Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2024 04:18
Behavioral task
behavioral1
Sample
1.jar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
1.jar
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
1.jar
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
1.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1.jar
Resource
win11-20241007-en
General
-
Target
1.jar
-
Size
1.1MB
-
MD5
a5483a74a3cbf726d2ebf659247ec9c7
-
SHA1
a9b28e22845934adff30ad44b293d714230344ea
-
SHA256
37c49983dfd813e67d898b4088ea29e2146674aeba37059944db194a004dc2af
-
SHA512
a651326628acade8adebeeec9c974d087f22cb8d868c98432c8f967ab4180c6beb7186c7b0b31e6428240017f360270d6ce90f31953c8fafe5dc4e5e0ecc9ad7
-
SSDEEP
24576:dzhTX3kLlzYc4lMTboiqSr9xZXfRCUOutEUKIzWG:dzSLlUpSbYIn/Cl8zWG
Malware Config
Signatures
-
Ratty Rat payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\1.jar family_ratty -
Drops startup file 1 IoCs
Processes:
java.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.jar java.exe -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 2304 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
REG.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\1.jar = "C:\\Users\\Admin\\AppData\\Roaming\\1.jar" REG.exe -
Modifies registry class 2 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance java.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance java.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
java.exepid process 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe 2304 java.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exedescription pid process target process PID 2304 wrote to memory of 1888 2304 java.exe icacls.exe PID 2304 wrote to memory of 1888 2304 java.exe icacls.exe PID 2304 wrote to memory of 2424 2304 java.exe REG.exe PID 2304 wrote to memory of 2424 2304 java.exe REG.exe PID 2304 wrote to memory of 68 2304 java.exe attrib.exe PID 2304 wrote to memory of 68 2304 java.exe attrib.exe PID 2304 wrote to memory of 4680 2304 java.exe attrib.exe PID 2304 wrote to memory of 4680 2304 java.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 68 attrib.exe 4680 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\1.jar1⤵
- Drops startup file
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:1888
-
-
C:\Windows\SYSTEM32\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "1.jar" /d "C:\Users\Admin\AppData\Roaming\1.jar" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2424
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\1.jar2⤵
- Views/modifies file attributes
PID:68
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.jar2⤵
- Views/modifies file attributes
PID:4680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD55e719233f9983f8aebff36e835c2a3f8
SHA166af7a6ca9f5ff16d9428edda3a762d999e2e0f4
SHA256af7f6bcdd7c2f8d07d10b7ae9b6de4a49ad65ffc758ff936594fd709948a174f
SHA512810770619ac75d7ce6eb012fa52602737c87ea2e3af3557865fd0ee485a3a693ab0e96288be486652b20564e99baa3ce9a859a89eadb485dc24b93d7e9cd0f38
-
Filesize
1.1MB
MD5a5483a74a3cbf726d2ebf659247ec9c7
SHA1a9b28e22845934adff30ad44b293d714230344ea
SHA25637c49983dfd813e67d898b4088ea29e2146674aeba37059944db194a004dc2af
SHA512a651326628acade8adebeeec9c974d087f22cb8d868c98432c8f967ab4180c6beb7186c7b0b31e6428240017f360270d6ce90f31953c8fafe5dc4e5e0ecc9ad7
-
Filesize
83KB
MD555f4de7f270663b3dc712b8c9eed422a
SHA17432773eb4d09dc286d43fcc77ddb0e1e3bce2b4
SHA25647c2871dff8948de40424df497962ea6167c56bd4d487dd2e660aa2837485e25
SHA5129da5efb0236b3bb4ec72d07bfd70a9e3f373df95d97c825513babd43d2b91c8669e28f3464173e789dad092ea48fc8d32a9d11a6d5c8d9beeabd33860ce6a996