Report - SI-3023-9552783693PDF.jar

NPKI Generic Malware Malicious Packer Malicious Library UPX MSOffice File OS Processor Check PE File PE32 DLL
ScreenShot
Created 2021.10.14 18:03 Machine s1_win7_x6403
Filename SI-3023-9552783693PDF.jar
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code pa
AI Score Not founds Behavior Score
8.2
ZERO API file : mailcious
VT API (file) 7 detected (Java, Kryptik, Eldorado, Appjar, gen1, MalGenrc, GenericGB)
md5 2922d30afb359edde8083596e20601dc
sha256 10b8de549614240e9f6bcdbd5ac7b9a407760d9a882c8bb6a3e2cb978f0aa916
ssdeep 98304:P8dUwWyw2YMWN6CfiqdMH64Sz6QK7RpFz2Haq6EByA:0dUqwYWN16WOQK7lzLdKyA
imphash
impfuzzy
  Network IP location

Signature (19cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Installs itself for autorun at Windows startup
watch The process java.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Connects to a Dynamic DNS Domain
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice File has been identified by 7 AntiVirus engines on VirusTotal as malicious
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (15cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)

Network (11cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://str-master.pw/strigoi/server/ping.php?lid=khonsari Unknown 147.182.174.188 clean
str-master.pw Unknown 147.182.174.188 mailcious
kmt12.ddns.net US MAJESTIC-HOSTING-01 191.101.130.32 clean
github.com KR AMAZON-02 15.164.81.167 mailcious
github-releases.githubusercontent.com US FASTLY 185.199.111.154 clean
repo1.maven.org US FASTLY 199.232.196.209 clean
147.182.174.188 Unknown 147.182.174.188 clean
191.101.130.32 US MAJESTIC-HOSTING-01 191.101.130.32 clean
52.78.231.108 KR AMAZON-02 52.78.231.108 malware
185.199.111.154 US FASTLY 185.199.111.154 clean
151.101.24.209 US FASTLY 151.101.24.209 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure