analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

new order.jar

Full analysis: https://app.any.run/tasks/ed7fd1c6-89e1-4ab0-a664-d372ee68ac05
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: June 19, 2019, 14:04:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
qrat
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

6ABA213C9249B3F6B0F1F096459FBBAC

SHA1:

010363978A854792ABA3A6D29EED678D2AF42A20

SHA256:

CE5CD2C7B58E97A1353F09EEB2BE55DAE72CAD4BF3EEF08DB135584BDAD019DC

SSDEEP:

3072:40bg1cUgs7ilZC2YI7b2wqjkL7vJ1+guFJZ+0UMVP5G0581QIj4iV9sD:4G0c7Dx7ywqjk3Jgh2MVDAhK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • reg.exe (PID: 3808)
    • QRAT was detected

      • java.exe (PID: 3080)
    • Connects to CnC server

      • java.exe (PID: 3080)
  • SUSPICIOUS

    • Executes JAVA applets

      • javaw.exe (PID: 908)
    • Uses REG.EXE to modify Windows registry

      • java.exe (PID: 3080)
    • Creates files in the user directory

      • java.exe (PID: 3080)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2019:06:18 12:25:28
ZipCRC: 0x92ba582a
ZipCompressedSize: 52
ZipUncompressedSize: 50
ZipFileName: META-INF/MANIFEST.MF
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe #QRAT java.exe reg.exe

Process information

PID
CMD
Path
Indicators
Parent process
908"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\new order.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
3080"C:\Program Files\Java\jre1.8.0_92\bin\java.exe" -jar C:\Users\admin\.8662562633053142852.jarC:\Program Files\Java\jre1.8.0_92\bin\java.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.920.14
3808reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v J165806be06f:U61646d696e_s /t REG_SZ /d "\"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe\" -jar \"C:\Users\admin\.8662562633053142852.jar\""C:\Windows\system32\reg.exe
java.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
15
Read events
14
Write events
1
Delete events
0

Modification events

(PID) Process:(3808) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:J165806be06f:U61646d696e_s
Value:
"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\.8662562633053142852.jar"
Executable files
1
Suspicious files
60
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1lv7au1hfrmkthga5tkmvlvdkt\mj6h6lhd380ii041gkqrrikge9gekfk8arnovsgkg6lk8qtt6m0
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\80f85ngtafgsu1mp3laqa0co5r493s0vcnmak8nh9nf4qsuo9kt
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\80f85ngtafgsu1mp3laqa0co5r493s0vcnmak8nh9nf4qsuo9kt
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1lv7au1hfrmkthga5tkmvlvdkt\mj6h6lhd380ii041gkqrrikgednjaumaqqm1b2tken0v9kusrpi
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\32k9vg2l8tp8mm8qkbqiqi2t53\3q2on6b7u1a28mvesvkrp86dv22pi06dkoejcghiiunefks66ck
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\32k9vg2l8tp8mm8qkbqiqi2t53\3q2on6b7u1a28mvesvkrp86dv22pi06dkoejcghiiunefks66ck
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\2a84359h7v9mu5n2g2e8hentgr70pe0vuoe8np09b079e0gt7ghif3dmmsdju9nlguoq2egcg7g1j
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\2a84359h7v9mu5n2g2e8hentgr70pe0vuoe8np09b079e0gt7ghif3dmmsdju9nlguoq2egcg7g1j
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g3ep4g7vuah4dqbutl1jfcanl3d4\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\990gcl64vt6romsa09p25qvm3ctt0vpga64rrhuih2f6gb51bdp
MD5:
SHA256:
3080java.exeC:\Users\admin\7gdsqq65r8vq4\1apvog2n679l0dniu574msal1q\1r5g37gm7a2p1cd4j44ipv13grl8o5l4nr5hshl1jpu7s6hoh0icv86gq006a7e3j2rf9s19t4rkv\9emfcfrjejb51f3q2ttq3n8g38fbhjbebt0nhbnkobhtt5qgoj8\7csirq9bij3sefke9et9ddauk\27p47dvcd24tqaat0pjudqjo9s\314qnvrrmvpv9qdh42a8c6svf4\1u1v5du03jtjpudq8sfvbohv04\37j9ved98s558g3gb0u6qital6\990gcl64vt6romsa09p25qvm3ctt0vpga64rrhuih2f6gb51bdp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
137.74.152.239:4040
OVH SAS
FR
malicious
3080
java.exe
137.74.152.239:4040
OVH SAS
FR
malicious
908
javaw.exe
151.101.36.209:80
central.maven.org
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
central.maven.org
  • 151.101.36.209
whitelisted

Threats

PID
Process
Class
Message
908
javaw.exe
A Network Trojan was detected
ET INFO JAVA - Java Archive Download
3080
java.exe
A Network Trojan was detected
ET TROJAN Java/QRat Variant Checkin
3080
java.exe
A Network Trojan was detected
ET TROJAN QRat.Java.RAT Post-Checkin Request
3080
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3080
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3080
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3080
java.exe
A Network Trojan was detected
MALWARE [PTsecurity] QRat.Java.RAT (command_start)
3080
java.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] QRat.Java.RAT (state_alive)
3080
java.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] QRat.Java.RAT (state_alive)
3080
java.exe
A Network Trojan was detected
ET TROJAN QRat.Java.RAT Checkin Response
No debug info