Overview
overview
3Static
static
3m.zip
windows7-x64
1m.zip
windows10-2004-x64
16.txt
windows7-x64
16.txt
windows10-2004-x64
1MSVCR100.dll
windows7-x64
3MSVCR100.dll
windows10-2004-x64
3WebView2Loader.dll
windows7-x64
1WebView2Loader.dll
windows10-2004-x64
3as.txt
windows7-x64
1as.txt
windows10-2004-x64
1at.txt
windows7-x64
1at.txt
windows10-2004-x64
1b.txt
windows7-x64
1b.txt
windows10-2004-x64
1c.txt
windows7-x64
1c.txt
windows10-2004-x64
1exe.exe
windows7-x64
3exe.exe
windows10-2004-x64
3foi.txt
windows7-x64
1foi.txt
windows10-2004-x64
1i7.exe
windows7-x64
1i7.exe
windows10-2004-x64
1jli.dll
windows7-x64
3jli.dll
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
m.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
m.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
6.txt
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
6.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
MSVCR100.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
MSVCR100.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
WebView2Loader.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
WebView2Loader.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
as.txt
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
as.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
at.txt
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
at.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
b.txt
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
c.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
c.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
exe.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
exe.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
foi.txt
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
foi.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
i7.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
i7.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
jli.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
jli.dll
Resource
win10v2004-20240221-en
General
-
Target
jli.dll
-
Size
33.0MB
-
MD5
63bc5b339040c269191b17a7ea639dde
-
SHA1
c4dc3edddd619985e80221cc3b0980b8e422413a
-
SHA256
72e66a1cbe2309a0f964300bfc7a818be1b6baecda6c6581706ce1503ed8ed35
-
SHA512
374d0ca63918894ddb31a1d04c71e1570ca600408fe21c7ec908e3b3d5d07b6081653715543d5cc5187fe933204278340f240f6b9cfd10d20cd22cf646be9a34
-
SSDEEP
98304:ozoRkeRnfXwM7PF/+1yCshJhEaOtc+F/IpiMs5lpXCfqbLEr+Tz1QThMLp/3KsP7:ozQtXtbhE73W0Lp/KsPXDKg0FG
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2840 2832 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2648 wrote to memory of 2832 2648 rundll32.exe 28 PID 2832 wrote to memory of 2840 2832 rundll32.exe 29 PID 2832 wrote to memory of 2840 2832 rundll32.exe 29 PID 2832 wrote to memory of 2840 2832 rundll32.exe 29 PID 2832 wrote to memory of 2840 2832 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2563⤵
- Program crash
PID:2840
-
-