Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Order.xlsx
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Order.xlsx
Resource
win10v2004-en-20220112
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
PO-21789669S_pdf.jar
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
PO-21789669S_pdf.jar
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
PO-21789669S_pdf.jar
-
Size
413KB
-
MD5
911cffcd1c80092af37c72fd11fccdb6
-
SHA1
bb3658b53f4d772aa326d9b1edf0d4f403654517
-
SHA256
b30f5e7c8deb0e93f46c98dd559df30ab6b585a340fe72a8f512adfdacb95eb9
-
SHA512
152affd097aa47e01e02bf0e154e9068ebec732676e56fe70daa13c94b56f455feceda04926b5b5c369997bf887fddb7f0e47e40cb42efe109dc563c17ff89fd
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
resource yara_rule behavioral3/files/0x00060000000125f3-61.dat family_ratty -
Detect jar appended to MSI 1 IoCs
resource yara_rule behavioral3/files/0x00060000000125f3-61.dat jar_in_msi -
Executes dropped EXE 1 IoCs
pid Process 792 Y9Qqh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 836 java.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 1092 836 java.exe 29 PID 836 wrote to memory of 1092 836 java.exe 29 PID 836 wrote to memory of 1092 836 java.exe 29
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PO-21789669S_pdf.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\Y9Qqh.exeC:\Users\Admin\Y9Qqh.exe2⤵
- Executes dropped EXE
PID:792
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\IbfFJfxCEOR.jar"2⤵PID:1092
-