Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 16:14

General

  • Target

    08fd8f4e1db0aa12599e0d49c194934f576ea788e8e2f1ea430d0cbddb0d449c.exe

  • Size

    15KB

  • MD5

    19d2e1bb3801e91b598a1718c2e36050

  • SHA1

    ae7c2a12c83f444cb057de774b6c0f335bb0589f

  • SHA256

    08fd8f4e1db0aa12599e0d49c194934f576ea788e8e2f1ea430d0cbddb0d449c

  • SHA512

    112c6ad65551d7b08a06c021a0bada5c258c9abdb0ea4f821ce42d5f73b69da7d99578465abe635e93d337a44898a3ac88794ccbe39b00fbf1553cad483ba64c

  • SSDEEP

    192:3VO8RFi9weZvt+Co7oo7TuJJ7cqiPAUbyMrj6crr0u+vscr9ZCspE+TMArm7c7VN:31cp8CzkuvNLMC0jeMNY7rn

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08fd8f4e1db0aa12599e0d49c194934f576ea788e8e2f1ea430d0cbddb0d449c.exe
    "C:\Users\Admin\AppData\Local\Temp\08fd8f4e1db0aa12599e0d49c194934f576ea788e8e2f1ea430d0cbddb0d449c.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ad2222.com/download2.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7de5afa9ac7ed179302ac170156afc21

    SHA1

    fd99418e51a282ee77f13c5af995b7509f6e0e94

    SHA256

    5fb5d19db61f50db61fbec336301551fb383bd36b0050c1305266d5ca597f6e7

    SHA512

    8c2d1944ef03981c60526aa271013cb638d6dce7772450f017570a926ad8771df7e237f4e1aa35b7d08c2c65e808160cdee697b9a705caa887e053594e35a52e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    9de8b5feaed7549d2f8ae864df4c33f6

    SHA1

    8f12b9565bcf196c23a514aa8159217f0976fdd3

    SHA256

    82291d30685ab229624bf397199b8447a60a3680e3e1221f8eda4538f188414a

    SHA512

    89d69aafec56362be4a9945ecd36240cd629b7aba73e5fd335476b62515367abdf8be2fe71ac14e4cfb107e7148544ac0b693b14a6dcf16e3aa8b7d755deb292

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NLT3DWD1.txt

    Filesize

    603B

    MD5

    e382201cda400a7a116d911fdef44275

    SHA1

    514bbdda82b9bb0ca2c706f05587e68560815a2a

    SHA256

    51244f6255d3347543bad06e086efad26806d1ec52c812505f9b3e67ae8c1c5e

    SHA512

    e75b887844a4c50481a23a2dca044a78bcabad458e3338731d0f710723fbaa09ea72fbcae09e105883835358adcda1ac35c41143bd33239a8bdd60b2d61b3739

  • memory/1752-54-0x0000000075111000-0x0000000075113000-memory.dmp

    Filesize

    8KB