Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 18:41

General

  • Target

    W2-AND-1099-A_PDF.jar

  • Size

    619KB

  • MD5

    e09c100ccd2443603da3bc66f4564424

  • SHA1

    0e0a646879fb797e5b6e88bd3fc870be5116c2d7

  • SHA256

    7336bbbddf551fc0bc36d820cb702452750e426608b5caf0cc92707c41499be3

  • SHA512

    cce226c3785b741dcd1aed871d691818a04d84ea87c37eeaad835a5091ec0748372c7b96dc8271bb71fd0d3461090153a11519ac4c3cb9305f0f399e4fa55432

  • SSDEEP

    12288:pzw60AvjBPrtU7ebS7Qzx9qjF5jURClCn+jprJaA2GvhJv:e60GjBPriib3zT4FJ0ClCQ2LG5B

Malware Config

Signatures

  • Ratty

    Ratty is an open source Java Remote Access Tool.

  • Ratty Rat payload 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\W2-AND-1099-A_PDF.jar
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3228
    • C:\Windows\SYSTEM32\REG.exe
      REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "W2-AND-1099-A_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\W2-AND-1099-A_PDF.jar" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:1124
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\W2-AND-1099-A_PDF.jar
      2⤵
      • Views/modifies file attributes
      PID:2032
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W2-AND-1099-A_PDF.jar
      2⤵
      • Views/modifies file attributes
      PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    467386af76775c89e829fbf74f6cc990

    SHA1

    9c1ab4268c2033945385f49646acabf6df88b8f1

    SHA256

    14e9032e2a81a791eb717ead35edc0126d647b56bbc85fa048d3a650d3b049fb

    SHA512

    4778d025aaf5ed71a65f49e9fcb9411924926af098f01577c4a517a8aa61290c2445e2a90227353269d5ad140d8b2418c68d3f1e3c388efbd3d53a56f8db39d3

  • C:\Users\Admin\AppData\Local\Temp\JNativeHook-7432773EB4D09DC286D43FCC77DDB0E1E3BCE2B4.dll

    Filesize

    83KB

    MD5

    55f4de7f270663b3dc712b8c9eed422a

    SHA1

    7432773eb4d09dc286d43fcc77ddb0e1e3bce2b4

    SHA256

    47c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25

    SHA512

    9da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996

  • C:\Users\Admin\AppData\Local\Temp\imageio2799697056382735159.tmp

    Filesize

    5KB

    MD5

    239ead1192fbb5ab007a5398191e0d9f

    SHA1

    75766566ab75e91224476377448c0cbd4ca4e403

    SHA256

    697154e6d42cb83255603427c66f50c3ef9d810cd71179f2d4c65278f35d50a8

    SHA512

    3c90b66ca840454c88cfd31d5238da9033ed86873a53ffe3fabe14eee5d23e7016d41a0ad8108a577e7d1b43f8ccffaa1ed656bff220f25b7d198423d12712b4

  • C:\Users\Admin\AppData\Roaming\W2-AND-1099-A_PDF.jar

    Filesize

    619KB

    MD5

    e09c100ccd2443603da3bc66f4564424

    SHA1

    0e0a646879fb797e5b6e88bd3fc870be5116c2d7

    SHA256

    7336bbbddf551fc0bc36d820cb702452750e426608b5caf0cc92707c41499be3

    SHA512

    cce226c3785b741dcd1aed871d691818a04d84ea87c37eeaad835a5091ec0748372c7b96dc8271bb71fd0d3461090153a11519ac4c3cb9305f0f399e4fa55432

  • memory/1272-69-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-74-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-40-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-42-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-50-0x0000000065E40000-0x0000000065E55000-memory.dmp

    Filesize

    84KB

  • memory/1272-51-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-54-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-55-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-57-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-56-0x0000000065E40000-0x0000000065E55000-memory.dmp

    Filesize

    84KB

  • memory/1272-60-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-68-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-4-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-72-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-73-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-36-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-75-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-76-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-81-0x0000000065E40000-0x0000000065E55000-memory.dmp

    Filesize

    84KB

  • memory/1272-85-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-87-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-88-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-93-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-95-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-104-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-113-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-18-0x000001C14B8D0000-0x000001C14B8D1000-memory.dmp

    Filesize

    4KB

  • memory/1272-122-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-123-0x000001C14D1D0000-0x000001C14E1D0000-memory.dmp

    Filesize

    16.0MB

  • memory/1272-128-0x0000000065E40000-0x0000000065E55000-memory.dmp

    Filesize

    84KB