Analysis
-
max time kernel
31s -
max time network
147s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
31-08-2020 05:48
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.jar
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice.jar
-
Size
511KB
-
MD5
7e5b34776de19e8b482564a11d3fb699
-
SHA1
f66ae725fdb2810fa3dbf2d22bced29541d5c077
-
SHA256
4ecf27cb1628ff8ccf85facded0efd4dcc31c3fb822a23b04b8f44d2b1a2561d
-
SHA512
e1c1c7e63041b6aff959024246e84e70119c4d7953e1631f981873c07b6ff3bf6527006b637f11f2b5746c96417c1c6272dcb9ec911073bc1cf8fbde4a1201b8
Score
10/10
Malware Config
Signatures
-
Qarallax RAT support DLL 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\XdZnVvtcNT4569942217149019813.xml qarallax_dll -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 604 java.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
java.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
java.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Users\Admin\gNKCW\Desktop.ini java.exe File created C:\Users\Admin\gNKCW\Desktop.ini java.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe -
Drops file in System32 directory 2 IoCs
Processes:
java.exedescription ioc process File created C:\Windows\System32\OZeQu java.exe File opened for modification C:\Windows\System32\OZeQu java.exe -
Suspicious use of AdjustPrivilegeToken 120 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 1632 WMIC.exe Token: SeSecurityPrivilege 1632 WMIC.exe Token: SeTakeOwnershipPrivilege 1632 WMIC.exe Token: SeLoadDriverPrivilege 1632 WMIC.exe Token: SeSystemProfilePrivilege 1632 WMIC.exe Token: SeSystemtimePrivilege 1632 WMIC.exe Token: SeProfSingleProcessPrivilege 1632 WMIC.exe Token: SeIncBasePriorityPrivilege 1632 WMIC.exe Token: SeCreatePagefilePrivilege 1632 WMIC.exe Token: SeBackupPrivilege 1632 WMIC.exe Token: SeRestorePrivilege 1632 WMIC.exe Token: SeShutdownPrivilege 1632 WMIC.exe Token: SeDebugPrivilege 1632 WMIC.exe Token: SeSystemEnvironmentPrivilege 1632 WMIC.exe Token: SeRemoteShutdownPrivilege 1632 WMIC.exe Token: SeUndockPrivilege 1632 WMIC.exe Token: SeManageVolumePrivilege 1632 WMIC.exe Token: 33 1632 WMIC.exe Token: 34 1632 WMIC.exe Token: 35 1632 WMIC.exe Token: SeIncreaseQuotaPrivilege 1632 WMIC.exe Token: SeSecurityPrivilege 1632 WMIC.exe Token: SeTakeOwnershipPrivilege 1632 WMIC.exe Token: SeLoadDriverPrivilege 1632 WMIC.exe Token: SeSystemProfilePrivilege 1632 WMIC.exe Token: SeSystemtimePrivilege 1632 WMIC.exe Token: SeProfSingleProcessPrivilege 1632 WMIC.exe Token: SeIncBasePriorityPrivilege 1632 WMIC.exe Token: SeCreatePagefilePrivilege 1632 WMIC.exe Token: SeBackupPrivilege 1632 WMIC.exe Token: SeRestorePrivilege 1632 WMIC.exe Token: SeShutdownPrivilege 1632 WMIC.exe Token: SeDebugPrivilege 1632 WMIC.exe Token: SeSystemEnvironmentPrivilege 1632 WMIC.exe Token: SeRemoteShutdownPrivilege 1632 WMIC.exe Token: SeUndockPrivilege 1632 WMIC.exe Token: SeManageVolumePrivilege 1632 WMIC.exe Token: 33 1632 WMIC.exe Token: 34 1632 WMIC.exe Token: 35 1632 WMIC.exe Token: SeIncreaseQuotaPrivilege 1920 WMIC.exe Token: SeSecurityPrivilege 1920 WMIC.exe Token: SeTakeOwnershipPrivilege 1920 WMIC.exe Token: SeLoadDriverPrivilege 1920 WMIC.exe Token: SeSystemProfilePrivilege 1920 WMIC.exe Token: SeSystemtimePrivilege 1920 WMIC.exe Token: SeProfSingleProcessPrivilege 1920 WMIC.exe Token: SeIncBasePriorityPrivilege 1920 WMIC.exe Token: SeCreatePagefilePrivilege 1920 WMIC.exe Token: SeBackupPrivilege 1920 WMIC.exe Token: SeRestorePrivilege 1920 WMIC.exe Token: SeShutdownPrivilege 1920 WMIC.exe Token: SeDebugPrivilege 1920 WMIC.exe Token: SeSystemEnvironmentPrivilege 1920 WMIC.exe Token: SeRemoteShutdownPrivilege 1920 WMIC.exe Token: SeUndockPrivilege 1920 WMIC.exe Token: SeManageVolumePrivilege 1920 WMIC.exe Token: 33 1920 WMIC.exe Token: 34 1920 WMIC.exe Token: 35 1920 WMIC.exe Token: SeIncreaseQuotaPrivilege 1920 WMIC.exe Token: SeSecurityPrivilege 1920 WMIC.exe Token: SeTakeOwnershipPrivilege 1920 WMIC.exe Token: SeLoadDriverPrivilege 1920 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 604 java.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
