Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 10:24
Static task
static1
Behavioral task
behavioral1
Sample
fattura.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fattura.jar
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
fattura.jar
-
Size
221KB
-
MD5
4ebaf0ed00b6136fe1e4273508d855fa
-
SHA1
a3e6b82b95500b8eda4ab37a8f3865d47af3c7ad
-
SHA256
be32a4b1ba9b1ac7803eac01ca4a38f96770ad27d2d434794809ba3242182b0d
-
SHA512
80c243457a0b879b0cd2484837357326593131207e200f93cd4f40a2ce5dd4c8e5590c6f67638b7942c1ca6634abc637fa9658b81791116419960deb349f49c3
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
resource yara_rule behavioral1/files/0x00060000000131ab-11.dat family_ratty -
Blacklisted process makes network request 25 IoCs
flow pid Process 4 1520 WScript.exe 5 1520 WScript.exe 6 1520 WScript.exe 8 1520 WScript.exe 9 1520 WScript.exe 10 1520 WScript.exe 12 1520 WScript.exe 13 1520 WScript.exe 14 1520 WScript.exe 17 1520 WScript.exe 18 1520 WScript.exe 19 1520 WScript.exe 21 1520 WScript.exe 22 1520 WScript.exe 23 1520 WScript.exe 25 1520 WScript.exe 26 1520 WScript.exe 27 1520 WScript.exe 29 1520 WScript.exe 30 1520 WScript.exe 31 1520 WScript.exe 33 1520 WScript.exe 34 1520 WScript.exe 35 1520 WScript.exe 37 1520 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gVbTbNmsTj.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gVbTbNmsTj.vbs WScript.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntfsmgr = "\"C:\\Program Files\\Java\\jre7\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\ntfsmgr.jar\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\gVbTbNmsTj = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\gVbTbNmsTj.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gVbTbNmsTj = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\gVbTbNmsTj.vbs\"" WScript.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1636 powershell.exe 1636 powershell.exe 1928 powershell.exe 1928 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1676 javaw.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1636 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1500 1104 java.exe 25 PID 1104 wrote to memory of 1500 1104 java.exe 25 PID 1104 wrote to memory of 1500 1104 java.exe 25 PID 1500 wrote to memory of 1636 1500 wscript.exe 26 PID 1500 wrote to memory of 1636 1500 wscript.exe 26 PID 1500 wrote to memory of 1636 1500 wscript.exe 26 PID 1500 wrote to memory of 1520 1500 wscript.exe 28 PID 1500 wrote to memory of 1520 1500 wscript.exe 28 PID 1500 wrote to memory of 1520 1500 wscript.exe 28 PID 1500 wrote to memory of 1816 1500 wscript.exe 29 PID 1500 wrote to memory of 1816 1500 wscript.exe 29 PID 1500 wrote to memory of 1816 1500 wscript.exe 29 PID 1816 wrote to memory of 1844 1816 cmd.exe 31 PID 1816 wrote to memory of 1844 1816 cmd.exe 31 PID 1816 wrote to memory of 1844 1816 cmd.exe 31 PID 1500 wrote to memory of 1676 1500 wscript.exe 32 PID 1500 wrote to memory of 1676 1500 wscript.exe 32 PID 1500 wrote to memory of 1676 1500 wscript.exe 32 PID 1520 wrote to memory of 1928 1520 WScript.exe 33 PID 1520 wrote to memory of 1928 1520 WScript.exe 33 PID 1520 wrote to memory of 1928 1520 WScript.exe 33
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\fattura.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\wppvqiibus.vbs2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "$humanRights = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'turK3y').turK3y;$humanRights=$humanRights.replace('!%','m');$Abt = [Convert]::FromBase64String($humanRights);$Out = [System.Text.Encoding]::ASCII.GetString($Abt);new-itemproperty -path 'HKCU:\SOFTWARE\Microsoft' -name 'turK3y' -value $Out -propertytype multistring -force | out-null;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\gVbTbNmsTj.vbs"3⤵
- Blacklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "$humanRights = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'turK3y').turK3y;$humanRights=$humanRights.replace('!%','A');$Abt = [Convert]::FromBase64String($humanRights);$Out = [System.Text.Encoding]::ASCII.GetString($Abt);new-itemproperty -path 'HKCU:\SOFTWARE\Microsoft' -name 'turK3y' -value $Out -propertytype multistring -force | out-null;"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Java\jre7\bin\javaw.exe" -version 2> C:\Users\Admin\AppData\Local\Temp\output.txt3⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -version4⤵PID:1844
-
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ntfsmgr.jar"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1676
-
-