Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2022 19:57

General

  • Target

    a3d66f17b4a16e1f4f25eed726cd924f.exe

  • Size

    129KB

  • MD5

    a3d66f17b4a16e1f4f25eed726cd924f

  • SHA1

    73ad93e787449188ad86abca391fbafcdbdd0f13

  • SHA256

    58c20fd4e759e5a84d47b228e5cf79294353f85e57c04dcd084094aa652031cc

  • SHA512

    59ef26dbe07d2891a99619ca557aace9a4527b3d52bc15f34a305e870b6bbfffdfb1514249321f54cb5d4373aa211cce9fad10f5586296cac3b8d8f9e3c67219

  • SSDEEP

    3072:X1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1gs5YmMOMYcYY51i/:li/NjO5xbg/CSUFLTwMjs6y3Oai/NDt

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d66f17b4a16e1f4f25eed726cd924f.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d66f17b4a16e1f4f25eed726cd924f.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1120
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1816
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • Views/modifies file attributes
        PID:340
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:616
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\WINDOWS\windows.exe"
        3⤵
        • Drops file in Windows directory
        • Views/modifies file attributes
        PID:1308
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "c:\system.exe"
        3⤵
        • Views/modifies file attributes
        PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72ee7f012d7e154a3e0d086ca9936095

    SHA1

    fc3773c8739acddef50ab754ca0370c6c6ce47d0

    SHA256

    b78eaeeaec717d3809ad9262ff8e19955cae041fb8c87a2d44d85a239cdb661b

    SHA512

    fd330d0eba25b2aca6d5803c248091f3c1136ab5afd581fedd6c560dad5abd89a81b9097cd4ab2e4d3b8c330c6644230ecc1dc249cafbf06279e3419ddd78ac2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    1fbc7eabd64a0a0d63018ddadf0355a8

    SHA1

    2b86b90cc14fc9e2de430e5b12e9e811d8c262b0

    SHA256

    92b57c7ade78f89b7c49e191c18b24099132b276c5a8f689a073f6f17591bb5a

    SHA512

    fc36794ff9175128851991eb56346807cbb6c70bcac3ac5bfe787718d916516daa6520bc4f33c2ee6dacdcabb68d1aa6330ab2d47f3d5793596f02e448e96c95

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1R6W9LTM.txt

    Filesize

    603B

    MD5

    01b218cb7daddfc62b8dc417759dc93f

    SHA1

    8e726846944ba51505fd558509e9813ec7a5ccad

    SHA256

    2db87cfd655a17f65d461d2a3fc1aaaffd8f843a51a282a880460ba55bf99df7

    SHA512

    08df97d821815f5aa6dec840f434b0615367eee50d0c94ed70ffe24e267b221db1f1467c14bf602f5660ef1a90a8bd91ed4c64fc150019ef9fa16ed780d22628

  • C:\WINDOWS\windows.exe

    Filesize

    129KB

    MD5

    2b5f605b08f3ee50688ce70e4720cddf

    SHA1

    3d07303ac236e6d923b0e6af619131e30c96a26e

    SHA256

    8642b712cf0836b35fac16a118296e55a822d475be156146b8270374fae7e983

    SHA512

    06b5a3d35fb1e148a4e21dd61c34aa62377f4db4a311600458df8e620ec1a661e6cdd373f7502ff555b20e1c556e6022002093c49a2398d8b517a4bfd54a08a4

  • C:\system.exe

    Filesize

    129KB

    MD5

    28fa77efd29d6afd9ca0cd757fbb60e9

    SHA1

    72cda01231b05212428662228f9059714ec86a33

    SHA256

    04cf854c99662dd91f25da14d7f8efe1a1c6135974bda1c62482d03c84f91c0e

    SHA512

    8ab8e002d233d91e54eeca432d4652bdf872d79362d1db749457de60defd48a3a0b792a70af6eaa5b0bf571ddd6f6ea9f47c05a938dc8fef13f197e998ccb47b

  • memory/1208-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB