Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2022 20:30
Static task
static1
Behavioral task
behavioral1
Sample
24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe
Resource
win10v2004-20220812-en
General
-
Target
24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe
-
Size
2.8MB
-
MD5
f13b30230ecebedea0628ff05cf8dd1f
-
SHA1
764ec8bdd350bf9fad3e8a59948d932da785497d
-
SHA256
24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893
-
SHA512
1605b4921393156e7fa00674483ad2916155ad90d657efa02e9b44ea0ef20268433c0f697bac01613e74558dbb6d5554c35c725b1c14da2f5d552dc99726bbfc
-
SSDEEP
49152:j20wUNfi5XW1TPwZkr0Wm3krnoukFQXC33ebJF+3KvWIzoxVSnUZ8WOyhAR8ygVM:S0wy7TPwc00M9FQX2Q+3PxVSUZ8lnRQm
Malware Config
Extracted
joker
https://ruanjian336.oss-cn-beijing.aliyuncs.com
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
resource yara_rule behavioral2/memory/2140-1479-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1480-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1481-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1482-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1484-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1529-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1532-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff behavioral2/memory/2140-1533-0x0000000000400000-0x000000000081E000-memory.dmp detect_ak_stuff -
resource yara_rule behavioral2/memory/2140-1490-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1488-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1498-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1496-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1494-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1492-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1500-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1487-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1486-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1508-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1518-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1522-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1520-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1524-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1516-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1514-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1512-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1526-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1510-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1528-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1506-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1504-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1502-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2140-1530-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe 2140 24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe"C:\Users\Admin\AppData\Local\Temp\24071662414012a689e2e4255c0a6b917f9ed40fc937834b127b803c7b3e7893.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:2140