analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

shipment~trackinginfo.jar

Full analysis: https://app.any.run/tasks/df12ff3a-ee17-46c6-860d-1a9ca54c6416
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 30, 2020, 12:37:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
trojan
rat
ratty
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Software Update for Web Folders (English) 14, Author: Microsoft Corporation, Keywords: Installer, MSI, Database, Release, Comments: This Installer database contains the logic and data required to install Microsoft Software Update for Web Folders (English) 14., Template: Intel;1033, Revision Number: {D09D1C77-A5D3-48C0-B530-C9C18BAF2545}, Create Time/Date: Tue Mar 30 18:26:02 2010, Last Saved Time/Date: Tue Mar 30 18:26:02 2010, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.0.5419.0), Security: 2
MD5:

48A5714147EE85374AB74174A82AB77A

SHA1:

0013477C69C58AFEEF76436164A2DE0EB29459BE

SHA256:

E7C36E5ED6E3B409A20CE37D4604EFB2D69BA7C146996CA8F1C0C1BCD72E81A0

SSDEEP:

6144:01kCxZjgS007NNMX/+DoklCAFNWClCA+jp02GmaZ/ZJSEPavLFjt+WQ:06CxZNNNzbCClCA+jp02GmWhJnav5jUf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Writes to a start menu file

      • javaw.exe (PID: 2172)
    • Loads dropped or rewritten executable

      • javaw.exe (PID: 2172)
    • Connects to CnC server

      • javaw.exe (PID: 2172)
    • Changes the autorun value in the registry

      • REG.exe (PID: 2476)
    • Actions looks like stealing of personal data

      • javaw.exe (PID: 2172)
    • RATTY was detected

      • javaw.exe (PID: 2172)
  • SUSPICIOUS

    • Suspicious files were dropped or overwritten

      • javaw.exe (PID: 2172)
    • Creates files in the user directory

      • javaw.exe (PID: 2172)
    • Uses REG.EXE to modify Windows registry

      • javaw.exe (PID: 2172)
    • Uses ATTRIB.EXE to modify file attributes

      • javaw.exe (PID: 2172)
    • Executable content was dropped or overwritten

      • javaw.exe (PID: 2172)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: Read-only recommended
Software: Windows Installer XML (3.0.5419.0)
Words: 2
Pages: 200
ModifyDate: 2010:03:30 17:26:02
CreateDate: 2010:03:30 17:26:02
RevisionNumber: {D09D1C77-A5D3-48C0-B530-C9C18BAF2545}
Template: Intel;1033
Comments: This Installer database contains the logic and data required to install Microsoft Software Update for Web Folders (English) 14.
Keywords: Installer, MSI, Database, Release
Author: Microsoft Corporation
Subject: Microsoft Software Update for Web Folders (English) 14
Title: Installation Database
CodePage: Windows Latin 1 (Western European)
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #RATTY javaw.exe reg.exe attrib.exe no specs attrib.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2172"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\shipment~trackinginfo.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
2476REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "shipment~trackinginfo.jar" /d "C:\Users\admin\AppData\Roaming\shipment~trackinginfo.jar" /fC:\Windows\system32\REG.exe
javaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1932attrib +H C:\Users\admin\AppData\Roaming\shipment~trackinginfo.jarC:\Windows\system32\attrib.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2304attrib +H C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\shipment~trackinginfo.jarC:\Windows\system32\attrib.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
412
Read events
407
Write events
5
Delete events
0

Modification events

(PID) Process:(2476) REG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:shipment~trackinginfo.jar
Value:
C:\Users\admin\AppData\Roaming\shipment~trackinginfo.jar
(PID) Process:(2172) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
(PID) Process:(2172) javaw.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2172) javaw.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
Executable files
3
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
2172javaw.exeC:\Users\admin\AppData\Local\Temp\JNativeHook-3602086412565743411.dll
MD5:
SHA256:
2172javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\shipment~trackinginfo.jarexecutable
MD5:48A5714147EE85374AB74174A82AB77A
SHA256:E7C36E5ED6E3B409A20CE37D4604EFB2D69BA7C146996CA8F1C0C1BCD72E81A0
2172javaw.exeC:\Users\admin\AppData\Roaming\shipment~trackinginfo.jarexecutable
MD5:48A5714147EE85374AB74174A82AB77A
SHA256:E7C36E5ED6E3B409A20CE37D4604EFB2D69BA7C146996CA8F1C0C1BCD72E81A0
2172javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:E90D847A13617005AFE0B92F10139B14
SHA256:2AE34BAD476EC7EBC451AA1E2955EB11F9EFD65BD38C4483269A747EF0E8D62E
2172javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\83aa4cc77f591dfc2374580bbd95f6ba_90059c37-1320-41a4-b58d-2b75a9850d2fdbf
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
2172javaw.exeC:\Users\admin\AppData\Local\Temp\JNativeHook-FCBC1DC5993F3B7C153159E29CD4364927BC9517.dllexecutable
MD5:B4CE035F926531D6B4DFA8477C6477E4
SHA256:F6FFEAD3B5F3DB5A7A00D1FEF874C3D3ED7ECF095DA2D981EBD691FDFA685716
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2172
javaw.exe
91.92.136.52:9090
BelCloud Hosting Corporation
BG
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2172
javaw.exe
Generic Protocol Command Decode
SURICATA Applayer Wrong direction first Data
2172
javaw.exe
A Network Trojan was detected
AV TROJAN Trojan.Java.Ratty.a CnC Checkin
No debug info