Analysis
-
max time kernel
780s -
max time network
429s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 13:08
Behavioral task
behavioral1
Sample
RATCONNECTOR.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
RATCONNECTOR.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
RATCONNECTOR.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
RATCONNECTOR.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
RATCONNECTOR.apk
-
Size
5.3MB
-
MD5
a76f0936681fe484462fd7c9d4e72713
-
SHA1
106c470554eadc3388da5f81025bd54987d301f2
-
SHA256
9142490d12c6dcbf10aab2d93c8e1fe2d34de15393e36bad4556f7e10fa0c4e1
-
SHA512
2a8b87c4931f17d96e34d165aa048e465bd167c768dcde4f27f7fa9718339dfbf7652c6d0f56f219de48e1222343a4d61dcb09eb60f15528c82179ae9b68cd42
-
SSDEEP
98304:dyYFE/PpYf3mnos85GzwmzDzBJTZ0tQaef1Nndef1NnVqWn:xE5Y/mrzP2WNiN3r
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2596 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4060 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe 4060 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2596 4060 OpenWith.exe 103 PID 4060 wrote to memory of 2596 4060 OpenWith.exe 103
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RATCONNECTOR.apk1⤵
- Modifies registry class
PID:3120
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\RATCONNECTOR.apk2⤵
- Opens file in notepad (likely ransom note)
PID:2596
-