Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 06:09
Behavioral task
behavioral1
Sample
Ratka.exe
Resource
win7-20240611-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
Ratka.exe
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
Ratka.exe
-
Size
37KB
-
MD5
f82ab1b6c91dbfc8a1fc643f3c10922b
-
SHA1
5088dc1515bf6cedfbea693bdf0d897e25345775
-
SHA256
3ba782f1ddf9b091232171b072b30dd145090d02cbb16f6ed816e14e35885285
-
SHA512
def496bca5a0cc7957d726d02409372885292690618ae5a13c44e6921fb7de72e5ec8e1855a2cb1de9d4cc1d77be01f3e7d65889b17bf41f00cea12d6b6f805e
-
SSDEEP
384:VmOq0IiejvCVLO309QmykrtG+dA+Vd7wvOSiKrAF+rMRTyN/0L+EcoinblneHQMi:XLdGdkrgYH7wWS9rM+rMRa8Nu9+Ot
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4876 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 29 0.tcp.eu.ngrok.io 64 0.tcp.eu.ngrok.io 89 0.tcp.eu.ngrok.io 14 0.tcp.eu.ngrok.io 20 0.tcp.eu.ngrok.io -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe Token: 33 4440 Ratka.exe Token: SeIncBasePriorityPrivilege 4440 Ratka.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4876 4440 Ratka.exe 85 PID 4440 wrote to memory of 4876 4440 Ratka.exe 85 PID 4440 wrote to memory of 4876 4440 Ratka.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ratka.exe"C:\Users\Admin\AppData\Local\Temp\Ratka.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Ratka.exe" "Ratka.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:4876
-