Analysis
-
max time kernel
75s -
max time network
135s -
platform
windows10_x64 -
resource
win10 -
submitted
31-08-2020 09:16
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung.jar
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Rechnung.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Rechnung.jar
-
Size
431KB
-
MD5
ef2cf24398d222642a2684b6ac8731d7
-
SHA1
7d8f0d63a27f59b481803895098bfe3049fa98c4
-
SHA256
0d521ebb66bdf9e181c19695526645d3d003281c972591b02f8cbdfaffa94797
-
SHA512
33619a6c10ce3d483039918749b8bc2b251f2a8b1e189b110d910829ed70c21bb420e9717a7b391ab63bb2e14d748cf03669354f3fdb002b1965ac75f274163d
Score
10/10
Malware Config
Signatures
-
Qarallax RAT support DLL 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\hnycCntwqK1098552550132843486.xml qarallax_dll -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 2728 java.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
java.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Users\Admin\gNKCW\Desktop.ini java.exe File created C:\Users\Admin\gNKCW\Desktop.ini java.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe -
Drops file in System32 directory 2 IoCs
Processes:
java.exedescription ioc process File opened for modification C:\Windows\System32\rVbiF java.exe File created C:\Windows\System32\rVbiF java.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = c441e7dd777fd601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe -
Suspicious use of AdjustPrivilegeToken 128 IoCs
Processes:
svchost.exeWMIC.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 3432 svchost.exe Token: SeCreatePagefilePrivilege 3432 svchost.exe Token: SeIncreaseQuotaPrivilege 2412 WMIC.exe Token: SeSecurityPrivilege 2412 WMIC.exe Token: SeTakeOwnershipPrivilege 2412 WMIC.exe Token: SeLoadDriverPrivilege 2412 WMIC.exe Token: SeSystemProfilePrivilege 2412 WMIC.exe Token: SeSystemtimePrivilege 2412 WMIC.exe Token: SeProfSingleProcessPrivilege 2412 WMIC.exe Token: SeIncBasePriorityPrivilege 2412 WMIC.exe Token: SeCreatePagefilePrivilege 2412 WMIC.exe Token: SeBackupPrivilege 2412 WMIC.exe Token: SeRestorePrivilege 2412 WMIC.exe Token: SeShutdownPrivilege 2412 WMIC.exe Token: SeDebugPrivilege 2412 WMIC.exe Token: SeSystemEnvironmentPrivilege 2412 WMIC.exe Token: SeRemoteShutdownPrivilege 2412 WMIC.exe Token: SeUndockPrivilege 2412 WMIC.exe Token: SeManageVolumePrivilege 2412 WMIC.exe Token: 33 2412 WMIC.exe Token: 34 2412 WMIC.exe Token: 35 2412 WMIC.exe Token: 36 2412 WMIC.exe Token: SeIncreaseQuotaPrivilege 2412 WMIC.exe Token: SeSecurityPrivilege 2412 WMIC.exe Token: SeTakeOwnershipPrivilege 2412 WMIC.exe Token: SeLoadDriverPrivilege 2412 WMIC.exe Token: SeSystemProfilePrivilege 2412 WMIC.exe Token: SeSystemtimePrivilege 2412 WMIC.exe Token: SeProfSingleProcessPrivilege 2412 WMIC.exe Token: SeIncBasePriorityPrivilege 2412 WMIC.exe Token: SeCreatePagefilePrivilege 2412 WMIC.exe Token: SeBackupPrivilege 2412 WMIC.exe Token: SeRestorePrivilege 2412 WMIC.exe Token: SeShutdownPrivilege 2412 WMIC.exe Token: SeDebugPrivilege 2412 WMIC.exe Token: SeSystemEnvironmentPrivilege 2412 WMIC.exe Token: SeRemoteShutdownPrivilege 2412 WMIC.exe Token: SeUndockPrivilege 2412 WMIC.exe Token: SeManageVolumePrivilege 2412 WMIC.exe Token: 33 2412 WMIC.exe Token: 34 2412 WMIC.exe Token: 35 2412 WMIC.exe Token: 36 2412 WMIC.exe Token: SeIncreaseQuotaPrivilege 348 WMIC.exe Token: SeSecurityPrivilege 348 WMIC.exe Token: SeTakeOwnershipPrivilege 348 WMIC.exe Token: SeLoadDriverPrivilege 348 WMIC.exe Token: SeSystemProfilePrivilege 348 WMIC.exe Token: SeSystemtimePrivilege 348 WMIC.exe Token: