Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7 -
submitted
30-08-2020 06:36
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Rechnung.jar
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
Rechnung.jar
-
Size
424KB
-
MD5
03bdde0d47b8c25a13f53f6fbba8b08b
-
SHA1
0bc4b8ff28f996ddebaa5eede774d23498fbb6e8
-
SHA256
be9d8b26678dd00c0cfc0cdbd59f5510247fce9379a7213ceaeeef1c0207f27c
-
SHA512
07a0518aab94e9e812f6e4fa0e96045c43cbddf2c412e3c27b693c9e39ec82ff336d3547825e90be5981ee1fe1f384b721ce8166a4c8630169865a6f465e41aa
Score
10/10
Malware Config
Signatures
-
Qarallax RAT support DLL 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\jKmLNiqjuv8135730138405363007.xml qarallax_dll -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 1124 java.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce java.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run java.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
java.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Users\Admin\gNKCW\Desktop.ini java.exe File created C:\Users\Admin\gNKCW\Desktop.ini java.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe -
Drops file in System32 directory 2 IoCs
Processes:
java.exedescription ioc process File created C:\Windows\System32\KYmxr java.exe File opened for modification C:\Windows\System32\KYmxr java.exe -
Suspicious use of AdjustPrivilegeToken 120 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 1904 WMIC.exe Token: SeSecurityPrivilege 1904 WMIC.exe Token: SeTakeOwnershipPrivilege 1904 WMIC.exe Token: SeLoadDriverPrivilege 1904 WMIC.exe Token: SeSystemProfilePrivilege 1904 WMIC.exe Token: SeSystemtimePrivilege 1904 WMIC.exe Token: SeProfSingleProcessPrivilege 1904 WMIC.exe Token: SeIncBasePriorityPrivilege 1904 WMIC.exe Token: SeCreatePagefilePrivilege 1904 WMIC.exe Token: SeBackupPrivilege 1904 WMIC.exe Token: SeRestorePrivilege 1904 WMIC.exe Token: SeShutdownPrivilege 1904 WMIC.exe Token: SeDebugPrivilege 1904 WMIC.exe Token: SeSystemEnvironmentPrivilege 1904 WMIC.exe Token: SeRemoteShutdownPrivilege 1904 WMIC.exe Token: SeUndockPrivilege 1904 WMIC.exe Token: SeManageVolumePrivilege 1904 WMIC.exe Token: 33 1904 WMIC.exe Token: 34 1904 WMIC.exe Token: 35 1904 WMIC.exe Token: SeIncreaseQuotaPrivilege 1904 WMIC.exe Token: SeSecurityPrivilege 1904 WMIC.exe Token: SeTakeOwnershipPrivilege 1904 WMIC.exe Token: SeLoadDriverPrivilege 1904 WMIC.exe Token: SeSystemProfilePrivilege 1904 WMIC.exe Token: SeSystemtimePrivilege 1904 WMIC.exe Token: SeProfSingleProcessPrivilege 1904 WMIC.exe Token: SeIncBasePriorityPrivilege 1904 WMIC.exe Token: SeCreatePagefilePrivilege 1904 WMIC.exe Token: SeBackupPrivilege 1904 WMIC.exe Token: SeRestorePrivilege 1904 WMIC.exe Token: SeShutdownPrivilege 1904 WMIC.exe Token: SeDebugPrivilege 1904 WMIC.exe Token: SeSystemEnvironmentPrivilege 1904 WMIC.exe Token: SeRemoteShutdownPrivilege 1904 WMIC.exe Token: SeUndockPrivilege 1904 WMIC.exe Token: SeManageVolumePrivilege 1904 WMIC.exe Token: 33 1904 WMIC.exe Token: 34 1904 WMIC.exe Token: 35 1904 WMIC.exe Token: SeIncreaseQuotaPrivilege 1968 WMIC.exe Token: SeSecurityPrivilege 1968 WMIC.exe Token: SeTakeOwnershipPrivilege 1968 WMIC.exe Token: SeLoadDriverPrivilege 1968 WMIC.exe Token: SeSystemProfilePrivilege 1968 WMIC.exe Token: SeSystemtimePrivilege 1968 WMIC.exe Token: SeProfSingleProcessPrivilege 1968 WMIC.exe Token: SeIncBasePriorityPrivilege 1968 WMIC.exe Token: SeCreatePagefilePrivilege 1968 WMIC.exe Token: SeBackupPrivilege 1968 WMIC.exe Token: SeRestorePrivilege 1968 WMIC.exe Token: SeShutdownPrivilege 1968 WMIC.exe Token: SeDebugPrivilege 1968 WMIC.exe Token: SeSystemEnvironmentPrivilege 1968 WMIC.exe Token: SeRemoteShutdownPrivilege 1968 WMIC.exe Token: SeUndockPrivilege 1968 WMIC.exe Token: SeManageVolumePrivilege 1968 WMIC.exe Token: 33 1968 WMIC.exe Token: 34 1968 WMIC.exe Token: 35 1968 WMIC.exe Token: SeIncreaseQuotaPrivilege 1968 WMIC.exe Token: SeSecurityPrivilege 1968 WMIC.exe Token: SeTakeOwnershipPrivilege 1968 WMIC.exe Token: SeLoadDriverPrivilege 1968 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 1124 java.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
