Analysis

  • max time kernel
    66s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2022, 15:05

General

  • Target

    http://myavecto.com

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://myavecto.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a3facfb316ae4d54a8aedba197febe8

    SHA1

    02914bd6c589b832a12320f00a5ed98be375f120

    SHA256

    527bd213722706cd9ce0caabc373fadbf9d98a40d8846aef42f9a1e2aebda420

    SHA512

    4e751076ab2125a233766263e81560145d9b18b3ff34d015460d05dc30ba000c4eb1097fbde5601a3bcc9d677d24f6b5858a182082e3f7032589b8d449f37cd7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    147e6f8f464815749ec60e33c3b12e1e

    SHA1

    523721bc79a632a338066067833e5461745ad271

    SHA256

    f1cbab62955d0ab6c5dbac528163e4788602d330fda9d0cc6ec5c4ae30a3f5eb

    SHA512

    8e32a1fc0c01a5e693c2a462eea37b3eb5246023aa4cf26e468de829cf196c44ecb6188e4941bebfbec50e082de793b1fd9a3923a42f09ecb20905f5968170ed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EICZ1BYH.txt

    Filesize

    608B

    MD5

    66731b91776e33f8279ebd87f8c23060

    SHA1

    34e6536aa283b1052156f65b872d41d2ba32dab7

    SHA256

    d5075e9720c74ce7179eb602bdb33b51f0a84d7d184855156b8a57ffdc4a646c

    SHA512

    a00ff2dd20a8539f46960c9c0737fd3c8789e43802ef4b559351bed6a01aa090dbe5793fb93660a388a493fa07bc78632b69a4a061a7204fa9c308594de7880c