Analysis
-
max time kernel
150s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 16:14
Behavioral task
behavioral1
Sample
58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe
Resource
win10v2004-20220812-en
General
-
Target
58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe
-
Size
26KB
-
MD5
06666bc830652befea0a673bc9cd2f90
-
SHA1
de5d967737d27c35e889bf65e761ee367b2117bc
-
SHA256
58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7
-
SHA512
db8de8d00907614b1867283307460933ee8a97e5ba06260871d113047a4fbd1af4fcb69c80890052b35e49fef032f1c81ecca05e155c0b85d4152e640022949e
-
SSDEEP
384:roNhPbj62Tj9xec1JmLfBY5vX0kdaXj0eohDTkVOhvF27z/FUxiWtBlwmRz:rEm2Tbar+f0UaXC9yoYf
Malware Config
Extracted
joker
http://mmtie.oss-cn-hangzhou.aliyuncs.com
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys duba_1_244.exe -
Executes dropped EXE 1 IoCs
pid Process 1688 duba_1_244.exe -
resource yara_rule behavioral1/memory/1732-55-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/files/0x0007000000013170-58.dat upx behavioral1/files/0x0007000000013170-60.dat upx behavioral1/files/0x0007000000013170-64.dat upx behavioral1/memory/1688-67-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral1/memory/1732-68-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/files/0x0007000000013170-66.dat upx behavioral1/files/0x0007000000013170-63.dat upx -
Deletes itself 1 IoCs
pid Process 1200 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 1688 duba_1_244.exe 1688 duba_1_244.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\start_acc.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\shrink_skin_config.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\gamesdb_dc_mini.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\game.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\broplugver.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\liectrl.config duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\se.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\winesystem001.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kvmpid2.kid duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kshmpg.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\cloudctrl.config duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsu.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\denyip.krf duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\jijian_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\wendujishrink_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\web\kingsoft_main.htm duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksedset.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\config\ksesysfiles.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rule.krf duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\tianshizhiyi_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\weatherconfig.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksscfgx.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kqsccfg.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\safeurl.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\upcfg.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\krmcdm.krf duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\computer_doctor.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\defaultshrink_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\reinstall_duba.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kcommon.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kismain.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksedset.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\quarantine.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kdh.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kpretend.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kdock.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\khistory.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\inject.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kae\kaearchb.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\krcmddb.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\productinfo.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\scan_virus.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksbwdt.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\bro.cfg duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\deswitch.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kae\kaecore.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwnp.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\lockpage.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\trash_scan.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\microsoft.vc80.crt.manifest duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\microsoft.vc80.mfc.manifest duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\speedtest.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\web\kingsoft_duba.htm duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\deheurcfg.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\cleanlist.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\netmodeconfig.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kcommonpid.kid duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\khackfix.kid duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\dudubao_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\duba123ie.ico duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\forecastmsg.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\scom.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\push_msg_city_list.ini duba_1_244.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 788 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 788 taskkill.exe Token: SeDebugPrivilege 1688 duba_1_244.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1688 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 29 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1732 wrote to memory of 1200 1732 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe 30 PID 1200 wrote to memory of 788 1200 cmd.exe 32 PID 1200 wrote to memory of 788 1200 cmd.exe 32 PID 1200 wrote to memory of 788 1200 cmd.exe 32 PID 1200 wrote to memory of 788 1200 cmd.exe 32 PID 1200 wrote to memory of 788 1200 cmd.exe 32 PID 1200 wrote to memory of 788 1200 cmd.exe 32 PID 1200 wrote to memory of 788 1200 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe"C:\Users\Admin\AppData\Local\Temp\58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\sbnimb.tmp\dtstop.tmp\duba_1_244.exe"C:\Users\Admin\AppData\Local\Temp\sbnimb.tmp\dtstop.tmp\duba_1_244.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM 58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\58ba983b7c6ec9c85969ded4f23041f5a33a809f89d0866350e4575a14ee79c7.exe.bat
Filesize330B
MD551261393dd27fd67ecd9e13b032bb04e
SHA16646a78df3deba252ab0c3163d4c8a962fd902a3
SHA256561a4021642130a7f99df6358b17cfc01bc1524613b9c4d77105fcc8ca36bc7e
SHA51278cbf76c870da93d79c190e425ee6387dcbe28e63e3414ea3187247bb6f6ad71990d2123471972095c7dd4df7950d3f56df74ea7498e8c7011babce39c15871b
-
Filesize
14.2MB
MD556f8e2021f1119f731c6175ecbcfbd0a
SHA1bc3bfa6fc5accdb5ce4012cbea0ae1152230705d
SHA256c683d979ca3c301c8cf637d425e70ad915418099d0744ae9da203f053ea1345d
SHA512bd288e977da0ce65c9b72ef08c8ca35726e619da5ef2ab1152bb08571ee3695dc9c71de72ba669c4e1ac4f32aafce2cfcbaacc355435476f417e93c155098e5f
-
Filesize
10.6MB
MD5a0b50da4dbd627b524c5c71820079530
SHA1e764e7c7e60cb253093a88f456e92f9c8db5d693
SHA256e725212156000cbdfff844bdd5013258a6bf4ffa9c2eef5f48b4c22c241657ed
SHA512fc02df215afa88eb20306547f88ca66ecf97f3b2df9f1ff34ade1a6e7a50a5c1c85ce06f4d14de5ff128ae359b1fa9b9dfba3dc3a576ffe42305905519342515
-
Filesize
16.1MB
MD5b52cff23a31206e9699cf8053e8d9127
SHA18dc2fd8afa281fb37bda8ab53dc92d7e360146aa
SHA2566287ed227d97696f1dc19a2097e73f9f783645c7353bdc0b14a1522071bdb023
SHA512c24fe6d892d9ae50506a05198d5cddeb8f3e31b7e707771c18cfea1244dd9ef518eac803707d4154f68a344123f741dd89688704436434268437bd92e4e84987
-
Filesize
12.6MB
MD5319e2a5997090113e6e232d9aba3f133
SHA1dcf19b6d137f3964af9f1a50064ec37d709a98fc
SHA256ee597f957e9e3bb34ff7b942479cd114b9f46da8cdec761ec9033620417efaf9
SHA5122d692aae9571af3e10b47ffa7981a0104d53c57bc89d7db57b898cd0875f270cf5cef5288d40f02affd7d7a12b6fa1cf2b7ee98800effe4a1bdafa9c7f1cb7c8
-
Filesize
10.9MB
MD5ab6979a6f57fce84c01b7f5df241c666
SHA10b34260c00104deecc2bb04392d96796621576c8
SHA256a4984f08b2a91516383e3b1c61a36ca83f1797b4416b907939ee026d19c290d7
SHA512d5bf1a7679dceb3ff7a77bd3c074658a4a6800aae103ac71047345edcff76f934f603c5b19b36cf40c2fb2b30b079749f1e0c2d737d7ff096f62f9ff75d074cd