SeProfSingleProcessPrivilege 348 WMIC.exe Token: SeIncBasePriorityPrivilege 348 WMIC.exe Token: SeCreatePagefilePrivilege 348 WMIC.exe Token: SeBackupPrivilege 348 WMIC.exe Token: SeRestorePrivilege 348 WMIC.exe Token: SeShutdownPrivilege 348 WMIC.exe Token: SeDebugPrivilege 348 WMIC.exe Token: SeSystemEnvironmentPrivilege 348 WMIC.exe Token: SeRemoteShutdownPrivilege 348 WMIC.exe Token: SeUndockPrivilege 348 WMIC.exe Token: SeManageVolumePrivilege 348 WMIC.exe Token: 33 348 WMIC.exe Token: 34 348 WMIC.exe Token: 35 348 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 2728 java.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
java.execmd.execmd.execmd.exedescription pid process target process PID 2728 wrote to memory of 1424 2728 java.exe cmd.exe PID 2728 wrote to memory of 1424 2728 java.exe cmd.exe PID 2728 wrote to memory of 1268 2728 java.exe cmd.exe PID 2728 wrote to memory of 1268 2728 java.exe cmd.exe PID 1268 wrote to memory of 2412 1268 cmd.exe WMIC.exe PID 1268 wrote to memory of 2412 1268 cmd.exe WMIC.exe PID 2728 wrote to memory of 1276 2728 java.exe cmd.exe PID 2728 wrote to memory of 1276 2728 java.exe cmd.exe PID 1276 wrote to memory of 348 1276 cmd.exe WMIC.exe PID 1276 wrote to memory of 348 1276 cmd.exe WMIC.exe PID 2728 wrote to memory of 1512 2728 java.exe attrib.exe PID 2728 wrote to memory of 1512 2728 java.exe attrib.exe PID 2728 wrote to memory of 2492 2728 java.exe attrib.exe PID 2728 wrote to memory of 2492 2728 java.exe attrib.exe PID 2728 wrote to memory of 2684 2728 java.exe attrib.exe PID 2728 wrote to memory of 2684 2728 java.exe attrib.exe PID 2728 wrote to memory of 2836 2728 java.exe attrib.exe PID 2728 wrote to memory of 2836 2728 java.exe attrib.exe PID 2728 wrote to memory of 2104 2728 java.exe attrib.exe PID 2728 wrote to memory of 2104 2728 java.exe attrib.exe PID 2728 wrote to memory of 3632 2728 java.exe attrib.exe PID 2728 wrote to memory of 3632 2728 java.exe attrib.exe PID 2728 wrote to memory of 2108 2728 java.exe attrib.exe PID 2728 wrote to memory of 2108 2728 java.exe attrib.exe PID 2728 wrote to memory of 3800 2728 java.exe attrib.exe PID 2728 wrote to memory of 3800 2728 java.exe attrib.exe PID 2728 wrote to memory of 2264 2728 java.exe cmd.exe PID 2728 wrote to memory of 2264 2728 java.exe cmd.exe PID 2264 wrote to memory of 2228 2264 cmd.exe WMIC.exe PID 2264 wrote to memory of 2228 2264 cmd.exe WMIC.exe -
Views/modifies file attributes 1 TTPs 8 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2684 attrib.exe 2836 attrib.exe 2104 attrib.exe 3632 attrib.exe 2108 attrib.exe 3800 attrib.exe 1512 attrib.exe 2492 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Rechnung.jar1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵PID:1424
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h C:\Users\Admin\Oracle2⤵
- Views/modifies file attributes
PID:1512
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h +r +s C:\Users\Admin\.ntusernt.ini2⤵
- Views/modifies file attributes
PID:2492
-
-
C:\Windows\SYSTEM32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2684
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2836
-
-
C:\Windows\SYSTEM32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:2104
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:3632
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:2108
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h +s +r C:\Users\Admin\gNKCW\qgTkj.class2⤵
- Views/modifies file attributes
PID:3800
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List3⤵PID:2228
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3432