analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Transaction_not_received_pdf.jar

Full analysis: https://app.any.run/tasks/10277d0e-9ec6-414d-9524-61b3647ded1d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: December 06, 2018, 15:08:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
qarallax
qrat
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

6882BD6084CB142AAA6998966D0608E8

SHA1:

609F8844169826C6B79C6433C48B5F172022D2FE

SHA256:

60114491C2EDCD7890EEF9EEE803C5AAEEA154B6760784EA683C07B88E48B500

SSDEEP:

1536:bZIAUmbjX+LTza2Q3pBooOLcSmckgC2usNpe:bZIANWSNLoHLc16lNpe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • javaw.exe (PID: 2724)
    • Changes the autorun value in the registry

      • REG.exe (PID: 2664)
    • QRAT was detected

      • javaw.exe (PID: 2724)
  • SUSPICIOUS

    • Application launched itself

      • javaw.exe (PID: 2952)
    • Executes JAVA applets

      • javaw.exe (PID: 2952)
    • Connects to unusual port

      • javaw.exe (PID: 2724)
    • Creates files in the user directory

      • javaw.exe (PID: 2952)
    • Uses REG.EXE to modify Windows registry

      • javaw.exe (PID: 2952)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.jar | Java Archive (78.3)
.zip | ZIP compressed archive (21.6)

EXIF

ZIP

ZipFileName: lngg/
ZipUncompressedSize: -
ZipCompressedSize: 2
ZipCRC: 0x00000000
ZipModifyDate: 2018:12:05 23:43:07
ZipCompression: Deflated
ZipBitFlag: 0x0808
ZipRequiredVersion: 20
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe no specs reg.exe #QRAT javaw.exe

Process information

PID
CMD
Path
Indicators
Parent process
2952"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\Transaction_not_received_pdf.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
2664REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v ofv /d "\"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe\" -jar \"C:\Users\admin\AppData\Roaming\ofv.jar\"" /fC:\Windows\system32\REG.exe
javaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2724"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar C:\Users\admin\AppData\Roaming\ofv.jarC:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
Total events
9
Read events
7
Write events
2
Delete events
0

Modification events

(PID) Process:(2664) REG.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:ofv
Value:
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Roaming\ofv.jar"
(PID) Process:(2724) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
Executable files
0
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2952javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:4537328C7103FCD9EF93ABFD13D17C32
SHA256:F3A7AA6B207E1B48ADC329DB4A871E6C4DA39DA91B208272B345041F7E05F33E
2952javaw.exeC:\Users\admin\AppData\Roaming\ofv.jarcompressed
MD5:6882BD6084CB142AAA6998966D0608E8
SHA256:60114491C2EDCD7890EEF9EEE803C5AAEEA154B6760784EA683C07B88E48B500
2724javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:122F2F3791E665FC230512A1BEA7160C
SHA256:BAF8F9AA1297F48062BE81D6E32B189E1D2D0A0F635EEEF81FE1FCA9598E6454
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2724
javaw.exe
64.71.72.185:9090
prototypeooi.gotdns.ch
Cloud South
US
malicious

DNS requests

Domain
IP
Reputation
prototypeooi.gotdns.ch
  • 64.71.72.185
malicious

Threats

PID
Process
Class
Message
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT CnC Init Activity
2724
javaw.exe
A Network Trojan was detected
MALWARE [PTsecurity] Java RAT Maljava Check-in
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT CnC Checkin
2724
javaw.exe
A Network Trojan was detected
SC BAD_UNKNOWN Trojan Unknown Java
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT CnC Checkin
2724
javaw.exe
A Network Trojan was detected
SC BAD_UNKNOWN Trojan Unknown Java
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT Keep-Alive (inbound)
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT Keep-Alive (inbound)
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT Keep-Alive (inbound)
2724
javaw.exe
A Network Trojan was detected
ET TROJAN JavaRAT Keep-Alive (inbound)
1 ETPRO signatures available at the full report
No debug info