Analysis
-
max time kernel
76s -
max time network
136s -
platform
windows10_x64 -
resource
win10 -
submitted
31-08-2020 05:48
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.jar
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice.jar
-
Size
511KB
-
MD5
7e5b34776de19e8b482564a11d3fb699
-
SHA1
f66ae725fdb2810fa3dbf2d22bced29541d5c077
-
SHA256
4ecf27cb1628ff8ccf85facded0efd4dcc31c3fb822a23b04b8f44d2b1a2561d
-
SHA512
e1c1c7e63041b6aff959024246e84e70119c4d7953e1631f981873c07b6ff3bf6527006b637f11f2b5746c96417c1c6272dcb9ec911073bc1cf8fbde4a1201b8
Score
10/10
Malware Config
Signatures
-
Qarallax RAT support DLL 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\RdTdBwdIih9031915936360174939.xml qarallax_dll -
Loads dropped DLL 1 IoCs
Processes:
java.exepid process 3788 java.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
java.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run java.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\koNVrQY = "\"C:\\Users\\Admin\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\gNKCW\\qgTkj.class\"" java.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce java.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
java.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Users\Admin\gNKCW\Desktop.ini java.exe File created C:\Users\Admin\gNKCW\Desktop.ini java.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe File opened for modification C:\Users\Admin\gNKCW\Desktop.ini attrib.exe -
Drops file in System32 directory 2 IoCs
Processes:
java.exedescription ioc process File created C:\Windows\System32\ONvaG java.exe File opened for modification C:\Windows\System32\ONvaG java.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 97b886ce5a7fd601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Suspicious use of AdjustPrivilegeToken 128 IoCs
Processes:
svchost.exeWMIC.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 3824 svchost.exe Token: SeCreatePagefilePrivilege 3824 svchost.exe Token: SeIncreaseQuotaPrivilege 852 WMIC.exe Token: SeSecurityPrivilege 852 WMIC.exe Token: SeTakeOwnershipPrivilege 852 WMIC.exe Token: SeLoadDriverPrivilege 852 WMIC.exe Token: SeSystemProfilePrivilege 852 WMIC.exe Token: SeSystemtimePrivilege 852 WMIC.exe Token: SeProfSingleProcessPrivilege 852 WMIC.exe Token: SeIncBasePriorityPrivilege 852 WMIC.exe Token: SeCreatePagefilePrivilege 852 WMIC.exe Token: SeBackupPrivilege 852 WMIC.exe Token: SeRestorePrivilege 852 WMIC.exe Token: SeShutdownPrivilege 852 WMIC.exe Token: SeDebugPrivilege 852 WMIC.exe Token: SeSystemEnvironmentPrivilege 852 WMIC.exe Token: SeRemoteShutdownPrivilege 852 WMIC.exe Token: SeUndockPrivilege 852 WMIC.exe Token: SeManageVolumePrivilege 852 WMIC.exe Token: 33 852 WMIC.exe Token: 34 852 WMIC.exe Token: 35 852 WMIC.exe Token: 36 852 WMIC.exe Token: SeIncreaseQuotaPrivilege 852 WMIC.exe Token: SeSecurityPrivilege 852 WMIC.exe Token: SeTakeOwnershipPrivilege 852 WMIC.exe Token: SeLoadDriverPrivilege 852 WMIC.exe Token: SeSystemProfilePrivilege 852 WMIC.exe Token: SeSystemtimePrivilege 852 WMIC.exe Token: SeProfSingleProcessPrivilege 852 WMIC.exe Token: SeIncBasePriorityPrivilege 852 WMIC.exe Token: SeCreatePagefilePrivilege 852 WMIC.exe Token: SeBackupPrivilege 852 WMIC.exe Token: SeRestorePrivilege 852 WMIC.exe Token: SeShutdownPrivilege 852 WMIC.exe Token: SeDebugPrivilege 852 WMIC.exe Token: SeSystemEnvironmentPrivilege 852 WMIC.exe Token: SeRemoteShutdownPrivilege 852 WMIC.exe Token: SeUndockPrivilege 852 WMIC.exe Token: SeManageVolumePrivilege 852 WMIC.exe Token: 33 852 WMIC.exe Token: 34 852 WMIC.exe Token: 35 852 WMIC.exe Token: 36 852 WMIC.exe Token: SeIncreaseQuotaPrivilege 1476 WMIC.exe Token: SeSecurityPrivilege 1476 WMIC.exe Token: SeTakeOwnershipPrivilege 1476 WMIC.exe Token: SeLoadDriverPrivilege 1476 WMIC.exe Token: SeSystemProfilePrivilege 1476 WMIC.exe Token: SeSystemtimePrivilege 1476 