Analysis
-
max time kernel
106s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 06:46
Behavioral task
behavioral1
Sample
9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe
Resource
win10v2004-20220812-en
General
-
Target
9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe
-
Size
5.9MB
-
MD5
8c07d7d88f92b85c4d0c85cf391ca568
-
SHA1
43be5440ff01b2f14b8a631ed75520d1825882d3
-
SHA256
9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12
-
SHA512
05d68c246be2ff85172faaf926be4d727405b33610ca82fb7b44da752daf97396b8e72137e1bf8c7fc96000bcd33381ed2e965a02c592115ff9284859b7d3b9f
-
SSDEEP
49152:848YhxAx/OoOlL2bZ9v4cCiOaNnjS64uyjyP8Ix+B2hQf6Bk562RJvanw:wYhW94lCKSNnjS6Y3Ix+hyKv
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Loads dropped DLL 1 IoCs
pid Process 1600 9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 601e47a2cfded801 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372408603" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0748cb4cfded801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a000000000200000000001066000000010000200000009b16eb9f2648406ebb4cf7bf76ceafa596e8fe3a69f9ad69e4b738c3928ed592000000000e8000000002000020000000ba06c0b8d16cf88d10034c5ca749bcaa583e9e2ebfbb1bd64e0a941c0800bd3a200000005f1cf472de438fe4616d4e58f257b3c48fb5f5e1667a61ea7885e7b41ca164cb40000000a900b8807a5b0c576b2470bab195b9886913a567f310fcd50c0608a547cd7a80eef85fa699fbf48b096d08575ce98c1a9913d84f004285b4da0b89b195bf026b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB0D34A1-4AC2-11ED-BB74-42A406F29BB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 560 iexplore.exe 560 iexplore.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1600 wrote to memory of 560 1600 9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe 28 PID 1600 wrote to memory of 560 1600 9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe 28 PID 1600 wrote to memory of 560 1600 9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe 28 PID 560 wrote to memory of 1084 560 iexplore.exe 30 PID 560 wrote to memory of 1084 560 iexplore.exe 30 PID 560 wrote to memory of 1084 560 iexplore.exe 30 PID 560 wrote to memory of 1084 560 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe"C:\Users\Admin\AppData\Local\Temp\9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ossshiping123.oss-cn-hangzhou.aliyuncs.com/aaaa.mp42⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD590c4e3fd3c457bb4d25540ea323aed62
SHA11afb1c9b281ccd219d9ce300005e7afaca20e3dc
SHA25645c71bb9682cf881511c7d746b04db0696af9af954538a88c05a0e736fed5960
SHA512d3a9f74b752350cac85a3d8b1c008be651e82f60544f49d211fa27f86e8c46d6d8a9f07d43cace94aa5a3416788a35158646b0d085f713437899cb3219649631
-
Filesize
5.9MB
MD57422f1cba901c10e936badb5e5f90e2e
SHA13d61fd41c9dece546e7912a8645f9ef3b0b99ae8
SHA256235018968d33557a791dfca6a0433e5750dfe220cbc07906aa0c7e9facced6be
SHA5123cee6835e863a7d451dd368cac434afd8b6cd93454f9cdde56919dc9a243e999e01bf345eff57b8a5d1e545b876c12b9f13cd7ea40a9ebd9a4fe4c205099fecf