Analysis

  • max time kernel
    153s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2022 19:25

General

  • Target

    f075c52ce064768d7567c841f269712b.exe

  • Size

    137KB

  • MD5

    f075c52ce064768d7567c841f269712b

  • SHA1

    993d250b26e4660b93ba8e29af6cc9a46420e772

  • SHA256

    65e48138eeec15a0fad5c341f62ecc31552c01db04db0fd2e8c39ac3e45fcff7

  • SHA512

    59813726e98b1d889759e28391b9d82a596a9a37ba98f5e2fd9ddce7dcf15ed8d8a72037d01531a26d496fa891b0f67b3d0880f6fec09aa8f0c74488a45bda22

  • SSDEEP

    3072:71i/NU8bOMYcYYcmy5d048g3nan3vx9kGSYng7+s5YmMOMYcYY51i/NU81:Zi/NjO5x0Xg+UGSYnuy3Oai/Nd

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f075c52ce064768d7567c841f269712b.exe
    "C:\Users\Admin\AppData\Local\Temp\f075c52ce064768d7567c841f269712b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im KSafeTray.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2616
    • C:\WINDOWS\sys.exe
      "C:\WINDOWS\sys.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Checks computer location settings
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill.exe /im KSafeTray.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3124
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4248 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:2356
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4372
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:2112
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
          4⤵
          • Views/modifies file attributes
          PID:4896
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:800
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:812
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
          4⤵
          • Views/modifies file attributes
          PID:1296
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\sys.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\WINDOWS\sys.exe"
          4⤵
          • Drops file in Windows directory
          • Views/modifies file attributes
          PID:1172
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib +h "c:\sys.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3724
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "c:\sys.exe"
          4⤵
          • Views/modifies file attributes
          PID:2672
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del f075c52ce064768d7567c841f269712b.exe
      2⤵
        PID:1584

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      afc3e2584b32e1e7c23c33e9534089a5

      SHA1

      ea4e2266d010c300621d2287ea60fe3e9a9ee753

      SHA256

      61597f5f937da250a5ed7b4b82867bebc546a5a35c0029982a003b1e9cbd2e7e

      SHA512

      f0e0d20b15bc390292baf0d93d982315afc466ccd2d4e48152ed65af97aed573d5b9e65b2b50925cbcd2e736955dfec4f63de5739cdb1499eb2db5dfc3cc4fe6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      bb5a25cb916ad62988c4207a6f33a634

      SHA1

      46b07f788f8a8273c6408c0f56a3b5418f526bbe

      SHA256

      1335cd4088e02c72cb396a09276646b8533c7d5ddc149ab38a4262c224fdd813

      SHA512

      34c13f5f7a3485e9ff1da5f9257a5048902f951c6d5ef026d14c4ab29210102c5555fcf278b655f56c0b69617508baf9f6dbe4a96769b11b0eb5ec947d965e73

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

      Filesize

      1KB

      MD5

      a1abc08f52c5200c907044cb4febbe27

      SHA1

      d79f14309a5125fba7cb7ccbf2ee6970f91d8d1f

      SHA256

      c354e66db2476705d14eab3636a7b215ad6492c0b8ac9f6976165950c890515c

      SHA512

      ab228e84edd22a23037540db8fb713f643c256a337f7de32ec20b2c5de2cc51d08e1df6ef4fee5a5bf51061c8b9dcb4935c53ca90408f890d9d5c851a4e5e34a

    • C:\WINDOWS\sys.exe

      Filesize

      137KB

      MD5

      8522992a01052983a769ba0b10ca9f57

      SHA1

      4d5205b76b885f9c430c64238d6247dd163cbb35

      SHA256

      034e40b6fe0f3fecbedc27b056247df41568244782f7cabe405104d7eca4cf0e

      SHA512

      20c91beff9f4d963637374bfc8ba6f8dffb66b6e6e35f17fa22895bc43a217d94640f192aa0a49e610c37c891367f96b352f606a3f8eacaee63d7b64d3cfa20b

    • C:\Windows\sys.exe

      Filesize

      137KB

      MD5

      8522992a01052983a769ba0b10ca9f57

      SHA1

      4d5205b76b885f9c430c64238d6247dd163cbb35

      SHA256

      034e40b6fe0f3fecbedc27b056247df41568244782f7cabe405104d7eca4cf0e

      SHA512

      20c91beff9f4d963637374bfc8ba6f8dffb66b6e6e35f17fa22895bc43a217d94640f192aa0a49e610c37c891367f96b352f606a3f8eacaee63d7b64d3cfa20b

    • C:\sys.exe

      Filesize

      137KB

      MD5

      7bd72e17ff5bac51277d6a0b9d3525eb

      SHA1

      4b08298e1ee4bdead1403dd21e21d3c9393d8934

      SHA256

      384f2d33fd2d6ad7dd5e24fa1959cd9cbfd19f6902d0e52652042994e5944408

      SHA512

      b1718f837109e73ee8bbb22c05028a49681cd8d62f51ba177b7eb6bc6d7eeeb53dcea317a5ad18a36119d6d1222175ecf62ad8933b2e191e6c38037544624a16

    • \??\c:\sys.exe

      Filesize

      137KB

      MD5

      7bd72e17ff5bac51277d6a0b9d3525eb

      SHA1

      4b08298e1ee4bdead1403dd21e21d3c9393d8934

      SHA256

      384f2d33fd2d6ad7dd5e24fa1959cd9cbfd19f6902d0e52652042994e5944408

      SHA512

      b1718f837109e73ee8bbb22c05028a49681cd8d62f51ba177b7eb6bc6d7eeeb53dcea317a5ad18a36119d6d1222175ecf62ad8933b2e191e6c38037544624a16