Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 21:15

General

  • Target

    e438b1bd5ba1ed27466365f93f8ae4496e5792d30668f23ea24a258448bb034c.exe

  • Size

    2.8MB

  • MD5

    50d221cc8b2c1aa252ce0066642c3f48

  • SHA1

    b222ae8ded9f523b46020f07c91afd3b1c698926

  • SHA256

    e438b1bd5ba1ed27466365f93f8ae4496e5792d30668f23ea24a258448bb034c

  • SHA512

    b568f0c1ef75d0008895be35a0da2eb79b1f50476b907411e2238dcd126dbcc46c4a756398c087bcb970b2e4f1bc1fd3ad088250b7d42d4cda55767bd7c22614

  • SSDEEP

    49152:3dqQ5146M3r864yLuZsmVtmGZ6cPUTo+FT/eCctIT33BN:J46M3rHFLasmVtmG6To+U

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e438b1bd5ba1ed27466365f93f8ae4496e5792d30668f23ea24a258448bb034c.exe
    "C:\Users\Admin\AppData\Local\Temp\e438b1bd5ba1ed27466365f93f8ae4496e5792d30668f23ea24a258448bb034c.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4368-132-0x0000000010000000-0x000000001033F000-memory.dmp

    Filesize

    3.2MB

  • memory/4368-135-0x000000001008E000-0x0000000010324000-memory.dmp

    Filesize

    2.6MB

  • memory/4368-136-0x0000000000CF0000-0x0000000000D08000-memory.dmp

    Filesize

    96KB

  • memory/4368-137-0x0000000036280000-0x0000000036290000-memory.dmp

    Filesize

    64KB

  • memory/4368-138-0x0000000000CF0000-0x0000000000D08000-memory.dmp

    Filesize

    96KB

  • memory/4368-139-0x0000000010000000-0x0000000010214004-memory.dmp

    Filesize

    2.1MB

  • memory/4368-140-0x0000000010000000-0x0000000010214004-memory.dmp

    Filesize

    2.1MB

  • memory/4368-141-0x0000000003F30000-0x0000000004145000-memory.dmp

    Filesize

    2.1MB

  • memory/4368-142-0x0000000000CF0000-0x0000000000D08000-memory.dmp

    Filesize

    96KB

  • memory/4368-143-0x0000000003F30000-0x0000000004145000-memory.dmp

    Filesize

    2.1MB