Analysis
-
max time kernel
186s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-11-2022 03:46
Behavioral task
behavioral1
Sample
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe
Resource
win10v2004-20220812-en
General
-
Target
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe
-
Size
2.2MB
-
MD5
8b0f3f1c2a1fc87da08710797a1c39c5
-
SHA1
c583ab8a7f693339c8030ac04d1b0e78568ded7e
-
SHA256
8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3
-
SHA512
12c3f69740a6dfd626afef90160e56f61993fd74e74088a735bf55cda3e43ca7ac6df30f44a64e983b797e8f57c3d83e5652e38c3dfa2904f0d783a32eb2edb9
-
SSDEEP
49152:1+OqalWMb/c2NwvgT8ip0arWP4Dr7pwxUy6nHk+84I:1+WUMb/c2+vgx0arWP0r7pwEnHk+jI
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
resource yara_rule behavioral1/memory/1948-55-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/1948-56-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/1948-57-0x0000000000400000-0x000000000083C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\Total = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\Total = "252" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\jjkkba.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.jjkkba.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000ca9562febc11cbcfc2552035e4eea707c5799e15cffe26121c71e67c0ff66709000000000e8000000002000020000000afc7ec4b3dc4407e3cc855efde0d72cbc74ae35d5191de04a69c3dbbe4604b7a2000000015daa8bebd0ae0e2a70a42c8a3d8816b38b4b0530526fc4425929d2b8b09e015400000007c3e654bfdd7303f664ed98cdb9e91cd28f70487c7f7e6ed6f15646acadbcd2db84d9f512a4d0dee62a1901eaa8b34a1115d3d42bc9dfc7438691949bdd74760 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08ff7a1f6f3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\ = "189" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\Total = "63" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.jjkkba.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\jjkkba.com\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\Total = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\jjkkba.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\ = "63" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\ = "252" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "315" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374734215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\wmbt6.xyz\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{971FB651-5FE9-11ED-991C-C6F54D7498C3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "252" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 1040 iexplore.exe 1040 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1040 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 29 PID 1948 wrote to memory of 1040 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 29 PID 1948 wrote to memory of 1040 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 29 PID 1948 wrote to memory of 1040 1948 8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe 29 PID 1040 wrote to memory of 1796 1040 iexplore.exe 30 PID 1040 wrote to memory of 1796 1040 iexplore.exe 30 PID 1040 wrote to memory of 1796 1040 iexplore.exe 30 PID 1040 wrote to memory of 1796 1040 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe"C:\Users\Admin\AppData\Local\Temp\8ee74816b2030c07ba054bafd2a9fe3b3fb46609d386b4daef35e528e68eead3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.jjkkba.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf5e4f0364862a788e68a0b183ae0ca
SHA1bbe0bc187ed7d81dca1fae10551842105bc251b1
SHA25690261f13a39d686c4b4a8824d80745b4006d9f80d265ed71bb882080d2d82476
SHA5123d2838076d0ca90ab867f196f3e37a93920b42d17e98be3b06ae5732957c81eff8639d1c90b9a48fb7779efd63e3f997d7f031a2d09570eab52683069ee82573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58b7782e0c8a8c42b754a7f7c6b072853
SHA17105eb981a3ce235b7d19498eb8c1688194612d3
SHA256bf4559b4ea0bd285e59b92978e825740dea4f9c61faa62618368d8a23d5ef80b
SHA51253a9adce3672c918dffc033797b3ad8d69d2b81f6288bcc51c3288e415b698636c152a14a0542ccf866dad95c52d4d1ee17139572ac3c65d1833a011fb1e647d
-
Filesize
5KB
MD5cfad667ef64eae44734db3ccf9e263b5
SHA18f91c386da7249b7c4c9e1ddb3520dd43dfa2416
SHA256d91d25272dfef4b1d434835d64aa8f12d962ccc5493c09f9a09edd44c8646091
SHA51258667479e6e142e48d0456637a7ccdbeb0d0d25c8fcd037de538a9f28e256c0fa1ddc48caad7f41f7f52d1d99dc727630148f730ca4511ec2158bcd331dda249
-
Filesize
608B
MD58fbd54637a5afd6cffabbcc24153596a
SHA1c72b224f5e3077e57b2cb9b660e42c2fcc1d86d5
SHA256eaab09d02fe9c60da8e3e71a2db4063df487d3cb30b2a7b986b46a66824f5e9e
SHA5126101c887ddf892e7ffb659121e9c3e4d0defbb21ca22baeaaf85214bca6f83fed28b35bad499ce4e2ce697e98f7a303c199cdc7fcd6853ed0c4438bda9657c22