Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe
Resource
win10v2004-20220812-en
General
-
Target
8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe
-
Size
1.5MB
-
MD5
8dc3186fd0f4dd9101deb7568024cb72
-
SHA1
905c4783b13ea9c3d4770128c47b8a03c2bc4926
-
SHA256
8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a
-
SHA512
905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377
-
SSDEEP
24576:NEMusNFaoFF5d8CdldCE/Y4MjUL/AhKCkTqEJWmAJ9HXZ:NnFhCEQJkAhKYb
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Executes dropped EXE 1 IoCs
pid Process 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy -
Loads dropped DLL 2 IoCs
pid Process 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000322d4fc3e635c9910ba3a96e7248b83e45a6f2c09fa6bf50066b37235da40434000000000e8000000002000020000000fd15f48d8fdb28fec0d2d1a9b65803bffd55c1147b45d27b74c4c88ae470af17200000008cf8ed2c38f14491b43d1e2dbd38d6838baba4ce630cc48651a9e2dbbba96f5940000000076dda10b4546f211e9e0531856538c1cf814b328b5f9dbfe975a6e0fdf1d16c836c1fa0fbc5ce0e6bfae6b82370d359f9d6bb3c6c6517f85a6e4888c00d03cc iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\icabala.net\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b16d7f05ddd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A795F791-48F8-11ED-8DB1-7A3897842414} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\icabala.net IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372211807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 1928 iexplore.exe 1928 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1360 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 28 PID 1972 wrote to memory of 1360 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 28 PID 1972 wrote to memory of 1360 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 28 PID 1972 wrote to memory of 1360 1972 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe 28 PID 1360 wrote to memory of 1928 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 31 PID 1360 wrote to memory of 1928 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 31 PID 1360 wrote to memory of 1928 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 31 PID 1360 wrote to memory of 1928 1360 8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy 31 PID 1928 wrote to memory of 1540 1928 iexplore.exe 32 PID 1928 wrote to memory of 1540 1928 iexplore.exe 32 PID 1928 wrote to memory of 1540 1928 iexplore.exe 32 PID 1928 wrote to memory of 1540 1928 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe"C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmyC:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.icabala.net/thread-250-1-1.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD51416c750e94b12540eee95871661b087
SHA13681fe07562224ffc5d86ba57d68e6d5417d2c20
SHA256948d9ce9b5d74a20821c2b1a808e45df6b33564ce5ef1ec585959cfe03191d0d
SHA512d1b7e55ce45c3b66c3af6a796578bde80d9e4ebd79c231f18ab9bbacf258ff1d5ff13e7954f26bd9b5e276c3ccb76d6317a13fbc2e9379ece39991118d17ed4b
-
C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy
Filesize1.5MB
MD58dc3186fd0f4dd9101deb7568024cb72
SHA1905c4783b13ea9c3d4770128c47b8a03c2bc4926
SHA2568f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a
SHA512905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377
-
C:\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy
Filesize1.5MB
MD58dc3186fd0f4dd9101deb7568024cb72
SHA1905c4783b13ea9c3d4770128c47b8a03c2bc4926
SHA2568f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a
SHA512905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377
-
Filesize
294B
MD5d279039bde8f3d6ed534b9951e4329a0
SHA17847ef4492c23ffba0e510234f72839a63ceafbd
SHA256946f5b07e984eaf04f1e9cb75468d93a10d52e406580a02c035728200af04ca5
SHA5129e9edf5fc237887fbc93a5ad6d5d9bef89af3b99280b66eddd9fb104ca63d77a8e6394435d62dc2c94e0af1ffac5932051cd322763472cbcea46be33a588982f
-
Filesize
608B
MD515045b6b61c0994aa37f23fe6e8d1b6a
SHA12f8787eed627cceef0dfeb83f2238b0269fd8a2d
SHA2565d94dc65fc1c5c204286ee32f17c9e7b55c9d12e21ee67e8e3dce8a11e30306f
SHA5126ef7b866aa7b2d8a525d0397a8fc32d6f1f76c22f307b0467ecb4b250621df0eaeb696fb87bc8aae6cab50b331f2ea7098c614f01e303a9d340adb0506946491
-
\Users\Admin\AppData\Local\Temp\8f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a.dmy
Filesize1.5MB
MD58dc3186fd0f4dd9101deb7568024cb72
SHA1905c4783b13ea9c3d4770128c47b8a03c2bc4926
SHA2568f56bce9115cfad4972b404875e74885f3c6cbefe2fc061df2af4a8cf1b3932a
SHA512905c8f40f8cf754100b09da7056988c25aa60fb3c93f730fa53af87dabf1b46e197edf5df410d90971e15163e20553bb320c0527b16c5665244071d2cbf55377
-
Filesize
453KB
MD56df0ed0afe162198116be68aba60e0c4
SHA1bd0ca25ff4e495717be7345933aaa90755e5a6ca
SHA25614172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc
SHA5126696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757