Analysis

  • max time kernel
    37s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2022 14:58

General

  • Target

    PTIN_Reports_PDF.jar

  • Size

    1.6MB

  • MD5

    e66e3afd7ffe6e9e0ae094c13bb33bd0

  • SHA1

    8480f4693aa2c092246932fe113dae6fa6b41c5c

  • SHA256

    4dbea6f56aff63990206432af8777f6e5ef57173d65770ef9ca254cafcc99fab

  • SHA512

    5913d4792ff5dba9f5d48e7be8c66645f7336ec297668b93a4726f6c03f366cf80de078a1778c789120b70320555c51fea90d84065003acfecfbcd5ad437f865

  • SSDEEP

    49152:3uLWnjLiGxQBO1qCXDhr8M9yrEjKfsiUn8ya:eyjLiGxK6n9N9iUn8V

Malware Config

Signatures

  • Ratty

    Ratty is an open source Java Remote Access Tool.

  • Ratty Rat payload 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\PTIN_Reports_PDF.jar
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Windows\SYSTEM32\REG.exe
      REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "PTIN_Reports_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:2628
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar
      2⤵
      • Views/modifies file attributes
      PID:3624
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PTIN_Reports_PDF.jar
      2⤵
      • Views/modifies file attributes
      PID:4632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JNativeHook-7432773EB4D09DC286D43FCC77DDB0E1E3BCE2B4.dll

    Filesize

    83KB

    MD5

    55f4de7f270663b3dc712b8c9eed422a

    SHA1

    7432773eb4d09dc286d43fcc77ddb0e1e3bce2b4

    SHA256

    47c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25

    SHA512

    9da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996

  • C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar

    Filesize

    1.6MB

    MD5

    e66e3afd7ffe6e9e0ae094c13bb33bd0

    SHA1

    8480f4693aa2c092246932fe113dae6fa6b41c5c

    SHA256

    4dbea6f56aff63990206432af8777f6e5ef57173d65770ef9ca254cafcc99fab

    SHA512

    5913d4792ff5dba9f5d48e7be8c66645f7336ec297668b93a4726f6c03f366cf80de078a1778c789120b70320555c51fea90d84065003acfecfbcd5ad437f865

  • memory/2628-152-0x0000000000000000-mapping.dmp

  • memory/3624-153-0x0000000000000000-mapping.dmp

  • memory/4440-189-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-192-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-207-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-166-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-172-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-178-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-183-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-184-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-185-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-186-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-187-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-188-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-136-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-190-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-191-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-160-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-193-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-194-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-195-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-196-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-197-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-198-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-199-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-200-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-201-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-202-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-203-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-204-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-205-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4440-206-0x00000000024B0000-0x00000000034B0000-memory.dmp

    Filesize

    16.0MB

  • memory/4632-154-0x0000000000000000-mapping.dmp