Analysis

  • max time kernel
    155s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 08:16

General

  • Target

    14dd72dbb346aed2705902164c8cef34ff620ecbb410502d198884a9ee5186dd.exe

  • Size

    60KB

  • MD5

    514dc8978d67cc59de775b8b583325f1

  • SHA1

    499d3a758088f86a6aeccece4977d7fc4be1dc06

  • SHA256

    14dd72dbb346aed2705902164c8cef34ff620ecbb410502d198884a9ee5186dd

  • SHA512

    0b5a71b6d523ac623383293043843dfed7b944e055df914556f0c9d26a9bf96dbc1f4b300cf728a1250f6c563cc887cf58b22356dc28b75dd9c0c1d0ebfd2d81

  • SSDEEP

    1536:TkMbdmNYJZ1YUQ4BcDQX2oooD+AyxArAIVJ9B:TkAdmNYJZ1YUQ46QXMmAIr

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14dd72dbb346aed2705902164c8cef34ff620ecbb410502d198884a9ee5186dd.exe
    "C:\Users\Admin\AppData\Local\Temp\14dd72dbb346aed2705902164c8cef34ff620ecbb410502d198884a9ee5186dd.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.ma80.com/?2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3456 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 1244
      2⤵
      • Program crash
      PID:1288
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1396 -ip 1396
    1⤵
      PID:4180

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      7550b85aee4221c59808672005ed8855

      SHA1

      aeb269eff06f518132b9ecea824523fa125ba2d2

      SHA256

      2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

      SHA512

      216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      ee9c6fdbdef43b99a73b0a8ce0966686

      SHA1

      3739e73dc3d08cc078ce9b9ab141e7fe73c946eb

      SHA256

      12537da2c0246ac6fff22d196a71ebc7f5c429dcdd7d9bcd48a79f576dd84e2a

      SHA512

      76318d69954763a0cf8e813abe2a4462f086687bdf52e7b8d65a257b8dfcf35d420704fd939b30bdf45d1619b3850b7e57b8a836f8a12f8f7d36a692d99e04d3