Analysis

  • max time kernel
    74s
  • max time network
    96s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 14:19

General

  • Target

    cid_5B9CEC37-5A8C-4D4C-A085-A20165C7A6A5.PDF.jar

  • Size

    98KB

  • MD5

    84fb8e3cbbb90fb05533a07b63d3136e

  • SHA1

    3914d74544c66b94379e4fc7f9d56f651146fd69

  • SHA256

    8d59383c5423640a6c9d8431c0d455b80db61186296f7c0a4946062e05908e59

  • SHA512

    ac4240aa9016efc34a289538795bdabe09a53f9199f8d8986c219652073f37afc996c48e67aca946f04c297f17b5fa7f2a61bf968ddc16c9009b841a0ba12ab9

Score
10/10

Malware Config

Signatures

  • QNodeService

    Trojan/stealer written in NodeJS and spread via Java downloader.

  • Executes dropped EXE 1 IoCs
  • JavaScript code in executable 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\cid_5B9CEC37-5A8C-4D4C-A085-A20165C7A6A5.PDF.jar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\6b6f80de.tmp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Users\Admin\node-v14.12.0-win-x64\node.exe
        C:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain drylocktechnologie.com
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/184-169-0x000000EC89C00000-0x000000EC89C01000-memory.dmp

    Filesize

    4KB