Analysis

  • max time kernel
    74s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2022 16:53

General

  • Target

    4cf13e6374b590864851a7d078c6c0ca.exe

  • Size

    132KB

  • MD5

    4cf13e6374b590864851a7d078c6c0ca

  • SHA1

    7af06765aa146779df01a40dfa95eb666237205c

  • SHA256

    1634cd31bc5c8b50aa4efe86d8c5611cc15d2f6d7e9a4441d059189e1efd1cf5

  • SHA512

    06b6f67f054976d19b6dee7e6d6fb5181dd79450f10becf33e58251a482c1be969f6207138d8a8800ec80b827030b98da233628b42873d9993ca56f113f35c93

  • SSDEEP

    3072:z1i/NU8bOMYcYYcmy5K/40g3nan3vx9kGSYng76s5YmMOMYcYY51i/NU8m:Bi/NjO5u//g+UGSYnum3Oai/Nu

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cf13e6374b590864851a7d078c6c0ca.exe
    "C:\Users\Admin\AppData\Local\Temp\4cf13e6374b590864851a7d078c6c0ca.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im KSafeTray.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1856
    • C:\WINDOWS\sys.exe
      "C:\WINDOWS\sys.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Checks computer location settings
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill.exe /im KSafeTray.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2088
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3508
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:3528
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3592
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:4368
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
          4⤵
          • Views/modifies file attributes
          PID:4992
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:3372
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:2228
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\sys.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\WINDOWS\sys.exe"
          4⤵
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:2924
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "c:\sys.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "c:\sys.exe"
          4⤵
          • Views/modifies file attributes
          PID:3496
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del 4cf13e6374b590864851a7d078c6c0ca.exe
      2⤵
        PID:1032

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      50ccb6305f667bc427d115125f962cac

      SHA1

      b0d82ebe2f5cf5b520ba7edcf7b2734cf4f2d200

      SHA256

      fd9644d82e1e00505eb4e716136b42befb20145a05057f0cb052d1793a853a58

      SHA512

      9687b5fefe3505705846b3dfa22cbcbcf7c04fdfc1f386998f1a0c8e275ad67faa9976ed51638cfe0d219422fd93dc8ee037653b96bf1956b298b31eb35b507c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      f62148dfed6458eb72320a43e1927f6c

      SHA1

      a66f4b2abf072ea895c68a0d32739119ae9643cf

      SHA256

      270d9e901cca11caa40e7876f12ad0637af6974a733e3bb04b10c8197a51e3ea

      SHA512

      feccf713aa4bf4b30b1dc3c8b75c72d27b72f16caca45b576d01c768734b7fe1835ff67401ddd26ea8d495204ea2c93ad089c9dc2ffe12fb49affcee00b8ed0e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

      Filesize

      1KB

      MD5

      a7b7f5625fb3c11322366f9f82d77727

      SHA1

      cc39c0c3ef6732356281fbe532cf0036fe0aff1a

      SHA256

      49ecf15281421c6f8b4cdad7ecfbbb83a8b912f5e506016cb839adef40edd689

      SHA512

      9896c399550ec183dad8cefe51f37cd02cc4727f05cafbfdb89a1fa37162f4f92b38a88e1a9df7128f6507b83d7af128244ba1f43c5871284f716ed8863f702f

    • C:\WINDOWS\sys.exe

      Filesize

      132KB

      MD5

      15c1bcf033df1c97d0175bd6b9834187

      SHA1

      6af8d59889d956b129d5b9c1edd16c4fec5d6e2f

      SHA256

      b89db2a402dbbb3b70f35a5a9a4a44632accad003b56b53bf0828351271b4e18

      SHA512

      b98684b0f8aa9805fda8978b1a9297bed370bebbae00dbc89a9b22693c95bcb37b2cecfebed398878552c28728e983c9d11fac7a4c703a568708b3d9ac521c2b

    • C:\Windows\sys.exe

      Filesize

      132KB

      MD5

      15c1bcf033df1c97d0175bd6b9834187

      SHA1

      6af8d59889d956b129d5b9c1edd16c4fec5d6e2f

      SHA256

      b89db2a402dbbb3b70f35a5a9a4a44632accad003b56b53bf0828351271b4e18

      SHA512

      b98684b0f8aa9805fda8978b1a9297bed370bebbae00dbc89a9b22693c95bcb37b2cecfebed398878552c28728e983c9d11fac7a4c703a568708b3d9ac521c2b

    • C:\sys.exe

      Filesize

      132KB

      MD5

      9286db426c4025c164c9051af18f27ac

      SHA1

      37fc1d0ca73379582ff206eee23a69876a774b04

      SHA256

      c297e7a1c49834031c8ce642b1e57b6f897ef23d8a2a21af8b2efdb8b6b07351

      SHA512

      d95c7f308e2b22694976c5db6ad5f02632a09898069ea687acffe287f3838a2de9bbd34531715a423fddfb71aeb467d431d47eeecb6d4463f8a78a25dd8f5895

    • \??\c:\sys.exe

      Filesize

      132KB

      MD5

      9286db426c4025c164c9051af18f27ac

      SHA1

      37fc1d0ca73379582ff206eee23a69876a774b04

      SHA256

      c297e7a1c49834031c8ce642b1e57b6f897ef23d8a2a21af8b2efdb8b6b07351

      SHA512

      d95c7f308e2b22694976c5db6ad5f02632a09898069ea687acffe287f3838a2de9bbd34531715a423fddfb71aeb467d431d47eeecb6d4463f8a78a25dd8f5895