jar1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SYSTEM32\cmd.execmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\INV32762.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\INV32762.jar"3⤵
- Scheduled Task/Job: Scheduled Task
PID:624
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\INV32762.jar"2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_logicaldisk get volumeserialnumber /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get caption,OSArchitecture /format:list4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:. /namespace:'\\root\cimv2' path win32_operatingsystem get version /format:list4⤵PID:1240
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "wmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list"3⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\System32\Wbem\WMIC.exewmic /node:localhost /namespace:'\\root\securitycenter2' path antivirusproduct get displayname /format:list4⤵PID:5012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD50326cd8bc7583d4ef9bd89e158f504e4
SHA187a3f552568e6b5209fb8b44c2c6c0b50c8ca46f
SHA256a5d4d6644f4c0fbacd3781a2d151e76bcd45de2da0dbf458cba84b8e34c9c1d0
SHA512ebf29aeaa9f4ad8a613cab52278568efc70aed6c1032c1f92b53ba9a258cb80b4b5d209e588d8a169493754a34c9495a9ab3e9157983d65c0e9291c8af8c6b5c
-
Filesize
46B
MD5e4b58ef769d2105bb2eeda89fb302fba
SHA190907e80d73b35165d0796abd6524ad5c5873a51
SHA2569250e55adbc810ee91a0db36715e429cedbb1a08b5664976af81255aa24db0cb
SHA512b57202c4824b5f56da404dd2f3ea6b0ae7c3442e3f461a6ca90b22a6ee757fe73c50ffb9a5ca88561116bc3eaaa04ae6692914fb1a4e7e0f7fc66e2bce324574