Malware Analysis Report

2024-10-18 22:58

Sample ID 221116-1lwkrsha8t
Target 2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6
SHA256 2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6
Tags
joker
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6

Threat Level: Known bad

The file 2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6 was found to be: Known bad.

Malicious Activity Summary

joker

Joker family

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-11-16 21:44

Signatures

Joker family

joker

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-16 21:44

Reported

2022-11-16 21:47

Platform

win7-20221111-en

Max time kernel

30s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6.exe

"C:\Users\Admin\AppData\Local\Temp\2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6.exe"

Network

N/A

Files

memory/1380-54-0x0000000074FA1000-0x0000000074FA3000-memory.dmp

memory/1380-55-0x00000000005F0000-0x0000000000669000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-16 21:44

Reported

2022-11-16 21:47

Platform

win10v2004-20221111-en

Max time kernel

91s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6.exe

"C:\Users\Admin\AppData\Local\Temp\2043b5530f73494e7821183d393a8be3aee1ecd9e1ea93ba30c04e1bcff6c0b6.exe"

Network

Country Destination Domain Proto
N/A 104.80.225.205:443 tcp
N/A 51.132.193.104:443 tcp
N/A 45.79.81.62:443 tcp
N/A 45.79.81.62:443 tcp
N/A 87.248.202.1:80 tcp
N/A 87.248.202.1:80 tcp
N/A 87.248.202.1:80 tcp

Files

memory/3772-132-0x0000000002EA0000-0x0000000002F19000-memory.dmp