Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 13:16
Static task
static1
Behavioral task
behavioral1
Sample
de0e3424141dce378c5fec96960afc33db95022e2af32364f9d0a8231fab3e12.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
de0e3424141dce378c5fec96960afc33db95022e2af32364f9d0a8231fab3e12.js
Resource
win10-en-20211208
General
-
Target
de0e3424141dce378c5fec96960afc33db95022e2af32364f9d0a8231fab3e12.js
-
Size
1.2MB
-
MD5
4da3d01bcfd88385615dcdb5f575439a
-
SHA1
6ec617c9885bbcf955dc996000d495a3f991a126
-
SHA256
de0e3424141dce378c5fec96960afc33db95022e2af32364f9d0a8231fab3e12
-
SHA512
0870300f7d1d129a7a9df3caa65da44bca76b8f2265a6b48f838c4156919ad19dc2e49e73c9c79a46b94df2892318107525c304a63f41bac7b21f612aad4e8a2
Malware Config
Signatures
-
Ratty Rat Payload 2 IoCs
Processes:
resource yara_rule family_ratty behavioral1/files/0x000800000001225c-70.dat family_ratty -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 1776 wrote to memory of 1272 1776 wscript.exe 27 PID 1776 wrote to memory of 1272 1776 wscript.exe 27 PID 1776 wrote to memory of 1272 1776 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\de0e3424141dce378c5fec96960afc33db95022e2af32364f9d0a8231fab3e12.js1⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lgwtapo.txt"2⤵PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a519ad347bd9768b33665555809b7e7f
SHA1fdebe23ffa905e85dfa0322950c2d524c41445da
SHA25622c8f644605caafda3cf3d368de9a4ce4e02f8003866162577ef3c8494cc0a18
SHA512c64ca9b6f3383a371baedcba4db7b85dc492cc5cdac061b0db55f03bdd7831a3b98b874b36d38d9d5b33693c76bf730326b532d17761b76369f3339fedaf73ad