Analysis

  • max time kernel
    87s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 04:22

General

  • Target

    e03dae04b372e4581f8a39bd30c56b4435423c9209ea4d86dbd445faeefafd23.exe

  • Size

    943KB

  • MD5

    a31c29394aff003f6695119188032150

  • SHA1

    5695a7e86c933e9d20b71aa8e9edb85f3c68d2b0

  • SHA256

    e03dae04b372e4581f8a39bd30c56b4435423c9209ea4d86dbd445faeefafd23

  • SHA512

    ca0e10261d6f2f0cd3cebb723ad247ca02c19d8667063f4b4800aa155039257f4dcbf0701accf257aea8a03ef0384db5d4887f6965f7d2b10c84b3a47de9b40e

  • SSDEEP

    24576:sswE9bUix084d2mVWcaW2nrwqbqzcCnwcIcS:s1koPwxWvJfwxT

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e03dae04b372e4581f8a39bd30c56b4435423c9209ea4d86dbd445faeefafd23.exe
    "C:\Users\Admin\AppData\Local\Temp\e03dae04b372e4581f8a39bd30c56b4435423c9209ea4d86dbd445faeefafd23.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Program Files (x86)\shandian\shandian.exe
      "C:\Program Files (x86)\shandian\shandian.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Program Files (x86)\shandian\bin\shandian.exe
        "C:\Program Files (x86)\shandian\bin\shandian.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:276
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\shandian\home.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCR\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command" /v "" /t reg_expand_sz /d "C:\Program Files\Internet Explorer\iexplore.exe http://www.jlbnh.com/?tn 3" /f
        3⤵
        • Modifies registry class
        PID:1140
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\SOFTWARE\Policies\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.jlbnh.com/?tn 3" /f
        3⤵
          PID:1824
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.jlbnh.com/?tn 3" /f
          3⤵
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          PID:876
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x50c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1812

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • C:\Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • C:\Program Files (x86)\shandian\bin\shandian.ini

      Filesize

      74B

      MD5

      9d36846620a1b56a9d5ace29337db49f

      SHA1

      93ed1fa019a7b263b38403811af5042688b2100a

      SHA256

      4b2d9733336aa571d89b34849416e1254d3361cca692ebf97a85c7ca122d2284

      SHA512

      5b84f8323fd4fed102d9c28c687524560fb051f51ed6c57d71e355357342d93b87362c012695454df56d64dcca012f0df023109e66296d3f079002ac089da88e

    • C:\Program Files (x86)\shandian\config.ini

      Filesize

      145B

      MD5

      4153026849974b788269916d89b87cb0

      SHA1

      826d1e632022978e6e950d456985864d2919606d

      SHA256

      9e642f520533505e601b8593eb36ffec7cb10f101e599a535a5708a0b4a905d5

      SHA512

      12fb36f11ce2b28a22f96e73cd76c65af2e0787572f4bbe8e78914462bb88bf27b75b3685c995639782ecda0b3ce99660c2bc7fc6ebfdcff25da33b95a7396ff

    • C:\Program Files (x86)\shandian\home.bat

      Filesize

      703B

      MD5

      32ae016db9efcbe0b1ec1a94c2d6e2eb

      SHA1

      376cf1143cce54a01132e24bce677aa7210dc045

      SHA256

      8b3b6b6e773017a797ce6b9575d36fdef7b959522bc399df8315c8bbb9af7c72

      SHA512

      08e3f77fc072881ad9b4942051a5c12032d6e42eed3cd29dc90d1e31d452f8bd682ab9ccfb40720a2d2d67151c5076d6b049d1e4e6c6010e1f235866006ad3b7

    • C:\Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      ec8ff3b1ded0246437b1472c69dd1811

      SHA1

      d813e874c2524e3a7da6c466c67854ad16800326

      SHA256

      e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

      SHA512

      e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6C7617C370060193ABB4C6A6FF28D1D6

      Filesize

      503B

      MD5

      cbebbcb41a6c3b094c5902e947b7b2eb

      SHA1

      d2e971a245a59bb4bad1a80fdac668aaeccc9994

      SHA256

      b8bc8729088722724c5e44f23683f1ac24f0ab5fe0227cdb99f7feff13aed223

      SHA512

      e2f626b52b5ada3e013959dc3af624a0c1fe7fac38173d25647a0a82fd29ab0806ce86e4ef3288a240190bece5cdb65b6b1e2b7532724ab3f2ab4f735d75d03f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      c60a4cbfdb2f568c6998bac06cf83203

      SHA1

      a8b196fdb53ffc8fd459c78d2259c83b52fa9e02

      SHA256

      773672029a8ec51ca69e84e4f00ea5e362c73da7ca6971b9706064cbc3565071

      SHA512

      852e6e34c126d1839e7e1db8a0f8dd5704ec928dc36c6e4fb4248b5182339ae9411b942ea686a4b07cfbd1863bbfa46167ff858f177c9c3eddacdfb955d022dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6C7617C370060193ABB4C6A6FF28D1D6

