Report - Arrival_7036PDF.jar

NPKI Malicious Library UPX Malicious Packer MSOffice File PE File OS Processor Check PE32 DLL
ScreenShot
Created 2021.11.10 09:46 Machine s1_win7_x6402
Filename Arrival_7036PDF.jar
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, MSI Installer, Title:
AI Score Not founds Behavior Score
9.4
ZERO API file : clean
VT API (file) 14 detected (AppendedJar, Java, Kryptik, Eldorado, Appjar, gen1, Adwind, FELN, ai score=89, Etecer, bVydoM, GenericGB)
md5 1aec13cf9b79fd1858bbe91b6281f568
sha256 00bd0269ec2f055542bc8117597194a1502cc090595751438a4c642180f3ef7b
ssdeep 49152:g8mrwM5tl1mPM5IWV8ba9tb0f4N8fnEuA25iWrKy:z8/1mPM5V8ban0f68fnEupP
imphash
impfuzzy
  Network IP location

Signature (23cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Executes one or more WMI queries
watch File has been identified by 14 AntiVirus engines on VirusTotal as malicious
watch Harvests credentials from local email clients
watch Installs itself for autorun at Windows startup
watch The process java.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries which can be used to identify virtual machines
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (10cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (13cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://str-master.pw/strigoi/server/ping.php?lid=6PFI-EG99-VOD4-MX23-B7M4 Unknown 147.182.174.188 6509 mailcious
http://ip-api.com/json/ US TUT-AS 208.95.112.1 clean
str-master.pw Unknown 147.182.174.188 mailcious
objects.githubusercontent.com US FASTLY 185.199.108.133 clean
github.com KR AMAZON-02 52.78.231.108 mailcious
repo1.maven.org US FASTLY 199.232.196.209 clean
ip-api.com US TUT-AS 208.95.112.1 clean
185.199.109.133 US FASTLY 185.199.109.133 mailcious
147.182.174.188 Unknown 147.182.174.188 mailcious
15.164.81.167 KR AMAZON-02 15.164.81.167 malware
151.101.52.209 US FASTLY 151.101.52.209 clean
185.205.210.106 BG Belcloud LTD 185.205.210.106 clean
208.95.112.1 US TUT-AS 208.95.112.1 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure