Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 04:21
Behavioral task
behavioral1
Sample
af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar
Resource
win10v2004-20240319-en
General
-
Target
af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar
-
Size
332KB
-
MD5
af7f264ed40f293a01ee685ee7d42daf
-
SHA1
a20caef9550c2ae144529b60598b5f58e63a409a
-
SHA256
2436fa28a278522c298b3a398ddc553c96c4be29ae7b433a999ad49ac71d656c
-
SHA512
05a060fe3d4b9f92180987d742e5ecad0deb1c5d2cbb1deec0fb31af8ddc5aa867b73ac0b9af02a764c453ba50fc4e9bd6d42b83b294a9e9bcf91b32c34ded7d
-
SSDEEP
6144:JZjgS007NNMX/+DoklCAFNWClCA+jp02GmaZ/ZJSEPavLFjt+WU:JZNNNzbCClCA+jp02GmWhJnav5jU7
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023327-14.dat family_ratty -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar java.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 760 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar = "C:\\Users\\Admin\\AppData\\Roaming\\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar" REG.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1728 REG.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1968 java.exe 1968 java.exe 1968 java.exe 1968 java.exe 1968 java.exe 1968 java.exe 1968 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 760 1968 java.exe 95 PID 1968 wrote to memory of 760 1968 java.exe 95 PID 1968 wrote to memory of 1728 1968 java.exe 97 PID 1968 wrote to memory of 1728 1968 java.exe 97 PID 1968 wrote to memory of 1704 1968 java.exe 98 PID 1968 wrote to memory of 1704 1968 java.exe 98 PID 1968 wrote to memory of 4640 1968 java.exe 100 PID 1968 wrote to memory of 4640 1968 java.exe 100 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1704 attrib.exe 4640 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:760
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar" /d "C:\Users\Admin\AppData\Roaming\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1728
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar2⤵
- Views/modifies file attributes
PID:1704
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af7f264ed40f293a01ee685ee7d42daf_JaffaCakes118.jar2⤵
- Views/modifies file attributes
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3284 --field-trial-handle=2232,i,10468259530860544675,2192522633371581869,262144 --variations-seed-version /prefetch:81⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD508664879a45db394d0ffbe9c4b70521a
SHA1403e33e107bd9e75e8e757b922cf0761f9e604f7
SHA2565517a3eb44b4ea920381a5c9a7a7ea1e0130e925477b7ad17c6c4acda00b8161
SHA5128a46c543c0a636a32ed824c326b17532fec3b0544b336e18471cf0478185535cff36d3557d5395f4a935333b8d95b3605c4771e3217fb361a3cd2bca9855bd6d
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996
-
Filesize
332KB
MD5af7f264ed40f293a01ee685ee7d42daf
SHA1a20caef9550c2ae144529b60598b5f58e63a409a
SHA2562436fa28a278522c298b3a398ddc553c96c4be29ae7b433a999ad49ac71d656c
SHA51205a060fe3d4b9f92180987d742e5ecad0deb1c5d2cbb1deec0fb31af8ddc5aa867b73ac0b9af02a764c453ba50fc4e9bd6d42b83b294a9e9bcf91b32c34ded7d