Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 22:32

General

  • Target

    5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe

  • Size

    32KB

  • MD5

    3ed950593a08394614a0f3be0f38c72a

  • SHA1

    b3134f9525779329b455ade41df60147301ecf9f

  • SHA256

    5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08

  • SHA512

    49a3494a645ac77f4e63a650457d0086ad031aee4eacdbd50726f9efe42fe26d6136433846f149f9be1b4acfbe3c582c0e402dfd824b26b96631d914de5f52c8

  • SSDEEP

    768:/gDXeuVVH+JZBeyTMxi5Wxalke0X4/TeP37X:IDXeuVVH+J2yTMxi5WxdsKPj

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe
    "C:\Users\Admin\AppData\Local\Temp\5b6ab31dab042878c3a7297fa12c3f3924bf3f277a0d3e9d14b70d794d954f08.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\inatall.jpg

    Filesize

    32KB

    MD5

    d1962129dca226814ee21bd0c775b222

    SHA1

    b0c51425f0430cc8a6b4b8e27ad5132ec1a39797

    SHA256

    4e9c316d64200ca654dd31b0c8bebc7f44133f01a3381ebf7c25bd8a62627ad3

    SHA512

    89b5963a71c9fdd2fbdfbb9ee33d33b862663a9d1afe88a7dc7f85d3aca682ac3aed3d490779980dd9f07fbf5ff1e753605ca8dacc0c8a28585c149dc2788adf

  • memory/1064-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

    Filesize

    8KB