Analysis
-
max time kernel
12s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2022 20:07
Behavioral task
behavioral1
Sample
Voice-message_MP3.jar
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Voice-message_MP3.jar
Resource
win10v2004-20221111-en
General
-
Target
Voice-message_MP3.jar
-
Size
1.6MB
-
MD5
43764757112dc0e26f583d520b261ae7
-
SHA1
ee9235944fa7e215fce1c2d13b5debae783e077b
-
SHA256
28c6d8cd703e3b80e01c90b846329c36475d9451597d2b899da5424e7bf22164
-
SHA512
1e598d5d873ceb854ab6a9e323ef67dca90c5064a6dd858e7eb075f0346e1f961c7049614a68df8569a43e16aab8ff3ca8d798097bd7153f62ae46d6863ca92a
-
SSDEEP
49152:x5VSVXzECUFRBxevgwgAUYw+DAoVegHvGs8AA:x5VSN8Riv2ZYj0obGs8r
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Voice-message_MP3.jar family_ratty -
Drops startup file 1 IoCs
Processes:
java.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Voice-message_MP3.jar java.exe -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 4888 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Voice-message_MP3.jar = "C:\\Users\\Admin\\AppData\\Roaming\\Voice-message_MP3.jar" REG.exe -
Modifies registry class 2 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
java.exepid process 4888 java.exe 4888 java.exe 4888 java.exe 4888 java.exe 4888 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
java.exedescription pid process target process PID 4888 wrote to memory of 2360 4888 java.exe REG.exe PID 4888 wrote to memory of 2360 4888 java.exe REG.exe PID 4888 wrote to memory of 4912 4888 java.exe attrib.exe PID 4888 wrote to memory of 4912 4888 java.exe attrib.exe PID 4888 wrote to memory of 384 4888 java.exe attrib.exe PID 4888 wrote to memory of 384 4888 java.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4912 attrib.exe 384 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Voice-message_MP3.jar1⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Voice-message_MP3.jar" /d "C:\Users\Admin\AppData\Roaming\Voice-message_MP3.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2360
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Voice-message_MP3.jar2⤵
- Views/modifies file attributes
PID:4912
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Voice-message_MP3.jar2⤵
- Views/modifies file attributes
PID:384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
1.6MB
MD543764757112dc0e26f583d520b261ae7
SHA1ee9235944fa7e215fce1c2d13b5debae783e077b
SHA25628c6d8cd703e3b80e01c90b846329c36475d9451597d2b899da5424e7bf22164
SHA5121e598d5d873ceb854ab6a9e323ef67dca90c5064a6dd858e7eb075f0346e1f961c7049614a68df8569a43e16aab8ff3ca8d798097bd7153f62ae46d6863ca92a