Overview
overview
10Static
static
Jack Move.exe
windows7_x64
1Jack Move.exe
windows10-2004_x64
7freebl3.dll
windows7_x64
1freebl3.dll
windows10-2004_x64
4mozglue.dll
windows7_x64
3mozglue.dll
windows10-2004_x64
10msvcp140.dll
windows7_x64
3msvcp140.dll
windows10-2004_x64
10nss3.dll
windows7_x64
1nss3.dll
windows10-2004_x64
10softokn3.dll
windows7_x64
3softokn3.dll
windows10-2004_x64
10sqlite3.dll
windows7_x64
3sqlite3.dll
windows10-2004_x64
10vcruntime140.dll
windows7_x64
1vcruntime140.dll
windows10-2004_x64
10Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 07:40
Static task
static1
Behavioral task
behavioral1
Sample
Jack Move.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Jack Move.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
freebl3.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
freebl3.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
mozglue.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
mozglue.dll
Resource
win10v2004-en-20220112
Behavioral task
behavioral7
Sample
msvcp140.dll
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
msvcp140.dll
Resource
win10v2004-en-20220112
Behavioral task
behavioral9
Sample
nss3.dll
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
nss3.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
softokn3.dll
Resource
win7-en-20211208
Behavioral task
behavioral12
Sample
softokn3.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
sqlite3.dll
Resource
win7-en-20211208
Behavioral task
behavioral14
Sample
sqlite3.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
vcruntime140.dll
Resource
win7-en-20211208
Behavioral task
behavioral16
Sample
vcruntime140.dll
Resource
win10v2004-en-20220112
General
-
Target
mozglue.dll
-
Size
133KB
-
MD5
8f73c08a9660691143661bf7332c3c27
-
SHA1
37fa65dd737c50fda710fdbde89e51374d0c204a
-
SHA256
3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
-
SHA512
0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 520 1744 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 520 WerFault.exe 520 WerFault.exe 520 WerFault.exe 520 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 520 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 520 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1332 wrote to memory of 1744 1332 rundll32.exe rundll32.exe PID 1744 wrote to memory of 520 1744 rundll32.exe WerFault.exe PID 1744 wrote to memory of 520 1744 rundll32.exe WerFault.exe PID 1744 wrote to memory of 520 1744 rundll32.exe WerFault.exe PID 1744 wrote to memory of 520 1744 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mozglue.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mozglue.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken