Analysis
-
max time kernel
122s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 18:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tgsgp.oss-accelerate.aliyuncs.com/x64/Installers/T888CH7/tsetup-x64.4.2.0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
https://tgsgp.oss-accelerate.aliyuncs.com/x64/Installers/T888CH7/tsetup-x64.4.2.0.exe
Resource
win10v2004-20220812-en
General
-
Target
https://tgsgp.oss-accelerate.aliyuncs.com/x64/Installers/T888CH7/tsetup-x64.4.2.0.exe
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2400 tsetup-x64.4.2.0.exe 4584 tsetup-x64.4.2.0.tmp 1564 Telegram.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Telegram.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 467899b2bcaed801 iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{DE6B6B37-1EA8-419D-B3E0-14CBDC238606}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6DBB271D-5570-11ED-AECB-E23A5D90AA50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30992765" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373582667" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1114995231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30992765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1114995231" iexplore.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg\shell\open Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\DefaultIcon Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\shell Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -workdir \"C:/Users/Admin/AppData/Roaming/Telegram Desktop/\" -- \"%1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\shell\open Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg\shell Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\URL Protocol Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\ = "URL:Telegram Link" Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe\" -workdir \"C:/Users/Admin/AppData/Roaming/Telegram Desktop/\" -- \"%1\"" Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg\DefaultIcon Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tdesktop.tg\shell\open\command Telegram.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg Telegram.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tg\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Telegram Desktop\\Telegram.exe,1\"" Telegram.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1564 Telegram.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4584 tsetup-x64.4.2.0.tmp 4584 tsetup-x64.4.2.0.tmp -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 4584 tsetup-x64.4.2.0.tmp 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe 1564 Telegram.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 3552 IEXPLORE.EXE 3552 IEXPLORE.EXE 1564 Telegram.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3552 2980 iexplore.exe 82 PID 2980 wrote to memory of 3552 2980 iexplore.exe 82 PID 2980 wrote to memory of 3552 2980 iexplore.exe 82 PID 2980 wrote to memory of 2400 2980 iexplore.exe 90 PID 2980 wrote to memory of 2400 2980 iexplore.exe 90 PID 2980 wrote to memory of 2400 2980 iexplore.exe 90 PID 2400 wrote to memory of 4584 2400 tsetup-x64.4.2.0.exe 92 PID 2400 wrote to memory of 4584 2400 tsetup-x64.4.2.0.exe 92 PID 2400 wrote to memory of 4584 2400 tsetup-x64.4.2.0.exe 92 PID 4584 wrote to memory of 1564 4584 tsetup-x64.4.2.0.tmp 95 PID 4584 wrote to memory of 1564 4584 tsetup-x64.4.2.0.tmp 95
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://tgsgp.oss-accelerate.aliyuncs.com/x64/Installers/T888CH7/tsetup-x64.4.2.0.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3552
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\94PW68LC\tsetup-x64.4.2.0.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\94PW68LC\tsetup-x64.4.2.0.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\is-GSUGP.tmp\tsetup-x64.4.2.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-GSUGP.tmp\tsetup-x64.4.2.0.tmp" /SL5="$501F8,36322295,814592,C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\94PW68LC\tsetup-x64.4.2.0.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"C:\Users\Admin\AppData\Roaming\Telegram Desktop\Telegram.exe"4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35.5MB
MD57c9b45db295868dac64ad9e927c02f51
SHA13ea928ab4cf506b703f9345e4b1f3ad522b242e9
SHA2563f2e13e69c5eb5dc2a46fd627c4116f0dcf97376152b5f960d867cca93446d8d
SHA512b9064f888a7206fe99df2568d2c427a431b171ec6b0aaa9f352c6b9f35bbb9ea86c376b62677faf9cab688178a6db10175392e187d1416130fab7adc8ae90451
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\94PW68LC\tsetup-x64.4.2.0.exe.q3fzbkd.partial
Filesize35.5MB
MD57c9b45db295868dac64ad9e927c02f51
SHA13ea928ab4cf506b703f9345e4b1f3ad522b242e9
SHA2563f2e13e69c5eb5dc2a46fd627c4116f0dcf97376152b5f960d867cca93446d8d
SHA512b9064f888a7206fe99df2568d2c427a431b171ec6b0aaa9f352c6b9f35bbb9ea86c376b62677faf9cab688178a6db10175392e187d1416130fab7adc8ae90451
-
Filesize
3.0MB
MD5ce3b2ef0b07d1770ddd8fa09a34138de
SHA1d07d12411d4a95cd26701fe83eb6d90d81103eee
SHA25622e0e4420698350d18a6c02244c5fa1ff2c772eacb9e7019a8f212b479934386
SHA51202edc78f9b7c8ad01a79243bbc7b51d2b86fb650535d134cc06360519b49ed30241de5cb916ab0624098e2b2b4c94b246e0fcf19e513b4e526100d46db652442
-
Filesize
3.0MB
MD5ce3b2ef0b07d1770ddd8fa09a34138de
SHA1d07d12411d4a95cd26701fe83eb6d90d81103eee
SHA25622e0e4420698350d18a6c02244c5fa1ff2c772eacb9e7019a8f212b479934386
SHA51202edc78f9b7c8ad01a79243bbc7b51d2b86fb650535d134cc06360519b49ed30241de5cb916ab0624098e2b2b4c94b246e0fcf19e513b4e526100d46db652442
-
Filesize
114.2MB
MD5fb3be1dcac7e48d44cb355c261776f2f
SHA1cba72d43c128c77093866d3a48fe6fa2f0a8c33f
SHA2561b6cad5a326748b2faa1180a269a73332df2ee933b5646ceb0bdb83ba4bd24f7
SHA512a6932b5fb04f5a9472c17e05102a522cc373578fd2f7244df6aa20f3cc92c5d02d71cee01ce2e302596044d88a59f7c0acb59599f1d04f0cc6208d3a364e9a61
-
Filesize
114.2MB
MD5fb3be1dcac7e48d44cb355c261776f2f
SHA1cba72d43c128c77093866d3a48fe6fa2f0a8c33f
SHA2561b6cad5a326748b2faa1180a269a73332df2ee933b5646ceb0bdb83ba4bd24f7
SHA512a6932b5fb04f5a9472c17e05102a522cc373578fd2f7244df6aa20f3cc92c5d02d71cee01ce2e302596044d88a59f7c0acb59599f1d04f0cc6208d3a364e9a61