Analysis

  • max time kernel
    154s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2022, 04:11

General

  • Target

    863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2.exe

  • Size

    2.5MB

  • MD5

    595dc3d8d8aa210a9583a719aefa3903

  • SHA1

    046bae99cac144b097e6535d0824b52422d86be5

  • SHA256

    863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2

  • SHA512

    1e8c361e5df1d3c89088078feb322e8676d5e4935f5e7e5beb2fe581f62cffebdf292f52c6cd0cb5072460e18c1b0e2604df31686b2991935fb742a0b8aff095

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2.exe
    "C:\Users\Admin\AppData\Local\Temp\863a5424650394e3eaf107fee05ecb81dd707f22a3f2bc90ebb595ef893d81c2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\2.mp3

    Filesize

    120KB

    MD5

    c3adbb35a05b44bc877a895d273aa270

    SHA1

    8afe20d8261d217fd23ccfe53bd45ad3bec82d2d

    SHA256

    b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c

    SHA512

    614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc

  • C:\Windows\SysWOW64\2.mp3

    Filesize

    120KB

    MD5

    c3adbb35a05b44bc877a895d273aa270

    SHA1

    8afe20d8261d217fd23ccfe53bd45ad3bec82d2d

    SHA256

    b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c

    SHA512

    614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc

  • C:\Windows\SysWOW64\ESPI11.dll

    Filesize

    120KB

    MD5

    c3adbb35a05b44bc877a895d273aa270

    SHA1

    8afe20d8261d217fd23ccfe53bd45ad3bec82d2d

    SHA256

    b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c

    SHA512

    614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc

  • C:\Windows\SysWOW64\ESPI11.dll

    Filesize

    120KB

    MD5

    c3adbb35a05b44bc877a895d273aa270

    SHA1

    8afe20d8261d217fd23ccfe53bd45ad3bec82d2d

    SHA256

    b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c

    SHA512

    614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc

  • memory/804-161-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-163-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-141-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-143-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-145-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-147-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-149-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-151-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-153-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-155-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-157-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-159-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-132-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-139-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-165-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-167-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-169-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-171-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-173-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-175-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-177-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-178-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-181-0x0000000003410000-0x0000000003431000-memory.dmp

    Filesize

    132KB

  • memory/804-137-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-136-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-135-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-134-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/804-185-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB