Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
24-09-2020 14:22
Static task
static1
Behavioral task
behavioral1
Sample
run.bat
Resource
win7v200722
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
run.bat
Resource
win10
0 signatures
0 seconds
General
-
Target
run.bat
-
Size
75B
-
MD5
39cbbc9df4cd77e7645fcce24d3cfaf5
-
SHA1
a4958cdc6d0d945e776413e8207a8f3e3031d0b3
-
SHA256
8d4e094bce9d659b9783ed6eab5194631d62b5cf686d7451dfdab599e20cb04e
-
SHA512
4f422ad30eb46afe1e02c9d2ea207dc278093c07da0f5f1f20a42471dd7257391d9d483fe6a8773338d84e3e90d77bbf82031d57b977e7c1321f69cf176e7685
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
resource yara_rule behavioral2/files/0x000200000001ad92-5.dat family_ratty -
Detect jar appended to MSI 1 IoCs
resource yara_rule behavioral2/files/0x000200000001ad92-5.dat jar_in_msi -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ups-label.jar javaw.exe -
Loads dropped DLL 1 IoCs
pid Process 496 javaw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\ups-label.jar = "C:\\Users\\Admin\\AppData\\Roaming\\ups-label.jar" REG.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1584 REG.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 496 javaw.exe 496 javaw.exe 496 javaw.exe 496 javaw.exe 496 javaw.exe 496 javaw.exe 496 javaw.exe 496 javaw.exe 496 javaw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4016 wrote to memory of 496 4016 cmd.exe 72 PID 4016 wrote to memory of 496 4016 cmd.exe 72 PID 496 wrote to memory of 1584 496 javaw.exe 75 PID 496 wrote to memory of 1584 496 javaw.exe 75 PID 496 wrote to memory of 1748 496 javaw.exe 76 PID 496 wrote to memory of 1748 496 javaw.exe 76 PID 496 wrote to memory of 1796 496 javaw.exe 78 PID 496 wrote to memory of 1796 496 javaw.exe 78 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1748 attrib.exe 1796 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\run.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw.exe -jar "C:\Users\Admin\AppData\Local\Temp\ups-label.jar"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "ups-label.jar" /d "C:\Users\Admin\AppData\Roaming\ups-label.jar" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1584
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\ups-label.jar3⤵
- Views/modifies file attributes
PID:1748
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ups-label.jar3⤵
- Views/modifies file attributes
PID:1796
-
-