Analysis
-
max time kernel
1799s -
max time network
1172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 13:09
Behavioral task
behavioral1
Sample
joker.exe
Resource
win7-20240221-en
7 signatures
1800 seconds
Behavioral task
behavioral2
Sample
joker.exe
Resource
win10-20240221-en
7 signatures
1800 seconds
Behavioral task
behavioral3
Sample
joker.exe
Resource
win10v2004-20240221-en
7 signatures
1800 seconds
Behavioral task
behavioral4
Sample
joker.exe
Resource
debian12-armhf-20240221-en
0 signatures
1800 seconds
General
-
Target
joker.exe
-
Size
65KB
-
MD5
49c80674d3bf97ed0574c1cd6f625983
-
SHA1
fc7b6be05918098cafd1bf273f3da25d8735b95d
-
SHA256
fc4a9a452313a34724e59b38bf3a2a04898219c139705d0966959f75232246c2
-
SHA512
0fdd468b8361e8f9fce386ced3bcd1c78f60e98e42e067cf9cd62ec95172b0f232943d7d75474b5a2fc0e88ac39480f43485233e289d28d60301699a1ecf9604
-
SSDEEP
1536:q0JN9XygoN36toQviFw1g3kAtlcBnvAHfLteF3nLrB9z3nFaF9bJS9vM:qA9XygoN36toQviFC4kAtqBnYfWl9z1a
Score
7/10
Malware Config
Signatures
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe joker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.url joker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe joker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\joker.exe\" .." joker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\joker.exe\" .." joker.exe -
Kills process with taskkill 2 IoCs
pid Process 2736 TASKKILL.exe 2336 TASKKILL.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe 844 joker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 844 joker.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 844 joker.exe Token: SeDebugPrivilege 2336 TASKKILL.exe Token: SeDebugPrivilege 2736 TASKKILL.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe Token: SeIncBasePriorityPrivilege 844 joker.exe Token: 33 844 joker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 844 wrote to memory of 2736 844 joker.exe 91 PID 844 wrote to memory of 2736 844 joker.exe 91 PID 844 wrote to memory of 2736 844 joker.exe 91 PID 844 wrote to memory of 2336 844 joker.exe 92 PID 844 wrote to memory of 2336 844 joker.exe 92 PID 844 wrote to memory of 2336 844 joker.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\joker.exe"C:\Users\Admin\AppData\Local\Temp\joker.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2336
-