Analysis
-
max time kernel
122s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 12:31
Static task
static1
Behavioral task
behavioral1
Sample
PTIN_REPORT_PDF.jar
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PTIN_REPORT_PDF.jar
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
PTIN_REPORT_PDF.jar
-
Size
762KB
-
MD5
9b44489684b9ef4df0b970dffa380633
-
SHA1
48cd4e922f8d7f322882e0b60c042eadb9129730
-
SHA256
c90b1e65448a622b814946ba136152c0eb47187e477f4c8b0fd61a234d9b5b8e
-
SHA512
3ee12621496e441e38ed94fc9421544942307b2b07882481c52d1618031ee6e4f65ea0e71205d02ad635855b9e9eafcccef0a7e1a5ebaa7e17d1c6c511a9c650
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000001ab0e-121.dat family_ratty -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PTIN_REPORT_PDF.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\PTIN_REPORT_PDF.jar = "C:\\Users\\Admin\\AppData\\Roaming\\PTIN_REPORT_PDF.jar" REG.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance java.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance java.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3912 REG.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe 2384 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3912 2384 java.exe 69 PID 2384 wrote to memory of 3912 2384 java.exe 69 PID 2384 wrote to memory of 776 2384 java.exe 74 PID 2384 wrote to memory of 776 2384 java.exe 74 PID 2384 wrote to memory of 1344 2384 java.exe 71 PID 2384 wrote to memory of 1344 2384 java.exe 71 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1344 attrib.exe 776 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PTIN_REPORT_PDF.jar1⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "PTIN_REPORT_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\PTIN_REPORT_PDF.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3912
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PTIN_REPORT_PDF.jar2⤵
- Views/modifies file attributes
PID:1344
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\PTIN_REPORT_PDF.jar2⤵
- Views/modifies file attributes
PID:776
-