Analysis
-
max time kernel
179s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 20:26
Behavioral task
behavioral1
Sample
176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe
Resource
win7-20220812-en
General
-
Target
176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe
-
Size
4.0MB
-
MD5
6481509a5d3a32abdef685297980f7d8
-
SHA1
b9abfb0457909be6ff5ba2facddfd2c185f862c0
-
SHA256
176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f
-
SHA512
2bb86030b6e832d0c2627029f4d9d42d40efdafba4452a1420b88fa888c8472d42bba07d87f2c22a45980da51e9bd1062a0c826a31ac7eff12d14b88f2747d0f
-
SSDEEP
98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBE:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBE
Malware Config
Extracted
joker
https://htuzi.oss-cn-shanghai.aliyuncs.com
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3836-132-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral2/memory/3836-133-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral2/memory/3836-134-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon behavioral2/memory/3836-147-0x0000000000400000-0x00000000010A2000-memory.dmp family_blackmoon -
joker
Joker is an Android malware that targets billing and SMS fraud.
-
resource yara_rule behavioral2/memory/3836-135-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral2/memory/3836-137-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral2/memory/3836-138-0x0000000010000000-0x00000000100BE000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3836 set thread context of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 2308 rasdial.exe 2308 rasdial.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 2308 rasdial.exe 2308 rasdial.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2160 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 81 PID 3836 wrote to memory of 2160 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 81 PID 3836 wrote to memory of 2160 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 81 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82 PID 3836 wrote to memory of 2308 3836 176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe"C:\Users\Admin\AppData\Local\Temp\176996c48c2f4dbe5dc4a20628d6c8dd728be5eef22f9abf205b0696ecfae78f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\resmon.exeC:\Windows\SysWOW64\resmon.exe2⤵PID:2160
-
-
C:\Windows\SysWOW64\rasdial.exeC:\Windows\SysWOW64\rasdial.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD53e7d2ba379f525cdb15ee4e3fabb546e
SHA129e3014d9ce15aa8689e2c80d67b414bbfad0e7b
SHA25679e907c54f7de75716d585ae35038ae3e3d6ef378a8d4962b4fb9f4a1b8c2986
SHA512737c352524526c250b9ea1d1a9836aa5f27cd11dda80a1d17d721e2fb8c0d49f057d46657baa651d1b8b7e73f9951fd50fd11c300cad4b03efe9f9d72f18bbad
-
Filesize
4.0MB
MD5f88236ac58d508dd747da0bfca466c72
SHA1cd16259c208e83a6329dc02bfbee3c2e7a52b995
SHA2563f40f4868be1627095fa4c91825c2f4aea63240a4e0f63bb09b97e3b1a6b37e0
SHA512e7104a1e4f817b964c1f4c44481943fd98dcbb12523e99ea90edc62aaf7589d4a0b510a8f9e649c5cc8df4d7f719288412a6b31f17c565adfa136fceb074a3cd
-
Filesize
165B
MD54db37fefd624f6ed221791e8a7750867
SHA1fd810ea9dfcfce4b7aec66c15c86460d1ebfb26e
SHA2566f8062dd395dec777ce6c7bb0f85bac907f6ad807c950d65ac19b7920c4dcea0
SHA512b3f40ef8c3f65095493f160a3dc40825e5292ba7177305d860e59e8cadc3c89a1be544d2c94d0d95870411cbef4fddbdbf287e0e4e8955fb16de4bfaba9997a4