Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 18:41
Behavioral task
behavioral1
Sample
W2-AND-1099-A_PDF.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
W2-AND-1099-A_PDF.jar
Resource
win10v2004-20240226-en
General
-
Target
W2-AND-1099-A_PDF.jar
-
Size
619KB
-
MD5
e09c100ccd2443603da3bc66f4564424
-
SHA1
0e0a646879fb797e5b6e88bd3fc870be5116c2d7
-
SHA256
7336bbbddf551fc0bc36d820cb702452750e426608b5caf0cc92707c41499be3
-
SHA512
cce226c3785b741dcd1aed871d691818a04d84ea87c37eeaad835a5091ec0748372c7b96dc8271bb71fd0d3461090153a11519ac4c3cb9305f0f399e4fa55432
-
SSDEEP
12288:pzw60AvjBPrtU7ebS7Qzx9qjF5jURClCn+jprJaA2GvhJv:e60GjBPriib3zT4FJ0ClCQ2LG5B
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231f9-14.dat family_ratty -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W2-AND-1099-A_PDF.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 1272 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3228 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\W2-AND-1099-A_PDF.jar = "C:\\Users\\Admin\\AppData\\Roaming\\W2-AND-1099-A_PDF.jar" REG.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1124 REG.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe 1272 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3228 1272 java.exe 89 PID 1272 wrote to memory of 3228 1272 java.exe 89 PID 1272 wrote to memory of 1124 1272 java.exe 91 PID 1272 wrote to memory of 1124 1272 java.exe 91 PID 1272 wrote to memory of 2032 1272 java.exe 92 PID 1272 wrote to memory of 2032 1272 java.exe 92 PID 1272 wrote to memory of 4772 1272 java.exe 94 PID 1272 wrote to memory of 4772 1272 java.exe 94 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2032 attrib.exe 4772 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\W2-AND-1099-A_PDF.jar1⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3228
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "W2-AND-1099-A_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\W2-AND-1099-A_PDF.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1124
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\W2-AND-1099-A_PDF.jar2⤵
- Views/modifies file attributes
PID:2032
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W2-AND-1099-A_PDF.jar2⤵
- Views/modifies file attributes
PID:4772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5467386af76775c89e829fbf74f6cc990
SHA19c1ab4268c2033945385f49646acabf6df88b8f1
SHA25614e9032e2a81a791eb717ead35edc0126d647b56bbc85fa048d3a650d3b049fb
SHA5124778d025aaf5ed71a65f49e9fcb9411924926af098f01577c4a517a8aa61290c2445e2a90227353269d5ad140d8b2418c68d3f1e3c388efbd3d53a56f8db39d3
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
5KB
MD5239ead1192fbb5ab007a5398191e0d9f
SHA175766566ab75e91224476377448c0cbd4ca4e403
SHA256697154e6d42cb83255603427c66f50c3ef9d810cd71179f2d4c65278f35d50a8
SHA5123c90b66ca840454c88cfd31d5238da9033ed86873a53ffe3fabe14eee5d23e7016d41a0ad8108a577e7d1b43f8ccffaa1ed656bff220f25b7d198423d12712b4
-
Filesize
619KB
MD5e09c100ccd2443603da3bc66f4564424
SHA10e0a646879fb797e5b6e88bd3fc870be5116c2d7
SHA2567336bbbddf551fc0bc36d820cb702452750e426608b5caf0cc92707c41499be3
SHA512cce226c3785b741dcd1aed871d691818a04d84ea87c37eeaad835a5091ec0748372c7b96dc8271bb71fd0d3461090153a11519ac4c3cb9305f0f399e4fa55432