Analysis

  • max time kernel
    75s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    31-08-2020 09:16

General

  • Target

    Rechnung.jar

  • Size

    431KB

  • MD5

    ef2cf24398d222642a2684b6ac8731d7

  • SHA1

    7d8f0d63a27f59b481803895098bfe3049fa98c4

  • SHA256

    0d521ebb66bdf9e181c19695526645d3d003281c972591b02f8cbdfaffa94797

  • SHA512

    33619a6c10ce3d483039918749b8bc2b251f2a8b1e189b110d910829ed70c21bb420e9717a7b391ab63bb2e14d748cf03669354f3fdb002b1965ac75f274163d

Malware Config

Signatures

  • QarallaxRAT

    Qarallax is a RAT developed by Quaverse and sold as RaaS (RAT as a Service).

  • Qarallax RAT support DLL 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 128 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Views/modifies file attributes 1 TTPs 8 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Rechnung.jar
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe
      2⤵
        PID:1424
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2412
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:348
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +h C:\Users\Admin\Oracle
        2⤵
        • Views/modifies file attributes
        PID:1512
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +h +r +s C:\Users\Admin\.ntusernt.ini
        2⤵
        • Views/modifies file attributes
        PID:2492
      • C:\Windows\SYSTEM32\attrib.exe
        attrib -s -r C:\Users\Admin\gNKCW\Desktop.ini
        2⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2684
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +s +r C:\Users\Admin\gNKCW\Desktop.ini
        2⤵
        • Drops desktop.ini file(s)
        • Views/modifies file attributes
        PID:2836
      • C:\Windows\SYSTEM32\attrib.exe
        attrib -s -r C:\Users\Admin\gNKCW
        2⤵
        • Views/modifies file attributes
        PID:2104
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +s +r C:\Users\Admin\gNKCW
        2⤵
        • Views/modifies file attributes
        PID:3632
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +h C:\Users\Admin\gNKCW
        2⤵
        • Views/modifies file attributes
        PID:2108
      • C:\Windows\SYSTEM32\attrib.exe
        attrib +h +s +r C:\Users\Admin\gNKCW\qgTkj.class
        2⤵
        • Views/modifies file attributes
        PID:3800
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List
          3⤵
            PID:2228
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:3432

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\.ntusernt.ini

      • C:\Users\Admin\gNKCW\Desktop.ini

      • C:\Users\Admin\gNKCW\qgTkj.class

      • \Users\Admin\AppData\Local\Temp\hnycCntwqK1098552550132843486.xml

      • memory/348-56-0x0000000000000000-mapping.dmp

      • memory/1268-53-0x0000000000000000-mapping.dmp

      • memory/1276-55-0x0000000000000000-mapping.dmp

      • memory/1424-52-0x0000000000000000-mapping.dmp

      • memory/1512-59-0x0000000000000000-mapping.dmp

      • memory/2104-67-0x0000000000000000-mapping.dmp

      • memory/2108-69-0x0000000000000000-mapping.dmp

      • memory/2228-74-0x0000000000000000-mapping.dmp

      • memory/2264-73-0x0000000000000000-mapping.dmp

      • memory/2412-54-0x0000000000000000-mapping.dmp

      • memory/2492-61-0x0000000000000000-mapping.dmp

      • memory/2684-65-0x0000000000000000-mapping.dmp

      • memory/2836-66-0x0000000000000000-mapping.dmp

      • memory/3632-68-0x0000000000000000-mapping.dmp

      • memory/3800-70-0x0000000000000000-mapping.dmp