Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 16:51

General

  • Target

    W2-AND-1095-A_PDF.jar

  • Size

    766KB

  • MD5

    7e3adb5fe223d34464fd3da3cc2aebc9

  • SHA1

    fd6123aa0e064e9a71873ac2d6ff05555dd44532

  • SHA256

    35457ef70c460a876c61331b98913095482ebd5ca1fa08de5f50efefcce38c31

  • SHA512

    233325833e309eaacc9af1b3ebe82de3b1141e9ec16b2ebf027a5f961f0f000181acc7615f0c9fb2b800f814a9c68462e61803f01cfd2f27f3e0781f4f8d60ae

  • SSDEEP

    12288:PClCt+jpc2GXdhJ/af5jUPJLsZ8A3K6aZZI6rlGE6uFehPfDmNCzD6tRMaSjX33c:PClCC1GjEfJgJAHsZZt0ENMhPb8iD6t9

Malware Config

Signatures

  • Ratty

    Ratty is an open source Java Remote Access Tool.

  • Ratty Rat payload 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\W2-AND-1095-A_PDF.jar
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:3540
    • C:\Windows\SYSTEM32\REG.exe
      REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "W2-AND-1095-A_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\W2-AND-1095-A_PDF.jar" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:2308
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\W2-AND-1095-A_PDF.jar
      2⤵
      • Views/modifies file attributes
      PID:216
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W2-AND-1095-A_PDF.jar
      2⤵
      • Views/modifies file attributes
      PID:3588

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

2
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp
    Filesize

    46B

    MD5

    e2490496cda629e4ac9aedf45203d950

    SHA1

    29148001295257d75b1939007253e198ddb12a9b

    SHA256

    e56eca77dbc21124710849d9a162c93bc283ca21af4e6dd04ab729fe959d1e42

    SHA512

    122b0ab35d12cc9583e90b4bad4276c78d196ff3d6b67a7e6132989c8539a5614105921ee7e5d815efc5721bb648e9a5cf53da10260941fcb74dfaf9bf2b4ace

  • C:\Users\Admin\AppData\Local\Temp\JNativeHook-7432773EB4D09DC286D43FCC77DDB0E1E3BCE2B4.dll
    Filesize

    83KB

    MD5

    55f4de7f270663b3dc712b8c9eed422a

    SHA1

    7432773eb4d09dc286d43fcc77ddb0e1e3bce2b4

    SHA256

    47c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25

    SHA512

    9da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996

  • C:\Users\Admin\AppData\Roaming\W2-AND-1095-A_PDF.jar
    Filesize

    766KB

    MD5

    7e3adb5fe223d34464fd3da3cc2aebc9

    SHA1

    fd6123aa0e064e9a71873ac2d6ff05555dd44532

    SHA256

    35457ef70c460a876c61331b98913095482ebd5ca1fa08de5f50efefcce38c31

    SHA512

    233325833e309eaacc9af1b3ebe82de3b1141e9ec16b2ebf027a5f961f0f000181acc7615f0c9fb2b800f814a9c68462e61803f01cfd2f27f3e0781f4f8d60ae

  • memory/4304-38-0x000001F574740000-0x000001F574741000-memory.dmp
    Filesize

    4KB

  • memory/4304-19-0x000001F574740000-0x000001F574741000-memory.dmp
    Filesize

    4KB

  • memory/4304-14-0x000001F574740000-0x000001F574741000-memory.dmp
    Filesize

    4KB

  • memory/4304-30-0x000001F574740000-0x000001F574741000-memory.dmp
    Filesize

    4KB

  • memory/4304-34-0x000001F500000000-0x000001F501000000-memory.dmp
    Filesize

    16.0MB

  • memory/4304-4-0x000001F500000000-0x000001F501000000-memory.dmp
    Filesize

    16.0MB

  • memory/4304-41-0x000001F574740000-0x000001F574741000-memory.dmp
    Filesize

    4KB

  • memory/4304-47-0x0000000065E40000-0x0000000065E55000-memory.dmp
    Filesize

    84KB

  • memory/4304-50-0x000001F500000000-0x000001F501000000-memory.dmp
    Filesize

    16.0MB

  • memory/4304-49-0x0000000065E40000-0x0000000065E55000-memory.dmp
    Filesize

    84KB

  • memory/4304-52-0x000001F5002A0000-0x000001F5002B0000-memory.dmp
    Filesize

    64KB

  • memory/4304-51-0x000001F500280000-0x000001F500290000-memory.dmp
    Filesize

    64KB

  • memory/4304-53-0x000001F500000000-0x000001F501000000-memory.dmp
    Filesize

    16.0MB