java.execmd.execmd.execmd.exedescription pid process target process PID 604 wrote to memory of 1596 604 java.exe cmd.exe PID 604 wrote to memory of 1596 604 java.exe cmd.exe PID 604 wrote to memory of 1596 604 java.exe cmd.exe PID 604 wrote to memory of 1592 604 java.exe cmd.exe PID 604 wrote to memory of 1592 604 java.exe cmd.exe PID 604 wrote to memory of 1592 604 java.exe cmd.exe PID 1592 wrote to memory of 1632 1592 cmd.exe WMIC.exe PID 1592 wrote to memory of 1632 1592 cmd.exe WMIC.exe PID 1592 wrote to memory of 1632 1592 cmd.exe WMIC.exe PID 604 wrote to memory of 1924 604 java.exe cmd.exe PID 604 wrote to memory of 1924 604 java.exe cmd.exe PID 604 wrote to memory of 1924 604 java.exe cmd.exe PID 1924 wrote to memory of 1920 1924 cmd.exe WMIC.exe PID 1924 wrote to memory of 1920 1924 cmd.exe WMIC.exe PID 1924 wrote to memory of 1920 1924 cmd.exe WMIC.exe PID 604 wrote to memory of 1992 604 java.exe attrib.exe PID 604 wrote to memory of 1992 604 java.exe attrib.exe PID 604 wrote to memory of 1992 604 java.exe attrib.exe PID 604 wrote to memory of 1944 604 java.exe attrib.exe PID 604 wrote to memory of 1944 604 java.exe attrib.exe PID 604 wrote to memory of 1944 604 java.exe attrib.exe PID 604 wrote to memory of 2032 604 java.exe attrib.exe PID 604 wrote to memory of 2032 604 java.exe attrib.exe PID 604 wrote to memory of 2032 604 java.exe attrib.exe PID 604 wrote to memory of 1128 604 java.exe attrib.exe PID 604 wrote to memory of 1128 604 java.exe attrib.exe PID 604 wrote to memory of 1128 604 java.exe attrib.exe PID 604 wrote to memory of 1080 604 java.exe attrib.exe PID 604 wrote to memory of 1080 604 java.exe attrib.exe PID 604 wrote to memory of 1080 604 java.exe attrib.exe PID 604 wrote to memory of 428 604 java.exe attrib.exe PID 604 wrote to memory of 428 604 java.exe attrib.exe PID 604 wrote to memory of 428 604 java.exe attrib.exe PID 604 wrote to memory of 1316 604 java.exe attrib.exe PID 604 wrote to memory of 1316 604 java.exe attrib.exe PID 604 wrote to memory of 1316 604 java.exe attrib.exe PID 604 wrote to memory of 1848 604 java.exe attrib.exe PID 604 wrote to memory of 1848 604 java.exe attrib.exe PID 604 wrote to memory of 1848 604 java.exe attrib.exe PID 604 wrote to memory of 804 604 java.exe cmd.exe PID 604 wrote to memory of 804 604 java.exe cmd.exe PID 604 wrote to memory of 804 604 java.exe cmd.exe PID 804 wrote to memory of 908 804 cmd.exe WMIC.exe PID 804 wrote to memory of 908 804 cmd.exe WMIC.exe PID 804 wrote to memory of 908 804 cmd.exe WMIC.exe -
Views/modifies file attributes 1 TTPs 8 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 428 attrib.exe 1316 attrib.exe 1848 attrib.exe 1992 attrib.exe 1944 attrib.exe 2032 attrib.exe 1128 attrib.exe 1080 attrib.exe
Processes
-
C:\Windows\system32\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Invoice.jar1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:1596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\Oracle2⤵
- Views/modifies file attributes
PID:1992
-
-
C:\Windows\system32\attrib.exeattrib +h +r +s C:\Users\Admin\.ntusernt.ini2⤵
- Views/modifies file attributes
PID:1944
-
-
C:\Windows\system32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:2032
-
-
C:\Windows\system32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1128
-
-
C:\Windows\system32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:1080
-
-
C:\Windows\system32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:428
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:1316
-
-
C:\Windows\system32\attrib.exeattrib +h +s +r C:\Users\Admin\gNKCW\qgTkj.class2⤵
- Views/modifies file attributes
PID:1848
-
-
C:\Windows\system32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List3⤵PID:908
-
-