java.execmd.execmd.execmd.exedescription pid process target process PID 1124 wrote to memory of 1920 1124 java.exe cmd.exe PID 1124 wrote to memory of 1920 1124 java.exe cmd.exe PID 1124 wrote to memory of 1920 1124 java.exe cmd.exe PID 1124 wrote to memory of 1900 1124 java.exe cmd.exe PID 1124 wrote to memory of 1900 1124 java.exe cmd.exe PID 1124 wrote to memory of 1900 1124 java.exe cmd.exe PID 1900 wrote to memory of 1904 1900 cmd.exe WMIC.exe PID 1900 wrote to memory of 1904 1900 cmd.exe WMIC.exe PID 1900 wrote to memory of 1904 1900 cmd.exe WMIC.exe PID 1124 wrote to memory of 1976 1124 java.exe cmd.exe PID 1124 wrote to memory of 1976 1124 java.exe cmd.exe PID 1124 wrote to memory of 1976 1124 java.exe cmd.exe PID 1976 wrote to memory of 1968 1976 cmd.exe WMIC.exe PID 1976 wrote to memory of 1968 1976 cmd.exe WMIC.exe PID 1976 wrote to memory of 1968 1976 cmd.exe WMIC.exe PID 1124 wrote to memory of 1104 1124 java.exe attrib.exe PID 1124 wrote to memory of 1104 1124 java.exe attrib.exe PID 1124 wrote to memory of 1104 1124 java.exe attrib.exe PID 1124 wrote to memory of 528 1124 java.exe attrib.exe PID 1124 wrote to memory of 528 1124 java.exe attrib.exe PID 1124 wrote to memory of 528 1124 java.exe attrib.exe PID 1124 wrote to memory of 520 1124 java.exe attrib.exe PID 1124 wrote to memory of 520 1124 java.exe attrib.exe PID 1124 wrote to memory of 520 1124 java.exe attrib.exe PID 1124 wrote to memory of 1336 1124 java.exe attrib.exe PID 1124 wrote to memory of 1336 1124 java.exe attrib.exe PID 1124 wrote to memory of 1336 1124 java.exe attrib.exe PID 1124 wrote to memory of 860 1124 java.exe attrib.exe PID 1124 wrote to memory of 860 1124 java.exe attrib.exe PID 1124 wrote to memory of 860 1124 java.exe attrib.exe PID 1124 wrote to memory of 1176 1124 java.exe attrib.exe PID 1124 wrote to memory of 1176 1124 java.exe attrib.exe PID 1124 wrote to memory of 1176 1124 java.exe attrib.exe PID 1124 wrote to memory of 776 1124 java.exe attrib.exe PID 1124 wrote to memory of 776 1124 java.exe attrib.exe PID 1124 wrote to memory of 776 1124 java.exe attrib.exe PID 1124 wrote to memory of 332 1124 java.exe attrib.exe PID 1124 wrote to memory of 332 1124 java.exe attrib.exe PID 1124 wrote to memory of 332 1124 java.exe attrib.exe PID 1124 wrote to memory of 344 1124 java.exe cmd.exe PID 1124 wrote to memory of 344 1124 java.exe cmd.exe PID 1124 wrote to memory of 344 1124 java.exe cmd.exe PID 344 wrote to memory of 624 344 cmd.exe WMIC.exe PID 344 wrote to memory of 624 344 cmd.exe WMIC.exe PID 344 wrote to memory of 624 344 cmd.exe WMIC.exe -
Views/modifies file attributes 1 TTPs 8 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 332 attrib.exe 1104 attrib.exe 528 attrib.exe 520 attrib.exe 1336 attrib.exe 860 attrib.exe 1176 attrib.exe 776 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Rechnung.jar1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:1920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\Oracle2⤵
- Views/modifies file attributes
PID:1104
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s C:\Users\Admin\.ntusernt.ini2⤵
- Views/modifies file attributes
PID:528
-
-
C:\Windows\system32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:520
-
-
C:\Windows\system32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1336
-
-
C:\Windows\system32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:860
-
-
C:\Windows\system32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:1176
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:776
-
-
C:\Windows\system32\attrib.exeattrib +h +s +r C:\Users\Admin\gNKCW\qgTkj.class2⤵
- Views/modifies file attributes
PID:332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List3⤵PID:624
-
-