Analysis
-
max time kernel
12s -
max time network
12s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2024 18:51
Static task
static1
General
-
Target
Tax_documents_JPG.jar
-
Size
429KB
-
MD5
b600058b62cbca0ace1c87e4dc1eab56
-
SHA1
16cfb0fbf7fa4b821c6313a9512f1b04aa693813
-
SHA256
811de6570cf64d430a2c0af6fd2ce4214e61d5fd6f7adaae6d1bf4791b4d11e0
-
SHA512
af0e7c3d18b659204b7b78ec948feeae04e47d4d0210ef32833278d078fbe6f3d8a9de3cdd8364e7f4b89dec372cd47dbde4d478c9b78641c080301490936d82
-
SSDEEP
6144:LxHPsAEkCqNL+MbHEMVw4zYr/mglY20Ozj/fjRs+Cxd32oSTklkCNPaawJzkfpSy:ekCqPkgpsr/JzynSTtir0usYPuJ6Aax
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
resource yara_rule behavioral1/files/0x000900000001ab37-18.dat family_ratty -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1924 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3088 wrote to memory of 1924 3088 java.exe 74 PID 3088 wrote to memory of 1924 3088 java.exe 74 PID 3088 wrote to memory of 4200 3088 java.exe 76 PID 3088 wrote to memory of 4200 3088 java.exe 76
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Tax_documents_JPG.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1924
-
-
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\rideaegdny.js2⤵PID:4200
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lbuomnbhhq.txt"3⤵PID:2400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c35695955c8e1b48e6034764ea4daecb
SHA1f42bb2c010e13c64c67ab8f70569ae871c593bb3
SHA256e2467b53bb795a94df67d4cd885ea1c33ef1b0084a21c9db76694811f0e31ed7
SHA51295554022d101ca523b1f5e5ae8a01badd23aa7e4379081226932f29e9095d440bfb8dd72879076fe235118cb74a26638088aabede401713e5cde05917dfaddb5
-
Filesize
332KB
MD500694ae146ab43cc057084110f747e4c
SHA167a24c66fac1fdf2cd98b536768597ab1c03c8f1
SHA256248a66690549491b314b81e4375b6ad856866183df59ee9e1bf3872c5eb1689b
SHA51203440417eb6dec4c64d35b1c2694d5fc2e145262b1c044d9ab950625368c2a44c3f09504e6233b684846e55801e685465b8b2ec162a7e66e693a384e73f1ef3b
-
Filesize
720KB
MD56eee7d7c5b76c9e009b9ef36d28f2769
SHA1a0c9a8eaad86685900d0127eba6e43a0808cf2a8
SHA2561058268338b671fdad899ed250b792ce2e587fc2686375f1d931dca2a8c6a7c8
SHA5121eeca587292603dc86ff12d07c0e54798cdf88abf2227d3ec11bf2b3bdea47add1760c1c79e856110d200abcc0bd68aeb27807f7bbe051e4731717e8ed4947c9