WMIC.exe Token: SeProfSingleProcessPrivilege 1476 WMIC.exe Token: SeIncBasePriorityPrivilege 1476 WMIC.exe Token: SeCreatePagefilePrivilege 1476 WMIC.exe Token: SeBackupPrivilege 1476 WMIC.exe Token: SeRestorePrivilege 1476 WMIC.exe Token: SeShutdownPrivilege 1476 WMIC.exe Token: SeDebugPrivilege 1476 WMIC.exe Token: SeSystemEnvironmentPrivilege 1476 WMIC.exe Token: SeRemoteShutdownPrivilege 1476 WMIC.exe Token: SeUndockPrivilege 1476 WMIC.exe Token: SeManageVolumePrivilege 1476 WMIC.exe Token: 33 1476 WMIC.exe Token: 34 1476 WMIC.exe Token: 35 1476 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 3788 java.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
java.execmd.execmd.execmd.exedescription pid process target process PID 3788 wrote to memory of 948 3788 java.exe cmd.exe PID 3788 wrote to memory of 948 3788 java.exe cmd.exe PID 3788 wrote to memory of 4092 3788 java.exe cmd.exe PID 3788 wrote to memory of 4092 3788 java.exe cmd.exe PID 4092 wrote to memory of 852 4092 cmd.exe WMIC.exe PID 4092 wrote to memory of 852 4092 cmd.exe WMIC.exe PID 3788 wrote to memory of 1076 3788 java.exe cmd.exe PID 3788 wrote to memory of 1076 3788 java.exe cmd.exe PID 1076 wrote to memory of 1476 1076 cmd.exe WMIC.exe PID 1076 wrote to memory of 1476 1076 cmd.exe WMIC.exe PID 3788 wrote to memory of 1796 3788 java.exe attrib.exe PID 3788 wrote to memory of 1796 3788 java.exe attrib.exe PID 3788 wrote to memory of 2572 3788 java.exe attrib.exe PID 3788 wrote to memory of 2572 3788 java.exe attrib.exe PID 3788 wrote to memory of 3452 3788 java.exe attrib.exe PID 3788 wrote to memory of 3452 3788 java.exe attrib.exe PID 3788 wrote to memory of 1004 3788 java.exe attrib.exe PID 3788 wrote to memory of 1004 3788 java.exe attrib.exe PID 3788 wrote to memory of 1972 3788 java.exe attrib.exe PID 3788 wrote to memory of 1972 3788 java.exe attrib.exe PID 3788 wrote to memory of 1276 3788 java.exe attrib.exe PID 3788 wrote to memory of 1276 3788 java.exe attrib.exe PID 3788 wrote to memory of 904 3788 java.exe attrib.exe PID 3788 wrote to memory of 904 3788 java.exe attrib.exe PID 3788 wrote to memory of 852 3788 java.exe attrib.exe PID 3788 wrote to memory of 852 3788 java.exe attrib.exe PID 3788 wrote to memory of 2352 3788 java.exe cmd.exe PID 3788 wrote to memory of 2352 3788 java.exe cmd.exe PID 2352 wrote to memory of 2840 2352 cmd.exe WMIC.exe PID 2352 wrote to memory of 2840 2352 cmd.exe WMIC.exe -
Views/modifies file attributes 1 TTPs 8 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 904 attrib.exe 852 attrib.exe 1796 attrib.exe 2572 attrib.exe 3452 attrib.exe 1004 attrib.exe 1972 attrib.exe 1276 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Invoice.jar1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵PID:948
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h C:\Users\Admin\Oracle2⤵
- Views/modifies file attributes
PID:1796
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h +r +s C:\Users\Admin\.ntusernt.ini2⤵
- Views/modifies file attributes
PID:2572
-
-
C:\Windows\SYSTEM32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:3452
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW\Desktop.ini2⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:1004
-
-
C:\Windows\SYSTEM32\attrib.exeattrib -s -r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:1972
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +s +r C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:1276
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h C:\Users\Admin\gNKCW2⤵
- Views/modifies file attributes
PID:904
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +h +s +r C:\Users\Admin\gNKCW\qgTkj.class2⤵
- Views/modifies file attributes
PID:852
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\cimv2 Path Win32_PnpSignedDriver Get /Format:List3⤵PID:2840
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3824