Analysis
-
max time kernel
232s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2023 11:27
Static task
static1
Behavioral task
behavioral1
Sample
MSVCR100.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
WebView2Loader.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
at.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
b.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
exe.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
i7.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
jli.dll
Resource
win10v2004-20230220-en
General
-
Target
jli.dll
-
Size
2.5MB
-
MD5
cc1d1bf233e140add837f8e58556c583
-
SHA1
c0abda8fd10d06947d66f5d23223ba56478db36b
-
SHA256
95c8b94859d0145f1873d4a34cee1db3d84ff631bd60fbde85dd08240902ac19
-
SHA512
621f4dbde4f208e61e79316a45a22dbac16bfa7e348f541b34712093e885625762d3922606b4983d1f0e78c3e2d7b2b04506e404c49f0a6fe0628fbbbc9413ac
-
SSDEEP
49152:HHo7mQMMI3crq9nf+LMVbSuWcSEuEx4UmmTcdW54xl5YUhIRUc/cqmlZPIf:noCJMI3crqcLMVbm3Hm4dFL5YyIUc/cg
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 836 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3680 836 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 836 rundll32.exe 836 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 836 3380 rundll32.exe 85 PID 3380 wrote to memory of 836 3380 rundll32.exe 85 PID 3380 wrote to memory of 836 3380 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 9003⤵
- Program crash
PID:3680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 836 -ip 8361⤵PID:4400