Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 18:40

General

  • Target

    9ea2a88071eee4801436335031c711528b0dac85d4e42c53d34e98771b89c64a.exe

  • Size

    1.1MB

  • MD5

    107bd4afd27c528538906e2c12e4b616

  • SHA1

    15dacdba5c9e363639929a5954c398c312179651

  • SHA256

    9ea2a88071eee4801436335031c711528b0dac85d4e42c53d34e98771b89c64a

  • SHA512

    f6cde6512be3b4516fc8aaf967b4bdcb8c2e4048f25fc66cde236a8e1a6b7f5d26049f938bb6ec2563e602769e521ba3b3f4641439118ddd5fa6391ea4aab98c

  • SSDEEP

    24576:4jjfceMyjHMz4UJpOeqU/n8nB9Ze3SbbaB9Ze3S1:43EcHM1gc0B9Ze3SHaB9Ze3S1

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea2a88071eee4801436335031c711528b0dac85d4e42c53d34e98771b89c64a.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea2a88071eee4801436335031c711528b0dac85d4e42c53d34e98771b89c64a.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads