Analysis

  • max time kernel
    90s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2022 05:07

General

  • Target

    29cf677f3259c567880791f3c08c048f9e97726c59b46b7b9f9361ac13de08a5.exe

  • Size

    918KB

  • MD5

    72233abb3b0ab88ffcb01d0c5840d890

  • SHA1

    361c6f8569a5e2d16c1bc9d92fd6702de6af124c

  • SHA256

    29cf677f3259c567880791f3c08c048f9e97726c59b46b7b9f9361ac13de08a5

  • SHA512

    56860c804740567412679ad11abd6714337da710a245873dc753c5db06c68bd7be1e61a08765fb545fe2f6a4f43ecec292d43d66ed2f9ab94e920e470a023882

  • SSDEEP

    24576:VBmTZE9bUix084d2mVWcaW2nrwqbqzcClwcbcI:qkoPwxWvJNwiT

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29cf677f3259c567880791f3c08c048f9e97726c59b46b7b9f9361ac13de08a5.exe
    "C:\Users\Admin\AppData\Local\Temp\29cf677f3259c567880791f3c08c048f9e97726c59b46b7b9f9361ac13de08a5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files (x86)\shandian\shandian.exe
      "C:\Program Files (x86)\shandian\shandian.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Program Files (x86)\shandian\bin\shandian.exe
        "C:\Program Files (x86)\shandian\bin\shandian.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:1540
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\shandian\home.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1392
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCR\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command" /v "" /t reg_expand_sz /d "C:\Program Files\Internet Explorer\iexplore.exe http://www.jlbnh.com/?tn 3" /f
        3⤵
        • Modifies registry class
        PID:1648
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\SOFTWARE\Policies\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.jlbnh.com/?tn 3" /f
        3⤵
          PID:2012
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.jlbnh.com/?tn 3" /f
          3⤵
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          PID:1488
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x578
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1864

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • C:\Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • C:\Program Files (x86)\shandian\bin\shandian.ini

      Filesize

      74B

      MD5

      9d36846620a1b56a9d5ace29337db49f

      SHA1

      93ed1fa019a7b263b38403811af5042688b2100a

      SHA256

      4b2d9733336aa571d89b34849416e1254d3361cca692ebf97a85c7ca122d2284

      SHA512

      5b84f8323fd4fed102d9c28c687524560fb051f51ed6c57d71e355357342d93b87362c012695454df56d64dcca012f0df023109e66296d3f079002ac089da88e

    • C:\Program Files (x86)\shandian\config.ini

      Filesize

      145B

      MD5

      fa40f1eae346621af2002e64f964c891

      SHA1

      4c834cebf5f3844896d7880b9982650a89bc8cf3

      SHA256

      498779b7b777e513b48c9e465157d65e05d890b227eb00b7f48393e525c2f31a

      SHA512

      0488de3d58e72514f1ac9642222afe2f62a111fb5438d3ad349b380c32dfd97bcca66b367b5cfab7da4a98166a28b44549406b5bcc88f4aec77e54db69225e6a

    • C:\Program Files (x86)\shandian\home.bat

      Filesize

      703B

      MD5

      32ae016db9efcbe0b1ec1a94c2d6e2eb

      SHA1

      376cf1143cce54a01132e24bce677aa7210dc045

      SHA256

      8b3b6b6e773017a797ce6b9575d36fdef7b959522bc399df8315c8bbb9af7c72

      SHA512

      08e3f77fc072881ad9b4942051a5c12032d6e42eed3cd29dc90d1e31d452f8bd682ab9ccfb40720a2d2d67151c5076d6b049d1e4e6c6010e1f235866006ad3b7

    • C:\Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      ec8ff3b1ded0246437b1472c69dd1811

      SHA1

      d813e874c2524e3a7da6c466c67854ad16800326

      SHA256

      e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

      SHA512

      e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6C7617C370060193ABB4C6A6FF28D1D6

      Filesize

      503B

      MD5

      90b8af1245fa9a9aa55b050aeadc1b24

      SHA1

      37fdb1791913a257d9e855e2fe44fec7ba85759b

      SHA256

      575235b9fe3088d769b78faff10662cfd13954cf477eb0ef951bc1671f1755d1

      SHA512

      aeb648a72c34e7cb476aa02a3b0e3ed198ef7cf13fb5b21e154066fcf93f3337581469295ad4796c5019015c152c56ad33053f695b4dbcd75d952fe609254b7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      0d7b78b5124c80f98ed7238f443a66ef

