Analysis
-
max time kernel
79s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 21:11
Static task
static1
Behavioral task
behavioral1
Sample
197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe
Resource
win10v2004-20220812-en
General
-
Target
197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe
-
Size
93KB
-
MD5
a83b082d74854d25d8fe8c27de577069
-
SHA1
ffadc3bb7bc093fd0c2cb68a6476f5687ab927f7
-
SHA256
197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0
-
SHA512
c6bf0f06e690b983d269390a90710946714687fca25ff241d8a9d2be2a9adf1b82e3ee56bd302169d831dcc948da2a8cb20d7250d60986ea63af87a92b0f26e3
-
SSDEEP
1536:s5WXhLBRGZX19qfR4Nsz3LWaQpD7woocBHPDSceO3OMOKHs6/jkd:sKoqXzFQRoqLSLO3OMOKHpkd
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\war3key.net 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\war3key.net\NumberOfSubdomains = "1" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\d6u.taonan.site 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\war3key.net\Total = "63" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\taonan.site\Total = "63" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\war3key.net 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\taonan.site 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\d6u.taonan.site\ = "63" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.war3key.net 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.war3key.net\ = "63" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\taonan.site\NumberOfSubdomains = "1" 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5052 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe 5052 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe 5052 197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe"C:\Users\Admin\AppData\Local\Temp\197c7f46d782c356b5ca67e13e2fc5720afa7b6e3d83eda86a8885816a425ba0.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5052