Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe
Resource
win10v2004-20220901-en
General
-
Target
bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe
-
Size
18KB
-
MD5
c5ef1eaebf1e47a694a54fd29712da47
-
SHA1
76bd4ad239844b6ed757aab254a96c1079fcd1d4
-
SHA256
bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a
-
SHA512
75f10dff7a1fc1ed88d831cebfe97a779cd63944e2a4afe2ea6aec77ed0a0b2dcc26fb2897ec9d4cfff7597aecfdad9677ffa8503b27a08a4329baf3cc462e9a
-
SSDEEP
384:PWvWCEgpc7GOu6J/3nXyf5bctBRRmJend3gvdTuvFaCh0isN:SEg27dJ35JmJed9EbN
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Executes dropped EXE 1 IoCs
pid Process 560 Rund1132.exe -
Loads dropped DLL 2 IoCs
pid Process 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rund1132.exe = "C:\\Windows\\system\\Rund1132.exe" Rund1132.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\N0TEPAD.EXE Rund1132.exe File opened for modification C:\Windows\SysWOW64\N0TEPAD.EXE Rund1132.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\system\N0TEPAD.EXE Rund1132.exe File opened for modification C:\Windows\system\N0TEPAD.EXE Rund1132.exe File created C:\Windows\N0TEPAD.EXE Rund1132.exe File opened for modification C:\Windows\N0TEPAD.EXE Rund1132.exe File opened for modification C:\Windows\system\windll.dll Rund1132.exe File created C:\Windows\system\Rund1132.exe bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe File opened for modification C:\Windows\system\Rund1132.exe bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "252" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou2.bar\ = "63" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou2.bar\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\Total = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou2.bar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81065541-385C-11ED-9C90-C6457FCBF3CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370385525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07a716f69ccd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou2.bar\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\Total = "189" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000d405a22b536d348ee8653b3eb9e468df7a3116c2383bab6b8d62e5c9d760e64b000000000e800000000200002000000073b66e307fed40072c0d0eb28c8f9f333bf9a1de296999bbfead4968b1161d7a20000000849e4af211c6eabd2ddcd91429cf616ec75c892c08ffab6ed645467c955f3aae40000000db8c16cbd132dafa3f9afac24e80af83e35940ff81b6652e2f5b0aadc63035c32d07831e51a9cf2caefe861c50fc776f4f4245ee485a3cb15b05e3cd33611926 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net\ = "189" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "about:blank" Rund1132.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "N0TEPAD.EXE %1" Rund1132.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 1268 iexplore.exe 1268 iexplore.exe 560 Rund1132.exe 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 784 wrote to memory of 1268 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 26 PID 784 wrote to memory of 1268 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 26 PID 784 wrote to memory of 1268 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 26 PID 784 wrote to memory of 1268 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 26 PID 1268 wrote to memory of 1204 1268 iexplore.exe 28 PID 1268 wrote to memory of 1204 1268 iexplore.exe 28 PID 1268 wrote to memory of 1204 1268 iexplore.exe 28 PID 1268 wrote to memory of 1204 1268 iexplore.exe 28 PID 784 wrote to memory of 560 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 29 PID 784 wrote to memory of 560 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 29 PID 784 wrote to memory of 560 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 29 PID 784 wrote to memory of 560 784 bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe"C:\Users\Admin\AppData\Local\Temp\bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.18hi.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
-
C:\Windows\system\Rund1132.exe"C:\Windows\system\Rund1132.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56c6a24456559f305308cb1fb6c5486b3
SHA13273ac27d78572f16c3316732b9756ebc22cb6ed
SHA256efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973
SHA512587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f30a50c35b6aeaca3c7d2425ea183a7
SHA1fc1652aab86839ae84c033ee7728adf17034ca7c
SHA25638e53498c9e6f1256a9b8b552b2b205f3772ae18c78d4c030c7790092a0bc315
SHA512f092738db2e2951255aaa7655cb9f63b3db97853aa38c05c9af95a0fa5dba7ae33bab27518abb407315adf2b595787dab0b0c853f1a7adbdc4a2b95c6082745d
-
Filesize
5KB
MD53de9cdeab4e923f7b9dd2ed67dc84bd8
SHA1da5a3995f9df8fa4deb4987e1d1c900707148b0e
SHA2568b9b4cef26139ec382167a614e38533f13eb74755f2d9cc8191b03ebaf06d35c
SHA512318cbf4f9d61785ec51ac9ee78a43ee04547d595d0ed02682677df7ccffb117be2cf27ad341763e2ca7437fed367f61bf697281caf0bd5725da71634ee7b2289
-
Filesize
606B
MD550e1c09a0ec9b7a79510e56bc5512877
SHA1d357b34fe3b1014e067240e02b17c7fc8988e51b
SHA25666391ad7cc4e3384510f9da399ad069f84b9c1b53b670dda693b8fed19de1fae
SHA51287bdca22d597e6de7fe588e2888cfa01847d258584fb3bd5c2718ee14d59fb05ace56d1bf871f3da6a6862411d66712c1fb768355e0271feaf8c873c78009467
-
Filesize
18KB
MD5c5ef1eaebf1e47a694a54fd29712da47
SHA176bd4ad239844b6ed757aab254a96c1079fcd1d4
SHA256bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a
SHA51275f10dff7a1fc1ed88d831cebfe97a779cd63944e2a4afe2ea6aec77ed0a0b2dcc26fb2897ec9d4cfff7597aecfdad9677ffa8503b27a08a4329baf3cc462e9a
-
Filesize
18KB
MD5c5ef1eaebf1e47a694a54fd29712da47
SHA176bd4ad239844b6ed757aab254a96c1079fcd1d4
SHA256bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a
SHA51275f10dff7a1fc1ed88d831cebfe97a779cd63944e2a4afe2ea6aec77ed0a0b2dcc26fb2897ec9d4cfff7597aecfdad9677ffa8503b27a08a4329baf3cc462e9a
-
Filesize
18KB
MD5c5ef1eaebf1e47a694a54fd29712da47
SHA176bd4ad239844b6ed757aab254a96c1079fcd1d4
SHA256bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a
SHA51275f10dff7a1fc1ed88d831cebfe97a779cd63944e2a4afe2ea6aec77ed0a0b2dcc26fb2897ec9d4cfff7597aecfdad9677ffa8503b27a08a4329baf3cc462e9a
-
Filesize
18KB
MD5c5ef1eaebf1e47a694a54fd29712da47
SHA176bd4ad239844b6ed757aab254a96c1079fcd1d4
SHA256bcf2da6011f0f56191965811d7b0da690fdde6457e5fd7a1042a37cbea70aa7a
SHA51275f10dff7a1fc1ed88d831cebfe97a779cd63944e2a4afe2ea6aec77ed0a0b2dcc26fb2897ec9d4cfff7597aecfdad9677ffa8503b27a08a4329baf3cc462e9a