Analysis
-
max time kernel
111s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2024 00:14
Behavioral task
behavioral1
Sample
2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar
Resource
win10v2004-20231215-en
General
-
Target
2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar
-
Size
761KB
-
MD5
22e4d501be6ca69e29bc2a21782bd9e1
-
SHA1
93bd6f32a6afec897679ec96feb72627ea79d6ef
-
SHA256
1b7560d64e9fc2a468cc3e251669dd05df851f6432b8f3c373f06bd6aaf82d31
-
SHA512
f4b836bc1aaaece82e2ef590bb214227c23578d57f8e4caf6778f269b85b4337dda99a8f43cb5d286b44528c8d7ac25e6d42a899a98dcdc6047aeb59fdea3c83
-
SSDEEP
12288:XClCM+jp72GYshJCa65jUXBosjWhMMJWX7AfoJLTpbyjkGZnCgAJt5JEXOG4Ir:XClCRMGhz6JOi4XMwXWoJHUYYnCgAJru
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023221-15.dat family_ratty -
Drops startup file 1 IoCs
Processes:
java.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar java.exe -
Loads dropped DLL 1 IoCs
Processes:
java.exepid Process 208 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
REG.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar = "C:\\Users\\Admin\\AppData\\Roaming\\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar" REG.exe -
Drops file in Program Files directory 12 IoCs
Processes:
java.exedescription ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe -
Modifies registry class 2 IoCs
Processes:
java.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
java.exepid Process 208 java.exe 208 java.exe 208 java.exe 208 java.exe 208 java.exe 208 java.exe 208 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exedescription pid Process procid_target PID 208 wrote to memory of 1176 208 java.exe 85 PID 208 wrote to memory of 1176 208 java.exe 85 PID 208 wrote to memory of 2004 208 java.exe 91 PID 208 wrote to memory of 2004 208 java.exe 91 PID 208 wrote to memory of 2504 208 java.exe 87 PID 208 wrote to memory of 2504 208 java.exe 87 PID 208 wrote to memory of 3308 208 java.exe 90 PID 208 wrote to memory of 3308 208 java.exe 90 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 2504 attrib.exe 3308 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1176
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar2⤵
- Views/modifies file attributes
PID:2504
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar2⤵
- Views/modifies file attributes
PID:3308
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\2023-FILES-MY1040-w2-IRS-letter-1099r_PDF.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5af3c9f315aa092aafe024dde6dff2719
SHA1a5ebf4ff87b70996878ea99ef0cf8f6b4c46b1a9
SHA25680bda6f5ba752523f6ee8f1c8e2e70828bcb1186108d81702cdf54625430efaf
SHA5126c858c142e00ef95c763060ea43abc929f405473764b8543ee8e105a58e91ece94dcf29f5686d7ba059c3cd8b0403abe8e0dfa708fc2be811018ef6675c5857b
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
761KB
MD522e4d501be6ca69e29bc2a21782bd9e1
SHA193bd6f32a6afec897679ec96feb72627ea79d6ef
SHA2561b7560d64e9fc2a468cc3e251669dd05df851f6432b8f3c373f06bd6aaf82d31
SHA512f4b836bc1aaaece82e2ef590bb214227c23578d57f8e4caf6778f269b85b4337dda99a8f43cb5d286b44528c8d7ac25e6d42a899a98dcdc6047aeb59fdea3c83