Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-11-2024 00:06
Behavioral task
behavioral1
Sample
RAT NIGGA.jar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
RAT NIGGA.jar
Resource
win11-20241007-en
General
-
Target
RAT NIGGA.jar
-
Size
639KB
-
MD5
eaf4f869a0be0418568b88301e8318e5
-
SHA1
0f5efc7f8fea65eaa0bca6746ff72eeb4d65bd9e
-
SHA256
1e8d94d04b2d21fe062345f4f2eb5bd6896f420e1a98c17eaf0105236ae52b67
-
SHA512
2c746db76c9f9987d85809d7598b9a24558d8a1b1c98e77e0398725258b1611e7227dacd7efa094a8f0bdf9cb16b2aae794c5ddcea3a02f6bb153c4403a99c9a
-
SSDEEP
12288:YPvPQT/dZzqF149PE/+HgK/nRf+9ZYN2Xgg+1CRja3cuQ2hESQBDI7:YP3QLvqj4lTHgKZms2XtoNcu9hXQBDI7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1731024431191.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4744 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4744 wrote to memory of 644 4744 java.exe 78 PID 4744 wrote to memory of 644 4744 java.exe 78 PID 4744 wrote to memory of 232 4744 java.exe 80 PID 4744 wrote to memory of 232 4744 java.exe 80 PID 232 wrote to memory of 3348 232 cmd.exe 82 PID 232 wrote to memory of 3348 232 cmd.exe 82 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 644 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\RAT NIGGA.jar"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731024431191.tmp2⤵
- Views/modifies file attributes
PID:644
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731024431191.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1731024431191.tmp" /f3⤵
- Adds Run key to start application
PID:3348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD5eaf4f869a0be0418568b88301e8318e5
SHA10f5efc7f8fea65eaa0bca6746ff72eeb4d65bd9e
SHA2561e8d94d04b2d21fe062345f4f2eb5bd6896f420e1a98c17eaf0105236ae52b67
SHA5122c746db76c9f9987d85809d7598b9a24558d8a1b1c98e77e0398725258b1611e7227dacd7efa094a8f0bdf9cb16b2aae794c5ddcea3a02f6bb153c4403a99c9a