Analysis

  • max time kernel
    100s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2022 16:46

General

  • Target

    8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe

  • Size

    1.4MB

  • MD5

    a4dbb08ea279a189b13ae5eb926a82fa

  • SHA1

    c1f0c28b659b534167c8887a29e74e11b3497974

  • SHA256

    8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3

  • SHA512

    cf265dc1576c383f7248b7c44fd8e029972e816f06d07b23cf861547989774f4f821a9d0b62bcecf77eac1fa507696b503c8309ce7324d54b3502e8c9d95947a

Malware Config

Extracted

Family

joker

C2

http://daohang1.oss-cn-beijing.aliyuncs.com

http://bbyz.oss-cn-shanghai.aliyuncs.com

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe
    "C:\Users\Admin\AppData\Local\Temp\8075ad48949e97a242c33eefd208411bc693e077df895331bf637e8d5581baf3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\speedhack-i386.dll

    Filesize

    177KB

    MD5

    f581898b2ff51c2ccca11993b693c628

    SHA1

    f3477f50a088579c7d132e7846848b4196b4f488

    SHA256

    4f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f

    SHA512

    08bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294

  • C:\Users\Admin\AppData\Local\Temp\speedhack-i386.dll

    Filesize

    177KB

    MD5

    f581898b2ff51c2ccca11993b693c628

    SHA1

    f3477f50a088579c7d132e7846848b4196b4f488

    SHA256

    4f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f

    SHA512

    08bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294

  • memory/548-157-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-178-0x0000000000400000-0x0000000000761000-memory.dmp

    Filesize

    3.4MB

  • memory/548-130-0x0000000000400000-0x0000000000761000-memory.dmp

    Filesize

    3.4MB

  • memory/548-137-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-139-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-141-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-145-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-143-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-147-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-149-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-151-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-153-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-135-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-132-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-169-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-159-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-163-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-165-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-167-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-173-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-171-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-161-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-174-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-133-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-131-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/548-177-0x00000000053C0000-0x00000000053F2000-memory.dmp

    Filesize

    200KB

  • memory/548-155-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB