Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 11:26

General

  • Target

    55f72096f239c15a431824fd66903d9b6a6775e396bc5bc0516570bfe7b19efa.html

  • Size

    847B

  • MD5

    1bbf4e1164988857f92045acef21e6e4

  • SHA1

    144fdd1d66037fc5ed95edd77eaea6fd0efdc1cc

  • SHA256

    55f72096f239c15a431824fd66903d9b6a6775e396bc5bc0516570bfe7b19efa

  • SHA512

    218a620f5c6d0d060bd5c5b64e21e49fc2560e8cf82653f182228345c15253a2084d0eccc370f503c61e34de9f8315f34cfa09d96f5de4ab9f668258c73c8361

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55f72096f239c15a431824fd66903d9b6a6775e396bc5bc0516570bfe7b19efa.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    54c28c59087ba329b1b1c25d9469cf5e

    SHA1

    4c6016d329bea708f7526d6050cac5627622eaf1

    SHA256

    d94d223645e191a2c5e66c72af32bcdce869f8a4d2bc5af7235486134d3844b5

    SHA512

    29b5b07a9d5caaafc0819d99a3adbe366a04df7f1711be01d07baec7f6037b03a11c01035b148ebceb3dc98da61a1f478eca8a46bb01045799ee60e3efc2d037

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    22f5cb1186334f42bd10a719cd9e6850

    SHA1

    48f177ba53a6f163a97c27c66957c434e4720035

    SHA256

    8308fee088d9ee9b62a8c70bf00d25c18ee705de7d3fd944f830875b182b5a61

    SHA512

    bfa2d22fb8d399f723fbd7478a0f745022c0b935589e5e7836b2e5ebb6d672aaa8f4f4fcd6f8241f8d20f730d71084ed56d6ca17b03f8beb36045fc32418034b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D7XBB2HU.txt

    Filesize

    608B

    MD5

    465e5ecc050587c0e72ec85b7a089d98

    SHA1

    215264fd96a680005faf00f44ad98a7d07533edc

    SHA256

    e8960572584165ad6fc22922bc78d71fedf31f90389f5743b163efdb920c0552

    SHA512

    ea1a57d3080847d78608bdd52d8fbc8c8e15d6fd1818d914be120f2527cbd5cea15fa205cfa2e15789f396878fecec23d2b270156b49f01911cb96514391bf7c