Analysis
-
max time kernel
37s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2022 14:58
Behavioral task
behavioral1
Sample
PTIN_Reports_PDF.jar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PTIN_Reports_PDF.jar
Resource
win10v2004-20221111-en
General
-
Target
PTIN_Reports_PDF.jar
-
Size
1.6MB
-
MD5
e66e3afd7ffe6e9e0ae094c13bb33bd0
-
SHA1
8480f4693aa2c092246932fe113dae6fa6b41c5c
-
SHA256
4dbea6f56aff63990206432af8777f6e5ef57173d65770ef9ca254cafcc99fab
-
SHA512
5913d4792ff5dba9f5d48e7be8c66645f7336ec297668b93a4726f6c03f366cf80de078a1778c789120b70320555c51fea90d84065003acfecfbcd5ad437f865
-
SSDEEP
49152:3uLWnjLiGxQBO1qCXDhr8M9yrEjKfsiUn8ya:eyjLiGxK6n9N9iUn8V
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar family_ratty -
Drops startup file 1 IoCs
Processes:
java.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PTIN_Reports_PDF.jar java.exe -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 4440 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PTIN_Reports_PDF.jar = "C:\\Users\\Admin\\AppData\\Roaming\\PTIN_Reports_PDF.jar" REG.exe -
Modifies registry class 2 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
java.exepid process 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe 4440 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
java.exedescription pid process target process PID 4440 wrote to memory of 2628 4440 java.exe REG.exe PID 4440 wrote to memory of 2628 4440 java.exe REG.exe PID 4440 wrote to memory of 3624 4440 java.exe attrib.exe PID 4440 wrote to memory of 3624 4440 java.exe attrib.exe PID 4440 wrote to memory of 4632 4440 java.exe attrib.exe PID 4440 wrote to memory of 4632 4440 java.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3624 attrib.exe 4632 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PTIN_Reports_PDF.jar1⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "PTIN_Reports_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2628
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\PTIN_Reports_PDF.jar2⤵
- Views/modifies file attributes
PID:3624
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PTIN_Reports_PDF.jar2⤵
- Views/modifies file attributes
PID:4632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
1.6MB
MD5e66e3afd7ffe6e9e0ae094c13bb33bd0
SHA18480f4693aa2c092246932fe113dae6fa6b41c5c
SHA2564dbea6f56aff63990206432af8777f6e5ef57173d65770ef9ca254cafcc99fab
SHA5125913d4792ff5dba9f5d48e7be8c66645f7336ec297668b93a4726f6c03f366cf80de078a1778c789120b70320555c51fea90d84065003acfecfbcd5ad437f865