Analysis

  • max time kernel
    136s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 11:26

General

  • Target

    c3a02f68d52272cc19f0ffb3172fdd68c5da0e6bb7b8d875b1cab9941aca6387.html

  • Size

    23KB

  • MD5

    09533fef07cd6ff8b08ce64c05f1f12f

  • SHA1

    be3b086d986143eb7978d71c019f587a2e9a9add

  • SHA256

    c3a02f68d52272cc19f0ffb3172fdd68c5da0e6bb7b8d875b1cab9941aca6387

  • SHA512

    16088997c48e22961d5bdd7c4e970a6eb7f819596c607c848d2fe611268546e776205085716275d6bdbf8bfddbd0dfc2f54763b8e6e66da051e6dbd01d36e296

  • SSDEEP

    384:Iz1ze4tI5NHs6UuqPloHTAo6HJok+YBobdLo3afuomaYoWFGoUU3ofzFodJGTHnY:IBSXNzUHP6T6HN+xdiaf4aOFyUez2JG0

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c3a02f68d52272cc19f0ffb3172fdd68c5da0e6bb7b8d875b1cab9941aca6387.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5080 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    520071a63bb5e2038486cd0ce14055b1

    SHA1

    752cfb61bbe3ae1e2c2609c53aeee510661a59ed

    SHA256

    f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8

    SHA512

    6f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    8bd6aa006dc7bc4c78b94f96fc0de09b

    SHA1

    16cea7ef89730063cee6a558b099c2c57456d2b8

    SHA256

    8307baaf309b4447c95c2c3d8552db0a49c60995fb45359b027c61fe94551be4

    SHA512

    a983d70eaa22bf95760b6420a0d68c367de0a0a28a0cba19144e631bb1e76a9997e5f97d040e4c49586f4e26f488b8e3ba5115d8f40276eb6775ff0ec8c9b75f