Analysis
-
max time kernel
248s -
max time network
298s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
15-10-2021 02:47
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-0021889.jar
Resource
win7-en-20210920
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ORDER-0021889.jar
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
ORDER-0021889.jar
-
Size
415KB
-
MD5
018e4cd2137de20e2142fd999d9befdf
-
SHA1
cd37af8a3b23ae0b223ae3e52c3c5b683deb23a0
-
SHA256
9832570f59982ffca53c953d3d58c95e1224ffe236fa401d3e8a2cdfe71b717c
-
SHA512
6c0ccf4c049ee705d884539857b1190e89f22567bd726b1c0f31e46ffe7392051860e124e40129fd70b6dd5b6d1c5110d5ec14400b37be00a4c228a565f2b422
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 3 IoCs
resource yara_rule family_ratty family_ratty behavioral2/files/0x0008000000000689-121.dat family_ratty -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spnxsdsnu.txt javaw.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spnxsdsnu.txt javaw.exe -
Loads dropped DLL 1 IoCs
pid Process 2296 javaw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\spnxsdsnu.txt = "C:\\Users\\Admin\\AppData\\Roaming\\spnxsdsnu.txt" REG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance javaw.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance javaw.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4032 REG.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe 2296 javaw.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2464 wrote to memory of 1060 2464 java.exe 71 PID 2464 wrote to memory of 1060 2464 java.exe 71 PID 1060 wrote to memory of 2296 1060 wscript.exe 72 PID 1060 wrote to memory of 2296 1060 wscript.exe 72 PID 2296 wrote to memory of 4032 2296 javaw.exe 73 PID 2296 wrote to memory of 4032 2296 javaw.exe 73 PID 2296 wrote to memory of 3904 2296 javaw.exe 75 PID 2296 wrote to memory of 3904 2296 javaw.exe 75 PID 2296 wrote to memory of 3020 2296 javaw.exe 78 PID 2296 wrote to memory of 3020 2296 javaw.exe 78 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3904 attrib.exe 3020 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\ORDER-0021889.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\lcxjxwgqpx.js2⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\spnxsdsnu.txt"3⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "spnxsdsnu.txt" /d "C:\Users\Admin\AppData\Roaming\spnxsdsnu.txt" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:4032
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\spnxsdsnu.txt4⤵
- Views/modifies file attributes
PID:3904
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spnxsdsnu.txt4⤵
- Views/modifies file attributes
PID:3020
-
-
-