Analysis

  • max time kernel
    695s
  • max time network
    701s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 03:54

General

  • Target

    JOKE.exe

  • Size

    65KB

  • MD5

    a85056ecfbf94af8efaa2e9dcec8ebb1

  • SHA1

    f081275fbbdddad10689e185a750e1fd1ca0d0e5

  • SHA256

    e00d04dcc4489101599f86df3956673c2ebcb8adbf05fb603266b91e9336b955

  • SHA512

    c510e21e4d5b2b8fb2e7e902f74a6befbe20896490e607d640a2611020f20cede1d154e894fde5be8a6a2e564d2d7eb6d741d9b3ef21cdbefc5abdbc6a056fa9

  • SSDEEP

    1536:yw10jQoN36tKQviFw1ufGqBnvALfLteF3nLrB9z3nWaF9bJS9vM:yw10jQoN36tKQviFCe1BnAfWl9zGaF9Z

Score
7/10

Malware Config

Signatures

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JOKE.exe
    "C:\Users\Admin\AppData\Local\Temp\JOKE.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM wscript.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4228
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM cmd.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1300-0-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB

  • memory/1300-1-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB

  • memory/1300-2-0x00000000016B0000-0x00000000016C0000-memory.dmp

    Filesize

    64KB

  • memory/1300-8-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB

  • memory/1300-9-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB

  • memory/1300-10-0x00000000016B0000-0x00000000016C0000-memory.dmp

    Filesize

    64KB