Analysis

  • max time kernel
    40s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2022 03:57

General

  • Target

    5a53ca7881f64f1d174f2fe9c152397d86ed5a508feb42d20ecf8b2623db7d61.exe

  • Size

    10.4MB

  • MD5

    cd16ea3f3cd567c5a527a9adb968871b

  • SHA1

    6d0ae7ccfbce12d2475c0ee771ce36040c64a4d8

  • SHA256

    5a53ca7881f64f1d174f2fe9c152397d86ed5a508feb42d20ecf8b2623db7d61

  • SHA512

    09e66c595eddfb497b1cab86397ffe7fed1ccf91919a6c3f1b860b32d4b729b2f332600b813f7fb39d32e2bd3eeeea65d899fd6051bdad811c60585e3362238d

Malware Config

Extracted

Family

joker

C2

http://laoliehuo.oss-cn-hangzhou.aliyuncs.com

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Stops running service(s) 3 TTPs
  • Deletes itself 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a53ca7881f64f1d174f2fe9c152397d86ed5a508feb42d20ecf8b2623db7d61.exe
    "C:\Users\Admin\AppData\Local\Temp\5a53ca7881f64f1d174f2fe9c152397d86ed5a508feb42d20ecf8b2623db7d61.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\SC.exe
      SC STOP MpsSvc
      2⤵
      • Launches sc.exe
      PID:1632
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c .\delme.bat
      2⤵
      • Deletes itself
      PID:1996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\delme.bat

    Filesize

    438B

    MD5

    de78c86d0ac3ad364553a1338fa84bee

    SHA1

    188840a5afec5d9c9e92812d2a770afe21ad3c03

    SHA256

    2e273c0900701a3e5dccbbe9b5b09e325c0ab8af0a1d88bd0dc7520336a86dea

    SHA512

    8fd19cc34fde52767207e7cfe2f64a6521f759e12345c55e1a87c6d3db070c662cd6d01cbd9b2d139031dbc713163061d1b384fe15fb0df45def582066bed6aa

  • memory/1932-54-0x0000000076281000-0x0000000076283000-memory.dmp

    Filesize

    8KB

  • memory/1932-55-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1932-58-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB