Analysis

  • max time kernel
    106s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 06:46

General

  • Target

    9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe

  • Size

    5.9MB

  • MD5

    8c07d7d88f92b85c4d0c85cf391ca568

  • SHA1

    43be5440ff01b2f14b8a631ed75520d1825882d3

  • SHA256

    9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12

  • SHA512

    05d68c246be2ff85172faaf926be4d727405b33610ca82fb7b44da752daf97396b8e72137e1bf8c7fc96000bcd33381ed2e965a02c592115ff9284859b7d3b9f

  • SSDEEP

    49152:848YhxAx/OoOlL2bZ9v4cCiOaNnjS64uyjyP8Ix+B2hQf6Bk562RJvanw:wYhW94lCKSNnjS6Y3Ix+hyKv

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe
    "C:\Users\Admin\AppData\Local\Temp\9cc2fced488e3aac830bc430763b16746631b32314a44a66cdfcc5be4ba91b12.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://ossshiping123.oss-cn-hangzhou.aliyuncs.com/aaaa.mp4
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T02CX4IM.txt

    Filesize

    608B

    MD5

    90c4e3fd3c457bb4d25540ea323aed62

    SHA1

    1afb1c9b281ccd219d9ce300005e7afaca20e3dc

    SHA256

    45c71bb9682cf881511c7d746b04db0696af9af954538a88c05a0e736fed5960

    SHA512

    d3a9f74b752350cac85a3d8b1c008be651e82f60544f49d211fa27f86e8c46d6d8a9f07d43cace94aa5a3416788a35158646b0d085f713437899cb3219649631

  • \Users\Admin\AppData\Local\Temp\libmysql.dll

    Filesize

    5.9MB

    MD5

    7422f1cba901c10e936badb5e5f90e2e

    SHA1

    3d61fd41c9dece546e7912a8645f9ef3b0b99ae8

    SHA256

    235018968d33557a791dfca6a0433e5750dfe220cbc07906aa0c7e9facced6be

    SHA512

    3cee6835e863a7d451dd368cac434afd8b6cd93454f9cdde56919dc9a243e999e01bf345eff57b8a5d1e545b876c12b9f13cd7ea40a9ebd9a4fe4c205099fecf

  • memory/1600-55-0x000007FEFBB51000-0x000007FEFBB53000-memory.dmp

    Filesize

    8KB