      SHA1

      5101434c67d7dccb367cf51722d85a34b2cabc3b

      SHA256

      d86f7086417f975db3818cd42ad6f275a05afd47c5472e5150a78719ed882d20

      SHA512

      6c6566e3e06753243e5c0495e0378cd6274dee0944b8f18ac441f221f7d9f7e5ba99b12a364ceb4e540b54891cbb512bf3b2ba0a567fea32630eef0d55e4f26a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6C7617C370060193ABB4C6A6FF28D1D6

      Filesize

      548B

      MD5

      8b7c4c7e17335af4ca76f99f9f00d60b

      SHA1

      0d580a6c73b808fe33d922d169f3ec3f814816fc

      SHA256

      2a551c77bed66953f36d09e2760bfca321a04f7a9967df91bd963f05888a4e25

      SHA512

      eb865691808f6b8db042961e4782984abd95b50284e2e5a1eae1c17d788c3dc5caa0ef8d9b48099291bde3f3ad3223ce04d93a1feb296386037f369a8b2fb697

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      340B

      MD5

      598da45eb52e30cc4c9322c460bf69c1

      SHA1

      7b3089cfab63489b1007166fe5ac0061cad289b7

      SHA256

      b1b8f863067eab509627e5e9486688f57eee5c3f3e29768b37ebde2464628e72

      SHA512

      ee92c20fb442b7578c08f8f0c01865658c2e2978aa0b3a281e8e74229b3e6587b190d26bc69dab9b44318b3eebad057e787bf25d3bb923c35b694d45ab01bcb7

    • \Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • \Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\uninst.exe

      Filesize

      94KB

      MD5

      674b1f11337c2d0334d5441a749b1e26

      SHA1

      63befb477ab4af153d4c851341a1daf6f0d8923c

      SHA256

      eb2273cbde197d713c51e7617f4fa0bf7f7b50f70bb261e66c6ef05806251dcf

      SHA512

      4908a417eb6aca1c583e15a022a642ca219b86eded0433fbde4170803097b061c946596b84402800d0cc13971525d5668c43540a2b4e79834c61e9832cf22c4a

    • \Users\Admin\AppData\Local\Temp\nsdFF28.tmp\Md5dll.dll

      Filesize

      8KB

      MD5

      a7d710e78711d5ab90e4792763241754

      SHA1

      f31cecd926c5d497aba163a17b75975ec34beb13

      SHA256

      9b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2

      SHA512

      f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0

    • \Users\Admin\AppData\Local\Temp\nsdFF28.tmp\System.dll

      Filesize

      11KB

      MD5

      00a0194c20ee912257df53bfe258ee4a

      SHA1

      d7b4e319bc5119024690dc8230b9cc919b1b86b2

      SHA256

      dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

      SHA512

      3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

    • \Users\Admin\AppData\Local\Temp\nsdFF28.tmp\bind.dll

      Filesize

      56KB

      MD5

      b2181e501ce4b03aa5b01d63dbec0b6e

      SHA1

      3bdf5e76795d87fd005080ccc84596b16c407364

      SHA256

      40a9e5e0e902a55218361f6965e909c900866eb1ebe6d7b193a077805fb89394

      SHA512

      ca48994bc13c3c1a4fa50a969a4add2c2caead38fd64d705f83ed372039d9461cc45f898fd7012f2e399f1da62f51a799a9ad9f1fb5b8cf40ae4070e774ddc0a

    • \Users\Admin\AppData\Local\Temp\nsdFF28.tmp\xID.dll

      Filesize

      9KB

      MD5

      3a5ed71aa9c6846d95d57235c4c443d7

      SHA1

      08156d29bed654f8f8d7f46ddbce84d22d4710cf

      SHA256

      5e3fa4d610cb2d80ed9991cb2562bd70c5b4d49dbcf4e42a1017c59eedbe28a4

      SHA512

      5cdb5059020c20a83f230ae2d75bfb6fd69a03418ba6407336db9f0c653fea1e8f4a51400812da81a8bde2f6e4d95fd80e29eb462e818ddbd881789c00d5d1d1

    • memory/1540-83-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/1540-82-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/1540-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/1540-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/1540-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/1792-54-0x0000000076321000-0x0000000076323000-memory.dmp

      Filesize

      8KB