Overview
overview
3Static
static
3m.zip
windows7-x64
1m.zip
windows10-2004-x64
16.txt
windows7-x64
16.txt
windows10-2004-x64
1MSVCR100.dll
windows7-x64
3MSVCR100.dll
windows10-2004-x64
3WebView2Loader.dll
windows7-x64
1WebView2Loader.dll
windows10-2004-x64
3as.txt
windows7-x64
1as.txt
windows10-2004-x64
1at.txt
windows7-x64
1at.txt
windows10-2004-x64
1b.txt
windows7-x64
1b.txt
windows10-2004-x64
1c.txt
windows7-x64
1c.txt
windows10-2004-x64
1exe.exe
windows7-x64
3exe.exe
windows10-2004-x64
3foi.txt
windows7-x64
1foi.txt
windows10-2004-x64
1i7.exe
windows7-x64
1i7.exe
windows10-2004-x64
1jli.dll
windows7-x64
3jli.dll
windows10-2004-x64
3Analysis
-
max time kernel
292s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
m.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
m.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
6.txt
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
6.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MSVCR100.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
MSVCR100.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
WebView2Loader.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
WebView2Loader.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
as.txt
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
as.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
at.txt
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
at.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
b.txt
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
c.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
c.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
exe.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
exe.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
foi.txt
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
foi.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
i7.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
i7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
jli.dll
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
jli.dll
Resource
win10v2004-20240226-en
General
-
Target
jli.dll
-
Size
29.9MB
-
MD5
815e03bd70f9f35272e7b367bec39675
-
SHA1
8164be56020a67dbc31dc407d90d275ba84a4b29
-
SHA256
425c6f070ad8afa9cf94c400534f2fd2dc0157e8c08d30185df8da77efc276ef
-
SHA512
96cc1cde59f4aa0d4a3d6f1731e4b81b361bbd1ac5d621cc34069e4a39e1c30a70f7e49cbb3de29f916528e0871c823dd3934e2b117dd2fd35c38fdce223f70e
-
SSDEEP
196608:ntAZDlAqselRHMsxyRS+foQvqmLVB/zDdfvpp:nuDlXpssxyRS+fbVd1XX
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1792 1736 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 2040 wrote to memory of 1736 2040 rundll32.exe rundll32.exe PID 1736 wrote to memory of 1792 1736 rundll32.exe WerFault.exe PID 1736 wrote to memory of 1792 1736 rundll32.exe WerFault.exe PID 1736 wrote to memory of 1792 1736 rundll32.exe WerFault.exe PID 1736 wrote to memory of 1792 1736 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 2523⤵
- Program crash
PID:1792