Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2022 09:15

General

  • Target

    73985908413b4cda64f15b6fb02e9f59d5a6fab19d36a155e9e40da99edd35c3.exe

  • Size

    5.3MB

  • MD5

    0a735d01ea6deb01af0d28ec831460a5

  • SHA1

    9195bf9b019972add40196954ba2f029c75c71f0

  • SHA256

    73985908413b4cda64f15b6fb02e9f59d5a6fab19d36a155e9e40da99edd35c3

  • SHA512

    f95ece9d7b9efef4c31058c09b491959961a07995e4a11530fcce7c9de41158a8e9f775b8ddf1b6db4bcf939926f40f7ba6f0c341d37a0c4b120cba474c78000

Malware Config

Extracted

Family

joker

C2

https://googleupdate.oss-cn-hangzhou.aliyuncs.com

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73985908413b4cda64f15b6fb02e9f59d5a6fab19d36a155e9e40da99edd35c3.exe
    "C:\Users\Admin\AppData\Local\Temp\73985908413b4cda64f15b6fb02e9f59d5a6fab19d36a155e9e40da99edd35c3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\Temp\word.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:808
      • C:\Users\Public\Downloads\HipsMain.exe
        "C:\Users\Public\Downloads\HipsMain.exe" .qbtt Sfe tp/fyf tp3/fyf
        2⤵
        • Executes dropped EXE
        PID:268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A053CFB63FC8E6507871752236B5CCD5_51F5937C5298F6FC5DF472F86EAF0A15

      Filesize

      1KB

      MD5

      e692fe65fa4aa969808f14308c403f3c

      SHA1

      3d8f2370b99dd394b4f5a58a8bb4b3c0cd562f64

      SHA256

      d0add5df392e3b0f41ef8d1dd40402268b7aa3a8c32e667b4ff044e883d4e480

      SHA512

      ca4c9bdea7ad3bac5eca214647a0e6e1a3d0aca079b42cdc86714fd3ce148976cd369b33e56c0fb4bd656e53639da62330f3975fa1845d7771a9f8c56e2ddf86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C

      Filesize

      1KB

      MD5

      a502a60eb363bbd85ad0f1c3654665a5

      SHA1

      d235e4cc21e4bea57a8f7544cc7897908d6c3048

      SHA256

      97a7ca2fe6837898b664d63926331683c1515eab08cb2892e1a682a8e4820287

      SHA512

      8a6764caa0131bdc95fc6b54bdffe7aecd6579b2cdc86d0e5c253dcf8d8a678cbe635b25d61c0df8393f70d337cd47fb8c00019f891be3a42fc7416dbaaa1b63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      340B

      MD5

      e813ba2994278723ce8c51d754caea1e

      SHA1

      11c2f4055afda57c34c7b492f3cc89cb47207848

      SHA256

      11e64ad2903727ec2b72449487eebbab7ae7d1f5a13797c81cb79ce4079840a4

      SHA512

      a610fc82013b368d4374379430dc3b4d735c6393c1f0fcca0f27de7f202ddaf94c000e21b3f00979c3fc17d8432f684be6cfd083823e1eb26377ee0002bc24bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A053CFB63FC8E6507871752236B5CCD5_51F5937C5298F6FC5DF472F86EAF0A15

      Filesize

      532B

      MD5

      9631f1fed6d67131789aabaabab8cf08

      SHA1

      b3de15f71f72e367a5675c4d82bca7fb078f3355

      SHA256

      bf291bd62aab8613d9d2b10662c797ac4e19465ddc61d68de1620cb62cc8675a

      SHA512

      7ce286b5b88b69cfda4f1b9ce786d017805bc9ca24f081a4c489b6a1d353a1af9535192018ef0427c247bb1b0a32ed77fc67bc5fe603226556450c333ea8eebc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C

      Filesize

      492B

      MD5

      c67851fcd196ff4d29055619f8579e99

      SHA1

      995d6ad4bb05478a9f4cf4f55976f145a6037fdc

      SHA256

      821417a51dd5a5c0256f9b10b000e682c1624f77f9e8598111a539ea28025bbf

      SHA512

      a0c4c6b7708fe5244a37d8f7af7c9757c01b91b87b7e06e532116cafa3a3cc2a937bd68ae194db1a55725930bf7f83d8903d81e2cf697da823368137c04a190c

    • C:\Users\Public\Downloads\HipsMain.exe

      Filesize

      99KB

      MD5

      47f50639284044b6bec3810a8bb868c9

      SHA1

      45f25bc4ff6dfda9309251212792c0c963d1ae0e

      SHA256

      b074c3558da627a4c8ec43102b8630fccdd882c1b5f4631e92c654cbca9c478e

      SHA512

      d2bd265a82334a4464cad79261d2a9950e66c7f3e606b2d8df3332b325a0c9684216d439b96b2b5cd6de1ff3e4d9535530fa62a6a13c8c30525d6a77c55ca061

    • C:\Windows\Temp\word.doc

      Filesize

      21KB

      MD5

      9ce7d42b72c557326b42a2d90c2d8e63

      SHA1

      8e38997043453854260c4d85c200922d7796b439

      SHA256

      93c22ab0c86577f815bcaacaf1da886fd3c25b2881b3d42db804e5fe78e79c79

      SHA512

      592eb6c97cb40d87414efadfa65711d15b5ed0e68d8e624251beb1dce7d0c78b0258fbcad78b8f92e06f82cbcb0dca073e75d38b6684b9b6a632b65c093b3d5c

    • \Users\Public\Downloads\HipsMain.exe

      Filesize

      99KB

      MD5

      47f50639284044b6bec3810a8bb868c9

      SHA1

      45f25bc4ff6dfda9309251212792c0c963d1ae0e

      SHA256

      b074c3558da627a4c8ec43102b8630fccdd882c1b5f4631e92c654cbca9c478e

      SHA512

      d2bd265a82334a4464cad79261d2a9950e66c7f3e606b2d8df3332b325a0c9684216d439b96b2b5cd6de1ff3e4d9535530fa62a6a13c8c30525d6a77c55ca061

    • memory/268-74-0x0000000003930000-0x0000000003FAE000-memory.dmp

      Filesize

      6.5MB

    • memory/268-75-0x0000000003FB0000-0x0000000004693000-memory.dmp

      Filesize

      6.9MB

    • memory/268-76-0x0000000003FB0000-0x0000000004693000-memory.dmp

      Filesize

      6.9MB

    • memory/288-54-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp

      Filesize

      8KB

    • memory/1704-59-0x00000000723D1000-0x00000000723D4000-memory.dmp

      Filesize

      12KB

    • memory/1704-70-0x0000000070E3D000-0x0000000070E48000-memory.dmp

      Filesize

      44KB

    • memory/1704-68-0x0000000076191000-0x0000000076193000-memory.dmp

      Filesize

      8KB

    • memory/1704-73-0x0000000070E3D000-0x0000000070E48000-memory.dmp

      Filesize

      44KB

    • memory/1704-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1704-61-0x000000006FE51000-0x000000006FE53000-memory.dmp

      Filesize

      8KB

    • memory/1704-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1704-78-0x0000000070E3D000-0x0000000070E48000-memory.dmp

      Filesize

      44KB