Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 10:24
Static task
static1
Behavioral task
behavioral1
Sample
fattura.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fattura.jar
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
fattura.jar
-
Size
221KB
-
MD5
4ebaf0ed00b6136fe1e4273508d855fa
-
SHA1
a3e6b82b95500b8eda4ab37a8f3865d47af3c7ad
-
SHA256
be32a4b1ba9b1ac7803eac01ca4a38f96770ad27d2d434794809ba3242182b0d
-
SHA512
80c243457a0b879b0cd2484837357326593131207e200f93cd4f40a2ce5dd4c8e5590c6f67638b7942c1ca6634abc637fa9658b81791116419960deb349f49c3
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
resource yara_rule behavioral2/files/0x000300000001ad66-12.dat family_ratty -
Blacklisted process makes network request 26 IoCs
flow pid Process 5 2888 WScript.exe 7 2888 WScript.exe 8 2888 WScript.exe 9 2888 WScript.exe 10 2888 WScript.exe 13 2888 WScript.exe 14 2888 WScript.exe 15 2888 WScript.exe 16 2888 WScript.exe 17 2888 WScript.exe 18 2888 WScript.exe 19 2888 WScript.exe 20 2888 WScript.exe 21 2888 WScript.exe 22 2888 WScript.exe 23 2888 WScript.exe 24 2888 WScript.exe 25 2888 WScript.exe 26 2888 WScript.exe 27 2888 WScript.exe 28 2888 WScript.exe 29 2888 WScript.exe 30 2888 WScript.exe 31 2888 WScript.exe 32 2888 WScript.exe 33 2888 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gVbTbNmsTj.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gVbTbNmsTj.vbs WScript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gVbTbNmsTj = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\gVbTbNmsTj.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntfsmgr = "\"C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\AppData\\Roaming\\ntfsmgr.jar\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Java bridge = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\AIR\\jre13v3bridge.jar" REG.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\gVbTbNmsTj = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\gVbTbNmsTj.vbs\"" WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000_Classes\Local Settings wscript.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3432 REG.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe 2356 powershell.exe 2356 powershell.exe 2356 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3308 javaw.exe 3308 javaw.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1684 2536 java.exe 69 PID 2536 wrote to memory of 1684 2536 java.exe 69 PID 1684 wrote to memory of 2144 1684 wscript.exe 70 PID 1684 wrote to memory of 2144 1684 wscript.exe 70 PID 1684 wrote to memory of 2888 1684 wscript.exe 72 PID 1684 wrote to memory of 2888 1684 wscript.exe 72 PID 1684 wrote to memory of 3788 1684 wscript.exe 73 PID 1684 wrote to memory of 3788 1684 wscript.exe 73 PID 3788 wrote to memory of 3684 3788 cmd.exe 76 PID 3788 wrote to memory of 3684 3788 cmd.exe 76 PID 1684 wrote to memory of 3308 1684 wscript.exe 77 PID 1684 wrote to memory of 3308 1684 wscript.exe 77 PID 3308 wrote to memory of 3432 3308 javaw.exe 78 PID 3308 wrote to memory of 3432 3308 javaw.exe 78 PID 2888 wrote to memory of 2356 2888 WScript.exe 80 PID 2888 wrote to memory of 2356 2888 WScript.exe 80
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\fattura.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\wppvqiibus.vbs2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "$humanRights = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'turK3y').turK3y;$humanRights=$humanRights.replace('!%','m');$Abt = [Convert]::FromBase64String($humanRights);$Out = [System.Text.Encoding]::ASCII.GetString($Abt);new-itemproperty -path 'HKCU:\SOFTWARE\Microsoft' -name 'turK3y' -value $Out -propertytype multistring -force | out-null;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\gVbTbNmsTj.vbs"3⤵
- Blacklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "$humanRights = (get-itemproperty -path 'HKCU:\SOFTWARE\Microsoft\' -name 'turK3y').turK3y;$humanRights=$humanRights.replace('!%','A');$Abt = [Convert]::FromBase64String($humanRights);$Out = [System.Text.Encoding]::ASCII.GetString($Abt);new-itemproperty -path 'HKCU:\SOFTWARE\Microsoft' -name 'turK3y' -value $Out -propertytype multistring -force | out-null;"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -version 2> C:\Users\Admin\AppData\Local\Temp\output.txt3⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -version4⤵PID:3684
-
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ntfsmgr.jar"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Adobe Java bridge" /d "C:\Users\Admin\AppData\Roaming\Adobe\AIR\jre13v3bridge.jar"4⤵
- Adds Run key to start application
- Modifies registry key
PID:3432
-
-
-