Analysis

  • max time kernel
    30s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-08-2020 09:16

General

  • Target

    Rechnung.jar

  • Size

    431KB

  • MD5

    ef2cf24398d222642a2684b6ac8731d7

  • SHA1

    7d8f0d63a27f59b481803895098bfe3049fa98c4

  • SHA256

    0d521ebb66bdf9e181c19695526645d3d003281c972591b02f8cbdfaffa94797

  • SHA512

    33619a6c10ce3d483039918749b8bc2b251f2a8b1e189b110d910829ed70c21bb420e9717a7b391ab63bb2e14d748cf03669354f3fdb002b1965ac75f274163d

Malware Config

Signatures

  • QarallaxRAT

    Qarallax is a RAT developed by Quaverse and sold as RaaS (RAT as a Service).

  • Qarallax RAT support DLL 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 120 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Views/modifies file attributes 1 TTPs 8 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Rechnung.jar
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\system32\cmd.exe
      cmd.exe
      2⤵
        PID:1636
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1684
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1164
      • C:\Windows\system32\attrib.exe
        attrib +h C:\Users\Admin\Oracle
        2⤵
        • Views/modifies file attributes
        PID:1432
      • C:\Windows\system32\attrib.exe
        attrib +h +r +s C:\Users\Admin\.ntusernt.ini
        2⤵
        • Views/modifies file attributes
        PID:1188
      • C:\Windows\system32\attrib.exe
        attrib -s -r C:\Users\Admin\gNKCW\Desktop.ini
        2⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:1412
      • C:\Windows\system32\attrib.exe
        attrib +s +r C:\Users\Admin\gNKCW\Desktop.ini
        2⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:748
      • C:\Windows\system32\attrib.exe
        attrib -s -r C:\Users\Admin\gNKCW
        2⤵
        • Views/modifies file attributes
        PID:528
      • C:\Windows\system32\attrib.exe
        attrib +s +r C:\Users\Admin\gNKCW
        2⤵
        • Views/modifies file attributes
        PID:428
      • C:\Windows\system32\attrib.exe
        attrib +h C:\Users\Admin\gNKCW
        2⤵
        • Views/modifies file attributes
        PID:916
      • C:\Windows\system32\attrib.exe
        attrib +h +s +r C:\Users\Admin\gNKCW\qgTkj.class
        2⤵
        • Views/modifies file attributes
        PID:828
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List
          3⤵
            PID:864

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads