Analysis
-
max time kernel
121s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 02:16
Behavioral task
behavioral1
Sample
c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe
Resource
win10v2004-20220722-en
General
-
Target
c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe
-
Size
873KB
-
MD5
ab562bdc1da3ca961409f742a10b2c69
-
SHA1
26f6d51b36b30066bb2802d47dc58f04e41f45ae
-
SHA256
c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1
-
SHA512
66cb18e0dad24ad7d3651b912d4cdd114d32de31ac72c1402143d2c90feab91474bcea59d279e27344ed439f70ea9a47949994fab98b17d15a3675fe6062ef79
Malware Config
Extracted
joker
http://guup.oss-cn-qingdao.aliyuncs.com
https://gutou.oss-cn-beijing.aliyuncs.com
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe -
resource yara_rule behavioral2/memory/2112-132-0x0000000000400000-0x00000000009B8200-memory.dmp upx behavioral2/memory/2112-133-0x0000000000400000-0x00000000009B8200-memory.dmp upx behavioral2/files/0x0007000000022ecb-135.dat upx behavioral2/memory/2112-136-0x0000000000400000-0x00000000009B8200-memory.dmp upx behavioral2/memory/1868-137-0x0000000000400000-0x0000000000A0A200-memory.dmp upx behavioral2/memory/1868-139-0x0000000000400000-0x0000000000A0A200-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 1868 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1868 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 79 PID 2112 wrote to memory of 1868 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 79 PID 2112 wrote to memory of 1868 2112 c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe"C:\Users\Admin\AppData\Local\Temp\c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe"C:\Users\Admin\AppData\Local\Temp\c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe" ÃüÁîÆô¶¯2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5239ca7010c92e2d9242e47d1babfdc75
SHA1fa6d16858c2c6f6f1734c34401386dc0c37b7a98
SHA2564c23fd60f624f1dc003d165718e46281abc5dd7bd4868a96e609796c485ce118
SHA512f4ec4d6d2f46efbb66ec54ffe468fe837c3bf2306babbddb4f368ca95b2fc2a8e08beb3231f710f427804b1cb0535515ccad618f9da54fc26badb3ea1fec1a44
-
C:\Users\Admin\AppData\Local\Temp\c6b0027b5112f47d4c60a4012376a21a3952dcf518c4d0dd7b61b5e8655342e1.exe
Filesize932KB
MD52447a92ed5a009e54a7c921a6eefb8cd
SHA117ebde5619b78ce5ebd6e6e0e8d979176cef0598
SHA25696541e6297eebee96f17e551315a4633dd61d1ff661a0ac0247873ea98cf089e
SHA5128a02ef1da48b02d118d92d8220002802a2b4c6bd0537dc559705d78b7dfee39ae091f7e376395e57d6c58e22bedc895d8f03732ccd99ed327d661fa8bcd0d47d