Analysis
-
max time kernel
174s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-11-2022 20:26
Behavioral task
behavioral1
Sample
176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe
Resource
win7-20220812-en
General
-
Target
176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe
-
Size
4.0MB
-
MD5
6481509a5d3a32abdef685297980f7d8
-
SHA1
b9abfb0457909be6ff5ba2facddfd2c185f862c0
-
SHA256
176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f
-
SHA512
2bb86030b6e832d0c2627029f4d9d42d40efdafba4452a1420b88fa888c8472d42bba07d87f2c22a45980da51e9bd1062a0c826a31ac7eff12d14b88f2747d0f
-
SSDEEP
98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBE:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBE
Malware Config
Extracted
joker
https://htuzi.oss-cn-shanghai.aliyuncs.com
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/1152-55-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral1/memory/1152-56-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral1/memory/1152-57-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral1/memory/1152-58-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral1/memory/1152-61-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon -
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374794243" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c57f3282f4d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58D5AD01-6075-11ED-A6AC-DE5CC620A9B4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf0000000002000000000010660000000100002000000063a9a2b7201b39d2e9328fd50f18c914f1b9bd58da6819daa552f2f0cf85431f000000000e80000000020000200000007b4cebf4c611a983d5715879d74bee8ec648a722e36590c912d3547c0653861020000000536847303a263327550153d770cad5322127d9470be59a9be3369080c0c3820c4000000068d519ba7ec76fc2aea7ba420efb705d508272abf4bd13da003737cf0af301ac35816957032f322febeda0880f486a95509ad447531edf7baae299582c4fb063 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1544 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 1544 iexplore.exe 1544 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1544 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 29 PID 1152 wrote to memory of 1544 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 29 PID 1152 wrote to memory of 1544 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 29 PID 1152 wrote to memory of 1544 1152 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 29 PID 1544 wrote to memory of 1752 1544 iexplore.exe 30 PID 1544 wrote to memory of 1752 1544 iexplore.exe 30 PID 1544 wrote to memory of 1752 1544 iexplore.exe 30 PID 1544 wrote to memory of 1752 1544 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe"C:\Users\Admin\AppData\Local\Temp\176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.htuzi.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA0A17BC17FF10008872A7205D0D43E2_608DEF97DFACECDA8E97C6F270153A4F
Filesize471B
MD56bc53d1b58d3ccc275dcaba9903c40d8
SHA16a85754c77df04415a10ad39f46b18da70f92208
SHA2567b88cfc849ba2b2ccd5f4666b29d2701eda5014796b1a4be7a7d316c19060f8c
SHA51235bdc644cb73a726cc0955af88bcabf0465e7a4e9734476f63bac73974781f9514999b52d6c03d1b2c694d412955457f69cd8539fecd725aff3ada687289070a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD56748435832b5ba1f2d9d5cb5222fdd36
SHA1aa0dfa622427a599972d3747b5b771c8f53835e3
SHA2567331cebdc634d5f3c1a8b5fe16591095dd530b0dc0a4855c1f94b05f8c43c58e
SHA512bc1625fac97aef15a878f40590b20acc31d6b3e5c5262cb188cf2aed56035e33fe704367985c254d60669c8cc975b6ed2bbb91331efc98b6199c7a00e4bb0ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9ed7ad6291a0bc569ce42fa6a9d92e
SHA164624f5baad50e4930b8c3b10ac5c646a8ce8ecf
SHA2565dd6ca2519449e3299bb69a0234fb64539955aa0544258f573e186b918088098
SHA512ca46dbc4731463f0c626d95e9caf562620b4bb0fda142e9afebd306c408c14e2d74fd8e37466335a959b8bb24599b489c826e1b5c1cd33ce93f6bc9bb40968db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FA0A17BC17FF10008872A7205D0D43E2_608DEF97DFACECDA8E97C6F270153A4F
Filesize424B
MD5c2442a2335fcf5ae7f4f6833b5da88d2
SHA1331ce683bbbeffebdfd003b2a5b8c8693907a19f
SHA256fe161ce7a1f13c068d2a273db9ab0c7298a64b24781388e6d65729f52325a75c
SHA512de37fc830cbf8d31f94d19171505a105e2d45957c46153a37c849ad7357ea5890fbd7f836155982a72c9e69c1d176bf60d662fe7b84696fb677ca28fa826aa18
-
Filesize
38KB
MD5104dce06b70c072199490f0c3c2de6a4
SHA1bc81368d2b966fa35f46a690d022615691892cef
SHA2565af5cdd945d2ad669b2009e32598184ee9706fd117f571605428f7b68a7e3297
SHA5120a32b986510d06f0c9f45f68ad185fe58226e7b00bb67a659b18cdfde4d94551685bd3faf6c4dbb3ed5ac7a2ede6c50d647db560db438439c2ea50fe941fa65a
-
Filesize
608B
MD583701d9249a93a10f6daee9d8ca91364
SHA170fffddd6028104e1eadf5654d40fc7a1cb556ca
SHA25614009120ed3df70dc4cc3d163a4eb1f21392aaf1b1f3fbb525d7019a77a144be
SHA512e05de9678a8070c75abad94e88abbe40b89f3203e8c448fb84326342d4d2a92dfd9629079691c89bf83d92b3d8180b6554c90e48261b54bd15e20df1723f9ed5