File name:

Technische Datenblatt Maschinen 002127.jar

Full analysis: https://app.any.run/tasks/10258cb0-0d00-4791-b827-8ab01920c9e2
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: June 19, 2019, 14:17:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
qrat
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

48455C1C83B22EA704C984FC765861C0

SHA1:

7CD2DAB48D910A2BF12DD9774F7384771A8192A5

SHA256:

4F012ED5249EC1F9A0EEFBE25FDCBD6F7E1E77B261856CD04DFC1CC22953943B

SSDEEP:

3072:n0VBW4LHDFFUoSn3HTxX8Ej+IlAVbLdMhncsKwfn2G+k9D2yy63IwaW3v9:nqTLZF/Std+7VbWZAALD2Z7s3V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • QRAT was detected

      • java.exe (PID: 3412)
    • Changes the autorun value in the registry

      • reg.exe (PID: 2604)
    • Connects to CnC server

      • java.exe (PID: 3412)
  • SUSPICIOUS

    • Uses REG.EXE to modify Windows registry

      • java.exe (PID: 3412)
    • Executes JAVA applets

      • javaw.exe (PID: 2964)
    • Creates files in the user directory

      • java.exe (PID: 3412)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2019:06:04 08:30:04
ZipCRC: 0x019a07a9
ZipCompressedSize: 57
ZipUncompressedSize: 55
ZipFileName: META-INF/MANIFEST.MF
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe #QRAT java.exe reg.exe

Process information

PID
CMD
Path
Indicators
Parent process
2604reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v J165806be06f:U61646d696e_s /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe\" -jar \"C:\Users\admin\.8662562633053142852.jar\""C:\Windows\system32\reg.exe
java.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2964"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\Technische Datenblatt Maschinen 002127.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3412"C:\Program Files\Java\jre1.8.0_92\bin\java.exe" -jar C:\Users\admin\.8662562633053142852.jarC:\Program Files\Java\jre1.8.0_92\bin\java.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\java.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
15
Read events
14
Write events
1
Delete events
0

Modification events

(PID) Process:(2604) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:J165806be06f:U61646d696e_s
Value:
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\.8662562633053142852.jar"
Executable files
1
Suspicious files
62
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1lv7au1hfrmkthga5tkmvlvdkt\mj6h6lhd380ii041gkqrrikge9gekfk8arnovsgkg6lk8qtt6m0
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\vlc3arg9t0dhfo3s9e54kj5ncsj5rfpdhrqietmq5epsdorj26
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\vlc3arg9t0dhfo3s9e54kj5ncsj5rfpdhrqietmq5epsdorj26
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\vlc3arg9t0dhfo3s9e54kj5naaeom7n2on8c5ffjkjbu97656b
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\vlc3arg9t0dhfo3s9e54kj5naaeom7n2on8c5ffjkjbu97656b
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\vlc3arg9t0dhfo3s9e54kj5n9nmro124f518bbu2pap26550ki
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\vlc3arg9t0dhfo3s9e54kj5n9nmro124f518bbu2pap26550ki
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1lv7au1hfrmkthga5tkmvlvdkt\mj6h6lhd380ii041gkqrrikgednjaumaqqm1b2tken0v9kusrpi
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\i8th52nsu44hjse5vvrifp2qd1s5ed7l50f41t0qme78ncdjgk1
MD5:
SHA256:
3412java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\3df1caedqfv9505hujoku2aqlqttf9qk6bg1h80odchs1kbaarkj0npf5vvplohsct4gm3um2r4b1\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\d016pd8gle990fqjgrkst2vl9\i8th52nsu44hjse5vvrifp2qd1s5ed7l50f41t0qme78ncdjgk1
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
12
DNS requests
1
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2964
javaw.exe
GET
200
151.101.36.209:80
http://central.maven.org/maven2/org/mozilla/rhino/1.7.7.2/rhino-1.7.7.2.jar
US
compressed
1.18 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2964
javaw.exe
151.101.36.209:80
central.maven.org
Fastly
US
suspicious
3412
java.exe
195.206.106.220:4050
malicious

DNS requests

Domain
IP
Reputation
central.maven.org
  • 151.101.36.209
whitelisted

Threats

PID
Process
Class
Message
2964
javaw.exe
A Network Trojan was detected
ET INFO JAVA - Java Archive Download
3412
java.exe
A Network Trojan was detected
ET TROJAN Java/QRat Variant Checkin
3412
java.exe
A Network Trojan was detected
ET TROJAN QRat.Java.RAT Post-Checkin Request
3412
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3412
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3412
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3412
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3412
java.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] QRat.Java.RAT (state_alive)
3412
java.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] QRat.Java.RAT (state_alive)
3412
java.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] QRat.Java.RAT (state_alive)
No debug info