Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2022 20:54

General

  • Target

    b070557214859145e828ae12e21ba7364c3ea29164062c7d9dd291241db42f46.exe

  • Size

    24KB

  • MD5

    b39ffcba1db3cf448ce9bcdaa08afa66

  • SHA1

    8d4e2d57f76db6a6bdfe90f59c8744e4432afece

  • SHA256

    b070557214859145e828ae12e21ba7364c3ea29164062c7d9dd291241db42f46

  • SHA512

    963f72b6e5a4300c04423dba5ae9933a6f94b842e013378052e1dbd7b69287782a0df14e78ae3d4fbb4bfd7d3751dcf786c9ef7946967008dedefbb1c2835cad

  • SSDEEP

    384:4CBFBDBeBtBUBgBIBLGBcjY5/xh7m1VY:4CBFBDBeBtBUBgBIBLGBCY5/W1V

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b070557214859145e828ae12e21ba7364c3ea29164062c7d9dd291241db42f46.exe
    "C:\Users\Admin\AppData\Local\Temp\b070557214859145e828ae12e21ba7364c3ea29164062c7d9dd291241db42f46.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\inatall.jpg

    Filesize

    24KB

    MD5

    cd6fb7fed7c514986f6502b9603bdae9

    SHA1

    373efbbfe8d1d87e7cca5803651362530e09d350

    SHA256

    62c6bf4b0c4fee186268247c502aaba87b77bb285b5a73553a19e6fab3b3bbc8

    SHA512

    d3c91a05e0fbceab3430e059f8f8008e21c5cd3713b178df2671d3b508f43d15fe86680e2b19126b198d6bf9d1ffa1452fddd3d667d26567aaebb6f92c4fc62d

  • memory/1204-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB