Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
31-05-2022 02:38
Static task
static1
Behavioral task
behavioral1
Sample
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe
Resource
win10v2004-20220414-en
General
-
Target
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe
-
Size
760KB
-
MD5
6db88a50aeb77d139cfff0ac6fc2eb55
-
SHA1
d0114590b1b706345190e7fd6f3aa1434be9e556
-
SHA256
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113
-
SHA512
c9a85370b143ebc0893ac3df272c93d05e0562f7a2d3792115094548d84dc8ed415363f7ef5f4045d695d0462b33184b8bcc314da7b0bddfbc799c98674d3177
Malware Config
Signatures
-
Ratty Rat Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FSDPD.jar family_ratty C:\Users\Admin\AppData\Roaming\FSDPD.jar family_ratty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe -
Drops startup file 1 IoCs
Processes:
javaw.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FSDPD.jar javaw.exe -
Loads dropped DLL 1 IoCs
Processes:
javaw.exepid process 2548 javaw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FSDPD.jar = "C:\\Users\\Admin\\AppData\\Roaming\\FSDPD.jar" REG.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{7C3DA062-9716-4192-B10E-8D12E5B149C1}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{2504892A-5CE5-40E5-AC1C-A5F2D73F088F}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exedescription pid process target process PID 4120 set thread context of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1312 3104 WerFault.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry class 1 IoCs
Processes:
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exepid process 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exedescription pid process Token: SeDebugPrivilege 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
javaw.exepid process 2548 javaw.exe 2548 javaw.exe 2548 javaw.exe 2548 javaw.exe 2548 javaw.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exejavaw.exedescription pid process target process PID 4120 wrote to memory of 4640 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe schtasks.exe PID 4120 wrote to memory of 4640 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe schtasks.exe PID 4120 wrote to memory of 4640 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe schtasks.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 3104 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe PID 4120 wrote to memory of 2548 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe javaw.exe PID 4120 wrote to memory of 2548 4120 074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe javaw.exe PID 2548 wrote to memory of 1064 2548 javaw.exe REG.exe PID 2548 wrote to memory of 1064 2548 javaw.exe REG.exe PID 2548 wrote to memory of 1348 2548 javaw.exe attrib.exe PID 2548 wrote to memory of 1348 2548 javaw.exe attrib.exe PID 2548 wrote to memory of 1644 2548 javaw.exe attrib.exe PID 2548 wrote to memory of 1644 2548 javaw.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1348 attrib.exe 1644 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe"C:\Users\Admin\AppData\Local\Temp\074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "XYABGKI\XYABGKI" /XML "C:\Users\Admin\AppData\Roaming\XYABGKI\azzzzz.xml"2⤵
- Creates scheduled task(s)
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe"C:\Users\Admin\AppData\Local\Temp\074bbfc92eb8b542b29a0278c58d7f7468f57739de2cb980c8ca8f20813f9113.exe"2⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 1523⤵
- Program crash
PID:1312
-
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\FSDPD.jar"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "FSDPD.jar" /d "C:\Users\Admin\AppData\Roaming\FSDPD.jar" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1064
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\FSDPD.jar3⤵
- Views/modifies file attributes
PID:1348
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FSDPD.jar3⤵
- Views/modifies file attributes
PID:1644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3104 -ip 31041⤵PID:4828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD57e2f12693e086d796b1e99267174c33a
SHA125a820352023c68a5975dcb989222217e7907957
SHA256f50ffcaf0bba8cdaeab7a5bc0e196b368bfb5132c05c5e82c728f21502bb6f0f
SHA512d019e507b62b7df8d45c21cd651a2404e6cafa27e74f83c8cb7c97175881fa01a6fde6472c324de544c4fcbe341a0d981aa4c40c4a6c88dde459771dae44d0da
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
332KB
MD57e2f12693e086d796b1e99267174c33a
SHA125a820352023c68a5975dcb989222217e7907957
SHA256f50ffcaf0bba8cdaeab7a5bc0e196b368bfb5132c05c5e82c728f21502bb6f0f
SHA512d019e507b62b7df8d45c21cd651a2404e6cafa27e74f83c8cb7c97175881fa01a6fde6472c324de544c4fcbe341a0d981aa4c40c4a6c88dde459771dae44d0da
-
Filesize
1KB
MD57ed7e6da701cad0c5d79de4310112300
SHA1153587dfefa607726bb2a56f69bb83ce604c673c
SHA256d1c12f51e3ed46adc28d2f650f633a16d4bd14c2fbd94bc1a1e2be6efa76d688
SHA512c5ea3785a444338df8ba083551aae6dba9ad197b3d455557a88c62a95208885cee474b802d12d2ffa2eb642437bee5de2bdb1193fb320e0c18bda3d28f777ae1