Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 22:06

General

  • Target

    8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe

  • Size

    1.5MB

  • MD5

    8dc3186fd0f4dd9101deb7568024cb72

  • SHA1

    905c4783b13ea9c3d4770128c47b8a03c2bc4926

  • SHA256

    8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a

  • SHA512

    905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377

  • SSDEEP

    24576:NEMusNFaoFF5d8CdldCE/Y4MjUL/AhKCkTqEJWmAJ9HXZ:NnFhCEQJkAhKYb

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe
    "C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy
      C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.icabala.net/thread-250-1-1.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    7KB

    MD5

    1416c750e94b12540eee95871661b087

    SHA1

    3681fe07562224ffc5d86ba57d68e6d5417d2c20

    SHA256

    948d9ce9b5d74a20821c2b1a808e45df6b33564ce5ef1ec585959cfe03191d0d

    SHA512

    d1b7e55ce45c3b66c3af6a796578bde80d9e4ebd79c231f18ab9bbacf258ff1d5ff13e7954f26bd9b5e276c3ccb76d6317a13fbc2e9379ece39991118d17ed4b

  • C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy

    Filesize

    1.5MB

    MD5

    8dc3186fd0f4dd9101deb7568024cb72

    SHA1

    905c4783b13ea9c3d4770128c47b8a03c2bc4926

    SHA256

    8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a

    SHA512

    905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377

  • C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy

    Filesize

    1.5MB

    MD5

    8dc3186fd0f4dd9101deb7568024cb72

    SHA1

    905c4783b13ea9c3d4770128c47b8a03c2bc4926

    SHA256

    8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a

    SHA512

    905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\53FW674Z.txt

    Filesize

    294B

    MD5

    d279039bde8f3d6ed534b9951e4329a0

    SHA1

    7847ef4492c23ffba0e510234f72839a63ceafbd

    SHA256

    946f5b07e984eaf04f1e9cb75468d93a10d52e406580a02c035728200af04ca5

    SHA512

    9e9edf5fc237887fbc93a5ad6d5d9bef89af3b99280b66eddd9fb104ca63d77a8e6394435d62dc2c94e0af1ffac5932051cd322763472cbcea46be33a588982f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P0S8W1GY.txt

    Filesize

    608B

    MD5

    15045b6b61c0994aa37f23fe6e8d1b6a

    SHA1

    2f8787eed627cceef0dfeb83f2238b0269fd8a2d

    SHA256

    5d94dc65fc1c5c204286ee32f17c9e7b55c9d12e21ee67e8e3dce8a11e30306f

    SHA512

    6ef7b866aa7b2d8a525d0397a8fc32d6f1f76c22f307b0467ecb4b250621df0eaeb696fb87bc8aae6cab50b331f2ea7098c614f01e303a9d340adb0506946491

  • \Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy

    Filesize

    1.5MB

    MD5

    8dc3186fd0f4dd9101deb7568024cb72

    SHA1

    905c4783b13ea9c3d4770128c47b8a03c2bc4926

    SHA256

    8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a

    SHA512

    905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377

  • \Users\Admin\AppData\Local\Temp\ziplib.dll

    Filesize

    453KB

    MD5

    6df0ed0afe162198116be68aba60e0c4

    SHA1

    bd0ca25ff4e495717be7345933aaa90755e5a6ca

    SHA256

    14172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc

    SHA512

    6696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757

  • memory/1360-60-0x0000000003840000-0x00000000038B7000-memory.dmp

    Filesize

    476KB

  • memory/1972-54-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB