Analysis
-
max time kernel
11s -
max time network
44s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-07-2021 07:55
Static task
static1
Behavioral task
behavioral1
Sample
FollowPost.js
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
FollowPost.js
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
FollowPost.js
-
Size
2.9MB
-
MD5
765e5b24dc0aaf8fca72b00f512e41ad
-
SHA1
2ea472b2eeb1f6676e4d2ce4b7cbb8e0d645b227
-
SHA256
75465268a123c2219abb78be39d792ddfa3eb6619c3247a321fe298e52b715c9
-
SHA512
6b515716ce6a1798ca410736d0b22812ce86511ddfa537b7f1e1fd8c8b6f65bb72f0e84fadb9844414dfcd30692e3c7ab44a8b93398e6ae4e1e98e5055bb2485
Malware Config
Signatures
-
Ratty Rat Payload 2 IoCs
resource yara_rule family_ratty behavioral1/files/0x00040000000130df-62.dat family_ratty -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1104 1636 wscript.exe 29 PID 1636 wrote to memory of 1104 1636 wscript.exe 29 PID 1636 wrote to memory of 1104 1636 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\FollowPost.js1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rmbxvgqbd.txt"2⤵PID:1104
-