Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 17:00

General

  • Target

    96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe

  • Size

    662KB

  • MD5

    d42a68673a0159cf44884e5f8d0dc0f3

  • SHA1

    c673c7283f9590b57e4107f4092bb7d6bc3dbd84

  • SHA256

    96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2

  • SHA512

    cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2

  • SSDEEP

    12288:Z0L+fPVW03VATD5MNEbevxuV0N6WqbzLNYQsh2yqlAyN1llV:6AEvUEbtVQ6W/QV

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe
    "C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy
      C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://www.tocabala.com/thread-250-1-1.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_34D61B4A2A4AE0D3DDAB879224BCA77B

    Filesize

    2KB

    MD5

    b34fcfd4bd3059952c10ff9b1e8f0bde

    SHA1

    68ee422bb74f0255a85b697d45f7bff3cdcf3c0c

    SHA256

    79589da398956346f56741a87045e117c240e8f1641a901f9163291a483a7973

    SHA512

    2cde60d891de4134a916f828b71b54956ef37c8aca503ffa363b4e80d5818472412db0f87cfdf654724f05be52b7db203e9c685844b3a1446459a8d556344185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    0698dbc93ba7b6bef73ba316695f8317

    SHA1

    a444078ff1eb7c88f52cb4e324365926b491ed47

    SHA256

    263292040d77903899257c1d21201dc64d6f8d6b5a1d945cd5b28d0124d7906c

    SHA512

    ebacaa7009aebb88199cd70fd0bb3afe69ed300318cb633edd1c0404e42aef829617f589bcbad6cb7ab4bd0a8ae87f7df1435c786184ecc5de61c8fc6950a900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5B1F6CF4A47750C9CA624A892D7823E

    Filesize

    728B

    MD5

    2c6d5d373c91fc4cb18958e7d1c8141c

    SHA1

    ca394947c161fde6f50edf2fc0792c9d9f00e58d

    SHA256

    8bcea716eff0b86bbe298894116497e6187e6f9da883a7b019341875be5d792b

    SHA512

    820b4d6986b4433d8daa2c62e71894d2144ed8c0c43d61fbbd360df11fc0b0ec6a93e0d82d6434f21467315b52ca326fed75c6e66d4be5d68465a2c478041686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_34D61B4A2A4AE0D3DDAB879224BCA77B

    Filesize

    488B

    MD5

    ca5f872e3f811a57a0327ba91aef7ad1

    SHA1

    a02b016a8d3e7e0d638bfa7130649f4de9cd8a62

    SHA256

    87b97dae62424a61eee5ad9a6f7c80cbeca819e22c6b1fa6e6be67cd03fe2acb

    SHA512

    9b40c93a9e7a83492f7845580ac61c8815a65faf26f6470c2ecea9bb0529eac086dba303633e4cdca15c74e51861f6775f994de32e2742af36258479e29a74dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffac83a5acbbdf696935140e63eb2ba4

    SHA1

    ceba1f304273eba4da3e9cc6de54520912f7b215

    SHA256

    ffb482d2e90b9e16497a728942e521887ffdcebd1a83f683d3d1412bfd84daea

    SHA512

    51282ac401f5d02adf4b033ad3b35ae1969696f6fa4a865467bef366c6176b5d9df3ea844787c45cc569dc517c766a804a2f77c8d169f7b99fa0ac4e049b1021

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63c60012689a6180b0e625ac5bfd39fd

    SHA1

    15d0221ce6501a4a53464e7207682a91f6c2e8c3

    SHA256

    aca95f9abec2c0bde29f65f45f8dbf389ccdb066ee8a47108d121e7d4317178d

    SHA512

    dc168b70022f406f383966035cefe9bd30ae2da238442f9961574e507d824916308781bc4504750927937744b4196fc75405c8c7def92c2b7590d47408d6f4ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    febbad7c4b1668b9b6d83bf208815df6

