Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 16:51
Behavioral task
behavioral1
Sample
W2-AND-1095-A_PDF.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
W2-AND-1095-A_PDF.jar
Resource
win10v2004-20240226-en
General
-
Target
W2-AND-1095-A_PDF.jar
-
Size
766KB
-
MD5
7e3adb5fe223d34464fd3da3cc2aebc9
-
SHA1
fd6123aa0e064e9a71873ac2d6ff05555dd44532
-
SHA256
35457ef70c460a876c61331b98913095482ebd5ca1fa08de5f50efefcce38c31
-
SHA512
233325833e309eaacc9af1b3ebe82de3b1141e9ec16b2ebf027a5f961f0f000181acc7615f0c9fb2b800f814a9c68462e61803f01cfd2f27f3e0781f4f8d60ae
-
SSDEEP
12288:PClCt+jpc2GXdhJ/af5jUPJLsZ8A3K6aZZI6rlGE6uFehPfDmNCzD6tRMaSjX33c:PClCC1GjEfJgJAHsZZt0ENMhPb8iD6t9
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0009000000023201-15.dat family_ratty -
Drops startup file 1 IoCs
Processes:
java.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W2-AND-1095-A_PDF.jar java.exe -
Loads dropped DLL 1 IoCs
Processes:
java.exepid Process 4304 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
REG.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\W2-AND-1095-A_PDF.jar = "C:\\Users\\Admin\\AppData\\Roaming\\W2-AND-1095-A_PDF.jar" REG.exe -
Drops file in Program Files directory 12 IoCs
Processes:
java.exedescription ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe -
Modifies registry class 2 IoCs
Processes:
java.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ java.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ java.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
java.exepid Process 4304 java.exe 4304 java.exe 4304 java.exe 4304 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exedescription pid Process procid_target PID 4304 wrote to memory of 3540 4304 java.exe 88 PID 4304 wrote to memory of 3540 4304 java.exe 88 PID 4304 wrote to memory of 2308 4304 java.exe 90 PID 4304 wrote to memory of 2308 4304 java.exe 90 PID 4304 wrote to memory of 216 4304 java.exe 91 PID 4304 wrote to memory of 216 4304 java.exe 91 PID 4304 wrote to memory of 3588 4304 java.exe 92 PID 4304 wrote to memory of 3588 4304 java.exe 92 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 216 attrib.exe 3588 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\W2-AND-1095-A_PDF.jar1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3540
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "W2-AND-1095-A_PDF.jar" /d "C:\Users\Admin\AppData\Roaming\W2-AND-1095-A_PDF.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2308
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\W2-AND-1095-A_PDF.jar2⤵
- Views/modifies file attributes
PID:216
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\W2-AND-1095-A_PDF.jar2⤵
- Views/modifies file attributes
PID:3588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5e2490496cda629e4ac9aedf45203d950
SHA129148001295257d75b1939007253e198ddb12a9b
SHA256e56eca77dbc21124710849d9a162c93bc283ca21af4e6dd04ab729fe959d1e42
SHA512122b0ab35d12cc9583e90b4bad4276c78d196ff3d6b67a7e6132989c8539a5614105921ee7e5d815efc5721bb648e9a5cf53da10260941fcb74dfaf9bf2b4ace
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
766KB
MD57e3adb5fe223d34464fd3da3cc2aebc9
SHA1fd6123aa0e064e9a71873ac2d6ff05555dd44532
SHA25635457ef70c460a876c61331b98913095482ebd5ca1fa08de5f50efefcce38c31
SHA512233325833e309eaacc9af1b3ebe82de3b1141e9ec16b2ebf027a5f961f0f000181acc7615f0c9fb2b800f814a9c68462e61803f01cfd2f27f3e0781f4f8d60ae