Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2022 20:30

General

  • Target

    24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe

  • Size

    2.8MB

  • MD5

    f13b30230ecebedea0628ff05cf8dd1f

  • SHA1

    764ec8bdd350bf9fad3e8a59948d932da785497d

  • SHA256

    24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893

  • SHA512

    1605b4921393156e7fa00674483ad2916155ad90d657efa02e9b44ea0ef20268433c0f697bac01613e74558dbb6d5554c35c725b1c14da2f5d552dc99726bbfc

  • SSDEEP

    49152:j20wUNfi5XW1TPwZkr0Wm3krnoukFQXC33ebJF+3KvWIzoxVSnUZ8WOyhAR8ygVM:S0wy7TPwc00M9FQX2Q+3PxVSUZ8lnRQm

Malware Config

Extracted

Family

joker

C2

https://ruanjian336.oss-cn-beijing.aliyuncs.com

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • detect oss ak 8 IoCs

    oss ak information detected.

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe
    "C:\Users\Admin\AppData\Local\Temp\24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:2140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-132-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-133-0x0000000077080000-0x0000000077223000-memory.dmp

    Filesize

    1.6MB

  • memory/2140-134-0x00000000769F0000-0x0000000076C05000-memory.dmp

    Filesize

    2.1MB

  • memory/2140-136-0x0000000075810000-0x00000000759B0000-memory.dmp

    Filesize

    1.6MB

  • memory/2140-137-0x0000000075F20000-0x0000000075F9A000-memory.dmp

    Filesize

    488KB

  • memory/2140-1479-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1480-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1481-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1482-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1484-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1485-0x00000000025E0000-0x00000000026E0000-memory.dmp

    Filesize

    1024KB

  • memory/2140-1490-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1488-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1498-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1496-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1494-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1492-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1500-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1487-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1486-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1508-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1518-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1522-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1520-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1524-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1516-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1514-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1512-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1526-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1510-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1528-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1506-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1504-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1502-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1530-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2140-1529-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1531-0x00000000025E0000-0x00000000026E0000-memory.dmp

    Filesize

    1024KB

  • memory/2140-1532-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/2140-1533-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB