Analysis
-
max time kernel
152s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:45
Behavioral task
behavioral1
Sample
2502c807c3327021f622fd468781f85d.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2502c807c3327021f622fd468781f85d.jar
Resource
win10v2004-20231215-en
General
-
Target
2502c807c3327021f622fd468781f85d.jar
-
Size
332KB
-
MD5
2502c807c3327021f622fd468781f85d
-
SHA1
47d237b21f15e64bd56f0eff1fe3df549f355ae2
-
SHA256
2870e91faf799f431115adfd00bc8a7573f197c29b57d3f7e3f6f85eee28928b
-
SHA512
1a097a75053cc5bb0cc1896fdc0a7713b97048a909d0baf10f496334e5dcce6a0cbd3a65d1992039125eaa4944ab40c8587ac91c4924824452ba0a95dc394c14
-
SSDEEP
6144:JZjgS007NNMX/+DoklCAFNWClCA+jp02GmaZ/ZJSEPavLFjt+Wz:JZNNNzbCClCA+jp02GmWhJnav5jUI
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023219-14.dat family_ratty -
Drops startup file 1 IoCs
Processes:
java.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2502c807c3327021f622fd468781f85d.jar java.exe -
Loads dropped DLL 1 IoCs
Processes:
java.exepid Process 4804 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
REG.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2502c807c3327021f622fd468781f85d.jar = "C:\\Users\\Admin\\AppData\\Roaming\\2502c807c3327021f622fd468781f85d.jar" REG.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
java.exepid Process 4804 java.exe 4804 java.exe 4804 java.exe 4804 java.exe 4804 java.exe 4804 java.exe 4804 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exedescription pid Process procid_target PID 4804 wrote to memory of 4300 4804 java.exe 89 PID 4804 wrote to memory of 4300 4804 java.exe 89 PID 4804 wrote to memory of 3616 4804 java.exe 91 PID 4804 wrote to memory of 3616 4804 java.exe 91 PID 4804 wrote to memory of 3532 4804 java.exe 92 PID 4804 wrote to memory of 3532 4804 java.exe 92 PID 4804 wrote to memory of 2512 4804 java.exe 94 PID 4804 wrote to memory of 2512 4804 java.exe 94 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 3532 attrib.exe 2512 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\2502c807c3327021f622fd468781f85d.jar1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4300
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "2502c807c3327021f622fd468781f85d.jar" /d "C:\Users\Admin\AppData\Roaming\2502c807c3327021f622fd468781f85d.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3616
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\2502c807c3327021f622fd468781f85d.jar2⤵
- Views/modifies file attributes
PID:3532
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2502c807c3327021f622fd468781f85d.jar2⤵
- Views/modifies file attributes
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD52b404a0c84d0204b5865c3ed372dcf30
SHA190df64e0ffa47dc3eb8e4f8d7910bab5003f17cb
SHA256e67705d7187c989a2579377a48860cc245c4e38f1186df59990f4ecc210cfbaa
SHA512b126bdd27063ae52f5ded82ce673c11c2752a4713816348fcc2b0df524cf77ec5c7d5715c5a83a4c4b8c75bda8f46b8a4a0f1d57ef7c2ce3b6967c76267629e2
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
332KB
MD52502c807c3327021f622fd468781f85d
SHA147d237b21f15e64bd56f0eff1fe3df549f355ae2
SHA2562870e91faf799f431115adfd00bc8a7573f197c29b57d3f7e3f6f85eee28928b
SHA5121a097a75053cc5bb0cc1896fdc0a7713b97048a909d0baf10f496334e5dcce6a0cbd3a65d1992039125eaa4944ab40c8587ac91c4924824452ba0a95dc394c14