Windows Analysis Report Quotation.jar

Overview

General Information

Sample Name: Quotation.jar
Analysis ID: 492179
MD5: 8eab8f1a928fa55303b7558536079a2a
SHA1: 491e913225a8c8d144c538fe27cf62f5a8465b38
SHA256: 20351665df8b2d441524a21163e0aa95ea3d3805a873032eb6f55fa1001f3941
Tags: jarSTRRAT
Infos:

Most interesting Screenshot:

Detection

STRRAT
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Yara detected STRRAT
Multi AV Scanner detection for submitted file
Yara detected AllatoriJARObfuscator
Sample execution stops while process was sleeping (likely an evasion)
Found inlined nop instructions (likely shell or obfuscated code)
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: Quotation.jar Virustotal: Detection: 26% Perma Link
Source: Quotation.jar ReversingLabs: Detection: 22%
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4x nop then cmp eax, dword ptr [ecx+04h] 4_2_030CB916
Source: java.exe, 00000004.00000002.624973788.000000000A79C000.00000004.00000001.sdmp String found in binary or memory: http://bugreport.sun.com/bugreport/
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://crl.chambersign.org/chambersroot.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://crl.securetrust.com/STCA.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: java.exe, 00000004.00000002.624997944.000000000A7A7000.00000004.00000001.sdmp String found in binary or memory: http://java.oracle.com/
Source: java.exe, 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp String found in binary or memory: http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
Source: java.exe, 00000004.00000002.625109003.000000000A841000.00000004.00000001.sdmp, java.exe, 00000004.00000002.626580678.000000001576E000.00000004.00000001.sdmp String found in binary or memory: http://null.oracle.com/
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://policy.camerfirma.com
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://policy.camerfirma.com0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://repository.swisssign.com/
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://repository.swisssign.com/0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
Source: java.exe, 00000004.00000002.624987172.000000000A7A5000.00000004.00000001.sdmp, cmdlinestart.log.4.dr String found in binary or memory: http://www.allatori.com
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.certplus.com/CRL/class2.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.certplus.com/CRL/class2.crl0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.certplus.com/CRL/class3P.crl
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://www.chambersign.org
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.chambersign.org1
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp String found in binary or memory: http://www.quovadis.bm
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.quovadis.bm0
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.quovadisglobal.com/cps
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: http://www.quovadisglobal.com/cps0
Source: java.exe, 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp String found in binary or memory: https://github.com/kristian/system-hook/releases/download/3.5/system-hook-3.5.jar
Source: java.exe, 00000004.00000002.625352111.000000000A925000.00000004.00000001.sdmp, java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: https://ocsp.quovadisoffshore.com
Source: java.exe, 00000004.00000002.624601757.00000000056CF000.00000004.00000001.sdmp String found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: java.exe, 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp String found in binary or memory: https://repo1.maven.org/maven2/net/java/dev/jna/jna-platform/5.5.0/jna-platform-5.5.0.jar
Source: java.exe, 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp String found in binary or memory: https://repo1.maven.org/maven2/net/java/dev/jna/jna/5.5.0/jna-5.5.0.jar
Source: java.exe, 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp String found in binary or memory: https://repo1.maven.org/maven2/org/xerial/sqlite-jdbc/3.14.2.1/sqlite-jdbc-3.14.2.1.jar

System Summary:

barindex
Detected potential crypto function
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_030CC241 4_2_030CC241
Source: Quotation.jar Virustotal: Detection: 26%
Source: Quotation.jar ReversingLabs: Detection: 22%
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe File created: C:\Users\user\AppData\Local\Temp\hsperfdata_user Jump to behavior
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Section loaded: C:\Program Files (x86)\Java\jre1.8.0_211\bin\client\jvm.dll Jump to behavior
Source: C:\Windows\System32\7za.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: classification engine Classification label: mal60.troj.evad.winJAR@10/67@0/0
Source: unknown Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c 7za.exe x -y -oC:\jar 'C:\Users\user\Desktop\Quotation.jar'
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\7za.exe 7za.exe x -y -oC:\jar 'C:\Users\user\Desktop\Quotation.jar'
Source: unknown Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c java.exe -jar 'C:\Users\user\Desktop\Quotation.jar' carLambo.FirstRun >> C:\cmdlinestart.log 2>&1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe java.exe -jar 'C:\Users\user\Desktop\Quotation.jar' carLambo.FirstRun
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Process created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\7za.exe 7za.exe x -y -oC:\jar 'C:\Users\user\Desktop\Quotation.jar' Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe java.exe -jar 'C:\Users\user\Desktop\Quotation.jar' carLambo.FirstRun Jump to behavior
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Process created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5292:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:972:120:WilError_01
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Data Obfuscation:

barindex
Yara detected AllatoriJARObfuscator
Source: Yara match File source: 00000004.00000002.624987172.000000000A7A5000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.624888196.000000000A76A000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: java.exe PID: 5672, type: MEMORYSTR
Source: Yara match File source: C:\cmdlinestart.log, type: DROPPED
Uses code obfuscation techniques (call, push, ret)
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_0302BB27 push 00000000h; mov dword ptr [esp], esp 4_2_0302BB4D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_0302B377 push 00000000h; mov dword ptr [esp], esp 4_2_0302B39D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_0302B907 push 00000000h; mov dword ptr [esp], esp 4_2_0302B92D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_0302A1CA push ecx; ret 4_2_0302A1DA
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_0302A1DB push ecx; ret 4_2_0302A1E5
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_03032D44 push eax; retf 4_2_03032D45
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_0302C437 push 00000000h; mov dword ptr [esp], esp 4_2_0302C45D
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_030C7FD1 push cs; retf 4_2_030C7FF1
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_030D1EEC push es; retn 0001h 4_2_030D1FFF

Hooking and other Techniques for Hiding and Protection:

barindex
Uses cacls to modify the permissions of files
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Process created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M

Malware Analysis System Evasion:

barindex
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: java.exe, 00000004.00000002.621877991.0000000002E25000.00000004.00000001.sdmp Binary or memory string: ,java/lang/VirtualMachineError
Source: java.exe, 00000004.00000002.621877991.0000000002E25000.00000004.00000001.sdmp Binary or memory string: |[Ljava/lang/VirtualMachineError;
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Memory protected: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\7za.exe 7za.exe x -y -oC:\jar 'C:\Users\user\Desktop\Quotation.jar' Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe java.exe -jar 'C:\Users\user\Desktop\Quotation.jar' carLambo.FirstRun Jump to behavior
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Process created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant 'everyone':(OI)(CI)M Jump to behavior
Source: java.exe, 00000004.00000002.621719652.0000000001810000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: java.exe, 00000004.00000002.621719652.0000000001810000.00000002.00020000.sdmp Binary or memory string: Progman
Source: java.exe, 00000004.00000002.621719652.0000000001810000.00000002.00020000.sdmp Binary or memory string: &Program Manager
Source: java.exe, 00000004.00000002.621719652.0000000001810000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_885250\java.exe Code function: 4_2_03020380 cpuid 4_2_03020380

Stealing of Sensitive Information:

barindex
Yara detected STRRAT
Source: Yara match File source: 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: java.exe PID: 5672, type: MEMORYSTR

Remote Access Functionality:

barindex
Yara detected STRRAT
Source: Yara match File source: 00000004.00000002.623439808.00000000053F0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: java.exe PID: 5672, type: MEMORYSTR
No contacted IP infos