      Filesize

      548B

      MD5

      7dbd76c6af811eddad9b1bbf29415f76

      SHA1

      a87511c8a91c10ff7abc463f62acc4ed718c3616

      SHA256

      dff0c10fab3802548e3618c8d32b6550019bfc735ed4d34bfda089443cc489ab

      SHA512

      b76210ae2fe1d41273a161727b3edc5f02c01132a9f3c880da20c422c0f1f4591922b8651c66774ce2e90c60378fe058f379c6f0f3d11c934d66e5e9339c420a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      340B

      MD5

      ee7a47de08011349253de30c68e4ef5d

      SHA1

      e012924962ba890e7ea210ddd206021ebe6ab0a3

      SHA256

      9138e9e23ac64f154848cf807c4dcbcea98e41e3643642fb16687b2fd881b95c

      SHA512

      f430fbd28d27281019119e3644572cebde19eb9576bde03c26c8ee04fd6500629f1c16f4471428cfc713a0dd2fd19fda09c8c89d39f457fe150d70f1e90c4f0f

    • \Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • \Program Files (x86)\shandian\bin\shandian.exe

      Filesize

      1.4MB

      MD5

      0b8c8dd921f439cdba4e2bbb63fafa6e

      SHA1

      c00954b5413f7773db7800ab83644eef9af1a6d1

      SHA256

      77ee2e0a6d9b3be61a86f187487d856bc0ea35b935247bc88036b5e350fc56ef

      SHA512

      5f2aeabf0de4a56dcb1b68111805f1f4db2f319ad4b313701e7c9f41a6c5095acb3c5ac7553d2cd120a9fdea463cf9f61b4c66f17be8c4719b7dc01f5cb018c8

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\shandian.exe

      Filesize

      96KB

      MD5

      b442fa57a35ce2505b4ece4a18d0239b

      SHA1

      28f6045d76bc77c76738c8f6128b7d6ec65b1865

      SHA256

      0063f24996e1b897ee94d51fc53593fda3a1c293ecde20f1b921e5e8ee56b4cc

      SHA512

      420d12e775a793be3230116464deb6c8e1fb442f33600237fa798ebd1e46a66ca4eada265f8eab6644573c098662538af9aae9cfbaea946efbc310923348fe57

    • \Program Files (x86)\shandian\uninst.exe

      Filesize

      119KB

      MD5

      9d6528499866e9c26b196d2d5acf68d6

      SHA1

      03d87e5c3d789c96dd06b93ea9dfa003e6ccef32

      SHA256

      6ebe7cfce2b08f96e9a516c03c8078dda90c466341d0e6282fa9156be8142976

      SHA512

      4ff296d66ab797e62ad821272d84a99a6fe9898ba2e909e6742fa2ef2fc8cf0e53e7cb6127f68fc5d7253d9cead97313acd4232e86b1c3878dfb27cc7084f81e

    • \Users\Admin\AppData\Local\Temp\nst2BB4.tmp\Md5dll.dll

      Filesize

      8KB

      MD5

      a7d710e78711d5ab90e4792763241754

      SHA1

      f31cecd926c5d497aba163a17b75975ec34beb13

      SHA256

      9b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2

      SHA512

      f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0

    • \Users\Admin\AppData\Local\Temp\nst2BB4.tmp\System.dll

      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • \Users\Admin\AppData\Local\Temp\nst2BB4.tmp\bind.dll

      Filesize

      56KB

      MD5

      b2181e501ce4b03aa5b01d63dbec0b6e

      SHA1

      3bdf5e76795d87fd005080ccc84596b16c407364

      SHA256

      40a9e5e0e902a55218361f6965e909c900866eb1ebe6d7b193a077805fb89394

      SHA512

      ca48994bc13c3c1a4fa50a969a4add2c2caead38fd64d705f83ed372039d9461cc45f898fd7012f2e399f1da62f51a799a9ad9f1fb5b8cf40ae4070e774ddc0a

    • \Users\Admin\AppData\Local\Temp\nst2BB4.tmp\xID.dll

      Filesize

      9KB

      MD5

      3a5ed71aa9c6846d95d57235c4c443d7

      SHA1

      08156d29bed654f8f8d7f46ddbce84d22d4710cf

      SHA256

      5e3fa4d610cb2d80ed9991cb2562bd70c5b4d49dbcf4e42a1017c59eedbe28a4

      SHA512

      5cdb5059020c20a83f230ae2d75bfb6fd69a03418ba6407336db9f0c653fea1e8f4a51400812da81a8bde2f6e4d95fd80e29eb462e818ddbd881789c00d5d1d1

    • memory/276-81-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/276-82-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/276-85-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/276-84-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/276-86-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/1436-54-0x0000000075601000-0x0000000075603000-memory.dmp

      Filesize

      8KB