Overview
overview
3Static
static
3mo.zip
windows7-x64
1mo.zip
windows10-2004-x64
16.txt
windows7-x64
16.txt
windows10-2004-x64
1MSVCR100.dll
windows7-x64
3MSVCR100.dll
windows10-2004-x64
3WebView2Loader.dll
windows7-x64
1WebView2Loader.dll
windows10-2004-x64
3as.txt
windows7-x64
1as.txt
windows10-2004-x64
1at.txt
windows7-x64
1at.txt
windows10-2004-x64
1b.txt
windows7-x64
1b.txt
windows10-2004-x64
1c.txt
windows7-x64
1c.txt
windows10-2004-x64
1exe.exe
windows7-x64
3exe.exe
windows10-2004-x64
3foi.txt
windows7-x64
1foi.txt
windows10-2004-x64
1i7.exe
windows7-x64
1i7.exe
windows10-2004-x64
1jli.dll
windows7-x64
3jli.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-02-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
mo.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
mo.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
6.txt
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
6.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
MSVCR100.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
MSVCR100.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
WebView2Loader.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
WebView2Loader.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
as.txt
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
as.txt
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
at.txt
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
at.txt
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
b.txt
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
b.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
c.txt
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
c.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
exe.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
exe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
foi.txt
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
foi.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
i7.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
i7.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
jli.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
jli.dll
Resource
win10v2004-20231215-en
General
-
Target
jli.dll
-
Size
10.6MB
-
MD5
22956039f6d451483dd19798cb9626c5
-
SHA1
07a9216385818b1c70e630518e7488a4bad0c836
-
SHA256
11d34ccf311799710f1cf4b6af95d01f7fd89d52acd40e163a1d9bb27ff45098
-
SHA512
d665b942d49759da1dd34bcba2ebe8350691be19d134b422bcf0b4409c02a4e90fdbe030f0d4af1be13466fc7b28a010eef5e8fae253d17b3e62d2d652c1cacd
-
SSDEEP
98304:ov7vNwagivQOMmP1npDYMe5bSewalZLCwpokCFCxJD9LK2:orSagiv7MmHDW5x
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2352 2104 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2080 wrote to memory of 2104 2080 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2352 2104 rundll32.exe WerFault.exe PID 2104 wrote to memory of 2352 2104 rundll32.exe WerFault.exe PID 2104 wrote to memory of 2352 2104 rundll32.exe WerFault.exe PID 2104 wrote to memory of 2352 2104 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2803⤵
- Program crash
PID:2352