Analysis

  • max time kernel
    108s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2022 21:46

General

  • Target

    0f90bb86007a525c51606f541d23f17d.exe

  • Size

    124KB

  • MD5

    0f90bb86007a525c51606f541d23f17d

  • SHA1

    61b24dc1fe848eab720bc4f5371dd963afb1c22c

  • SHA256

    44aa2372d01d2f5199a9149debab54dc1ac6105b613cd145933d09f305ffb941

  • SHA512

    4c3e641db45fc829f9729ff20ccd3967cbc59f072638932fd712eae80243941ded9e2fc921b711a1a70d066a9997aec214cea3fb2e22216738b32a177343bdf9

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f90bb86007a525c51606f541d23f17d.exe
    "C:\Users\Admin\AppData\Local\Temp\0f90bb86007a525c51606f541d23f17d.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:896
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1420
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:308
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • Views/modifies file attributes
        PID:984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1740
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:980
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\WINDOWS\windows.exe"
        3⤵
        • Drops file in Windows directory
        • Views/modifies file attributes
        PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"
      2⤵
        PID:928
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "c:\system.exe"
          3⤵
          • Views/modifies file attributes
          PID:556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4882B641-1F3F-11ED-AEA9-42FEA5F7B9B2}.dat

      Filesize

      5KB

      MD5

      a9cd30560b17cb1a32c181802a9b9c78

      SHA1

      80b200d285b72405b7451d91891e7bc3ca434363

      SHA256

      a0e17fe449337f261f67d05677db1d81e37b0790c0e70fd9c3c22c7d9c936884

      SHA512

      ad4272bd255391a4e18956e9334668c162969652fa721e4e0b0facbcbca78b23b69cc8440763f0121a919a5b3f6c2685d2862896a2c99a0ed0a340e1aca75aca

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P44W3GZ1.txt

      Filesize

      601B

      MD5

      7638f3db255bddfbb3f44803c8abbd5f

      SHA1

      563ce95daf4044e49df5b3b45dd4c16f4900e5cd

      SHA256

      4d9bdc6c68eba2c94910a84c8ffff87a8ad106cdb6a3f0db16d93b266203c5b3

      SHA512

      f1f7b35742a8a1cf493747590cf83f8af6b95e73ac9ce775fa47a7246dafc9643a73e16e3268b6a87ea2d64b32bce39881d35f57439c6e63aa41d3d9a8d21392

    • C:\WINDOWS\windows.exe

      Filesize

      124KB

      MD5

      950711eeba44407c6492f34bad416ebc

      SHA1

      d08fd3210cb599cbd91dbd737a61c7040dfc4358

      SHA256

      4f688c259da881dd1e39c95b3e0e63194d04b9369dc84eb05aab9b1015fc5259

      SHA512

      bd1e4dad451f558ab3b9528764136bad36053614d7577fa311852162b496175588ab466a3228a79c830da9dc46fa374978f06a7e3ea8dd4ba5512aec724a341b

    • C:\system.exe

      Filesize

      124KB

      MD5

      08cc0bbc85178666876594a1e9a44959

      SHA1

      cdf8c6f694872515d3e3c59f2e5ec836e3d290af

      SHA256

      887660222854ce3b2ad9559e5bd583726a80304559387fadfa6ff04e071d9386

      SHA512

      2b7663dfbb28db0e985bebf2a68f8f8a3260d563f42f9fd601e77c95e9a1d654f71a8d4d8a03cd3c8edbff0ab3d481d74a9b4a34ea4d54ddc0edeca98bdcf87d

    • memory/1632-56-0x00000000751B1000-0x00000000751B3000-memory.dmp

      Filesize

      8KB