    SHA1

    9ddf893a58fa02c04a5a8b21a13c38e545777f56

    SHA256

    b4f2d288fb716320cae6090ed9bd5b8de8af7d0d435a2762909e3f4fab17181c

    SHA512

    d38be5a4b5cef940e957c4072ce9929c32942a2c7a8c78982266cff3118a2ca697a1489ac85c3398a304b253d9999280b188dad97c712f9a0b6502a28f6cd80d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5B1F6CF4A47750C9CA624A892D7823E

    Filesize

    504B

    MD5

    8e2ace97c80903660c3949a742f83483

    SHA1

    8c1b2f1417611a20e36b5ffb2f1252bc1423fea9

    SHA256

    63c22954a88744c323f08138fa097cdfa97b52eaa0910e9557d7a97e65a0cb77

    SHA512

    8fc2ce93e1ce24c11f30c4074f1aeedef7efa2d9ebbdc95e50f0897dae24357888d75dba8240913e20ed34624288864936280b6887379c080e776518373e8cb8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    7KB

    MD5

    ae19da20963109d739803f4fee40b3bc

    SHA1

    b6432212f9b9088a60bdf00c7913a188572e38a4

    SHA256

    1a15c3e367a955cde97aef76c0b966d09fe8abfdb732ef432e05c3f47b585150

    SHA512

    e425560861c89715d5dd9a0b50165a8c238dc1b2c614e8428f55a0a705236d1f4721e453ff8d89b2867d1d020e5a6e86e9ecf635ba83dacc0cd9842f432e31c6

  • C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy

    Filesize

    662KB

    MD5

    d42a68673a0159cf44884e5f8d0dc0f3

    SHA1

    c673c7283f9590b57e4107f4092bb7d6bc3dbd84

    SHA256

    96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2

    SHA512

    cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2

  • C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy

    Filesize

    662KB

    MD5

    d42a68673a0159cf44884e5f8d0dc0f3

    SHA1

    c673c7283f9590b57e4107f4092bb7d6bc3dbd84

    SHA256

    96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2

    SHA512

    cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P5MLJRPS.txt

    Filesize

    295B

    MD5

    f079efb13cdf7fe10f0b26025cfb06d6

    SHA1

    594d342ed52034481d93d102ff5b70086b570ffb

    SHA256

    0c87228e356ce6cabf6ca1ba08f8f22a58688577fe66aa6362829095c8a93a79

    SHA512

    d786987cd04fc7efd6b11bfb4114a2335e35bb8951be112c339fe8dbe84bab679a8e849b2c0db1228b2103a5a56fc1043008c458e83673ab024edac1821ec77d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YQYOHABO.txt

    Filesize

    598B

    MD5

    6ce519149f45ac24c61033c4a929ccc9

    SHA1

    ca08d03a7a6a7fbafd6059ebe1ec943298a3c37c

    SHA256

    256a02c68fffc762b82438f62fde3650696180d71912d0247d1d8df2ed2ca562

    SHA512

    d24f780949a3cb2b92b341801910a01e8768a67c3dc2cc904a684db01d6e021bbec80bf28b82edd083c3b77cb7c6a2ee549f012106af3796088c181e81578a99

  • \Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy

    Filesize

    662KB

    MD5

    d42a68673a0159cf44884e5f8d0dc0f3

    SHA1

    c673c7283f9590b57e4107f4092bb7d6bc3dbd84

    SHA256

    96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2

    SHA512

    cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2

  • \Users\Admin\AppData\Local\Temp\ziplib.dll

    Filesize

    453KB

    MD5

    6df0ed0afe162198116be68aba60e0c4

    SHA1

    bd0ca25ff4e495717be7345933aaa90755e5a6ca

    SHA256

    14172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc

    SHA512

    6696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757

  • memory/1112-60-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/1112-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB

  • memory/1112-55-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/1908-66-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/1908-63-0x0000000004A50000-0x0000000004AC7000-memory.dmp

    Filesize

    476KB

  • memory/1908-61-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB