Analysis

  • max time kernel
    86s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 21:41

General

  • Target

    19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090.exe

  • Size

    234KB

  • MD5

    de64daa4bbc8b6178e6389893d6de8f2

  • SHA1

    422467f497fd81226d7cf2849cf78c4d6d16e528

  • SHA256

    19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090

  • SHA512

    c1e5aae2b49653d79c49e3fbf769145fc89ddb4d1f6fce136aa8f9c191d693ba65968222c85186a8b0a859da0924590dfe444f261808ff02def673c592fa0fd1

  • SSDEEP

    6144:LVLxh5MCavp86MyOIqfV1fRbFnmnaEcI8tKoSLr:L535MCavpB+j9dBcnaEqAoSLr

Malware Config

Extracted

Family

joker

C2

https://lssfot.oss-cn-hangzhou.aliyuncs.com

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Downloads MZ/PE file
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetWindowsHookEx 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090.exe
    "C:\Users\Admin\AppData\Local\Temp\19cd2c2e12987623dc1eb4e5d0e439994eb74c6871a07b08638ba7ba6208b090.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    PID:912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Plugin\B_B_Q.dll

    Filesize

    1.5MB

    MD5

    e2bde607d757a367ae42ef472f065420

    SHA1

    75990c44bd385b6091b6b10457c279734415485f

    SHA256

    4b5a111e13134d5e5be20575665c943d494aaf765beacb12c66913dd2175edac

    SHA512

    3b2b0384a7268e9775fb6ce745bfb5b7093978e6d50a19a5474f6eb3cfdcff086ad37c6c369baf4ff100670557268adc9dab8f2fecdec9e91cd8c21ce2d9f477

  • memory/912-54-0x0000000075661000-0x0000000075663000-memory.dmp

    Filesize

    8KB

  • memory/912-55-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/912-56-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/912-58-0x00000000059F0000-0x0000000005A08000-memory.dmp

    Filesize

    96KB

  • memory/912-59-0x00000000059F0000-0x0000000005A08000-memory.dmp

    Filesize

    96KB

  • memory/912-60-0x0000000005A10000-0x0000000005A51000-memory.dmp

    Filesize

    260KB

  • memory/912-61-0x0000000005A10000-0x0000000005A51000-memory.dmp

    Filesize

    260KB