Analysis
-
max time kernel
97s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
15-10-2021 03:27
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-0021889.jar
Resource
win7-en-20211014
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ORDER-0021889.jar
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
ORDER-0021889.jar
-
Size
415KB
-
MD5
018e4cd2137de20e2142fd999d9befdf
-
SHA1
cd37af8a3b23ae0b223ae3e52c3c5b683deb23a0
-
SHA256
9832570f59982ffca53c953d3d58c95e1224ffe236fa401d3e8a2cdfe71b717c
-
SHA512
6c0ccf4c049ee705d884539857b1190e89f22567bd726b1c0f31e46ffe7392051860e124e40129fd70b6dd5b6d1c5110d5ec14400b37be00a4c228a565f2b422
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 3 IoCs
resource yara_rule family_ratty family_ratty behavioral2/files/0x0008000000000689-121.dat family_ratty -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctzwjco.txt javaw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctzwjco.txt javaw.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 javaw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctzwjco.txt = "C:\\Users\\Admin\\AppData\\Roaming\\ctzwjco.txt" REG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance javaw.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance javaw.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4436 REG.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe 1688 javaw.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4392 3524 java.exe 71 PID 3524 wrote to memory of 4392 3524 java.exe 71 PID 4392 wrote to memory of 1688 4392 wscript.exe 72 PID 4392 wrote to memory of 1688 4392 wscript.exe 72 PID 1688 wrote to memory of 4436 1688 javaw.exe 73 PID 1688 wrote to memory of 4436 1688 javaw.exe 73 PID 1688 wrote to memory of 4412 1688 javaw.exe 78 PID 1688 wrote to memory of 4412 1688 javaw.exe 78 PID 1688 wrote to memory of 3192 1688 javaw.exe 77 PID 1688 wrote to memory of 3192 1688 javaw.exe 77 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3192 attrib.exe 4412 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\ORDER-0021889.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\lcxjxwgqpx.js2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ctzwjco.txt"3⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "ctzwjco.txt" /d "C:\Users\Admin\AppData\Roaming\ctzwjco.txt" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:4436
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctzwjco.txt4⤵
- Views/modifies file attributes
PID:3192
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\ctzwjco.txt4⤵
- Views/modifies file attributes
PID:4412
-
-
-