Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
24-02-2022 13:31
Static task
static1
Behavioral task
behavioral1
Sample
69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar
-
Size
1.2MB
-
MD5
c2e2693cb5bb595145fe6ed7cd902dbb
-
SHA1
87a86a42ef899b16d0a899ceb2814683f68cb213
-
SHA256
69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65
-
SHA512
0581d78a0cfb72c20021521d1b7619aa2826a1cd1b4519312aaed4c7a9daf1b0798cd980bd2eca3d9424163a7440e9bb3a7925e50a4442b1821dde374dc31053
Score
10/10
Malware Config
Signatures
-
Ratty Rat Payload 1 IoCs
resource yara_rule behavioral1/files/0x000600000001ed0d-133.dat family_ratty -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar = "C:\\Users\\Admin\\AppData\\Roaming\\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar" REG.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2904 REG.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe 1680 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2904 1680 java.exe 66 PID 1680 wrote to memory of 2904 1680 java.exe 66 PID 1680 wrote to memory of 3568 1680 java.exe 67 PID 1680 wrote to memory of 3568 1680 java.exe 67 PID 1680 wrote to memory of 2732 1680 java.exe 68 PID 1680 wrote to memory of 2732 1680 java.exe 68 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3568 attrib.exe 2732 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar" /d "C:\Users\Admin\AppData\Roaming\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2904
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar2⤵
- Views/modifies file attributes
PID:3568
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\69c7cff720ef3ec72773052fb482d36dbcf4362ea76e9448ad4ec84a4b227b65.jar2⤵
- Views/modifies file attributes
PID:2732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:2212