Analysis

  • max time kernel
    153s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2022 14:24

General

  • Target

    http://nope.xlalima.com

Malware Config

Signatures

  • Ratty

    Ratty is an open source Java Remote Access Tool.

  • Ratty Rat payload 1 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" http://nope.xlalima.com
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" http://nope.xlalima.com
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1020.0.1192466338\828168042" -parentBuildID 20200403170909 -prefsHandle 1700 -prefMapHandle 1692 -prefsLen 1 -prefMapSize 220117 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1020 "\\.\pipe\gecko-crash-server-pipe.1020" 1796 gpu
        3⤵
          PID:1272
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1020.3.727823915\1247676738" -childID 1 -isForBrowser -prefsHandle 2464 -prefMapHandle 2472 -prefsLen 78 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1020 "\\.\pipe\gecko-crash-server-pipe.1020" 2524 tab
          3⤵
            PID:3168
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1020.13.1586505171\964896008" -childID 2 -isForBrowser -prefsHandle 3652 -prefMapHandle 3648 -prefsLen 6860 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1020 "\\.\pipe\gecko-crash-server-pipe.1020" 3664 tab
            3⤵
              PID:3636
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4720
          • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
            "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Temp1_PTIN_Reports_PDF.zip\PTIN_Reports_PDF.jar"
            1⤵
            • Drops startup file
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            PID:3048
            • C:\Windows\system32\REG.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "PTIN_Reports_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar" /f
              2⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:1544
            • C:\Windows\system32\attrib.exe
              attrib +H C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar
              2⤵
              • Views/modifies file attributes
              PID:3648
            • C:\Windows\system32\attrib.exe
              attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PTIN_Reports_PDF.jar
              2⤵
              • Views/modifies file attributes
              PID:3480

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar
            Filesize

            1.6MB

            MD5

            e66e3afd7ffe6e9e0ae094c13bb33bd0

            SHA1

            8480f4693aa2c092246932fe113dae6fa6b41c5c

            SHA256

            4dbea6f56aff63990206432af8777f6e5ef57173d65770ef9ca254cafcc99fab

            SHA512

            5913d4792ff5dba9f5d48e7be8c66645f7336ec297668b93a4726f6c03f366cf80de078a1778c789120b70320555c51fea90d84065003acfecfbcd5ad437f865

          • memory/1544-149-0x0000000000000000-mapping.dmp
          • memory/3048-141-0x0000000003240000-0x0000000004240000-memory.dmp
            Filesize

            16.0MB

          • memory/3048-155-0x0000000003240000-0x0000000004240000-memory.dmp
            Filesize

            16.0MB

          • memory/3048-161-0x0000000003240000-0x0000000004240000-memory.dmp
            Filesize

            16.0MB

          • memory/3048-162-0x0000000003240000-0x0000000004240000-memory.dmp
            Filesize

            16.0MB

          • memory/3480-151-0x0000000000000000-mapping.dmp
          • memory/3648-150-0x0000000000000000-mapping.dmp