Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Order.xlsx
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Order.xlsx
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
PO-21789669S_pdf.jar
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
PO-21789669S_pdf.jar
Resource
win10v2004-en-20220112
General
-
Target
PO-21789669S_pdf.jar
-
Size
413KB
-
MD5
911cffcd1c80092af37c72fd11fccdb6
-
SHA1
bb3658b53f4d772aa326d9b1edf0d4f403654517
-
SHA256
b30f5e7c8deb0e93f46c98dd559df30ab6b585a340fe72a8f512adfdacb95eb9
-
SHA512
152affd097aa47e01e02bf0e154e9068ebec732676e56fe70daa13c94b56f455feceda04926b5b5c369997bf887fddb7f0e47e40cb42efe109dc563c17ff89fd
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
Processes:
resource yara_rule behavioral3/files/0x00060000000125f3-61.dat family_ratty -
Detect jar appended to MSI 1 IoCs
Processes:
resource yara_rule behavioral3/files/0x00060000000125f3-61.dat jar_in_msi -
Executes dropped EXE 1 IoCs
Processes:
Y9Qqh.exepid Process 792 Y9Qqh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid Process 836 java.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
java.exedescription pid Process procid_target PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 792 836 java.exe 28 PID 836 wrote to memory of 1092 836 java.exe 29 PID 836 wrote to memory of 1092 836 java.exe 29 PID 836 wrote to memory of 1092 836 java.exe 29
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PO-21789669S_pdf.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\Y9Qqh.exeC:\Users\Admin\Y9Qqh.exe2⤵
- Executes dropped EXE
PID:792
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\IbfFJfxCEOR.jar"2⤵PID:1092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7a749d631e0701a2d14939d2fc6ee499
SHA1ef8040a6fb1cdbf2c3f07baf9cccdbcf3e5d61d9
SHA25664dd247fdd298984740ce147ecb631e934b68cb5f42248c9eebed563cdc04fe6
SHA512ed3dbe56c525514667e9876b668954a74b846fa6778cc13b5963ad71a1a9b2852c14e4a66331bf919dfdc5492c6c960a7c1ce1d4ffe0a06d3da70e6e0d216303
-
MD5
02209b7c1e3f69e6edbc541abc4055ac
SHA1037267d864357432f1ae92c85d43274b77c562a5
SHA256f11470826fa4694abb192997374378fbb46f6abd7b7b22f1ac6026c55440a9fb
SHA512380bf0d03d97692d610946378739e48eeb921ffea6de5d76e5a9577cb3aa18e675f48b316ba43951fdd80b9672bacd9574d402676045e89cc033489ad96d3f53