Overview
overview
10Static
static
3ExCheats Loader.exe
windows10-2004-x64
10jre/Welcome.html
windows10-2004-x64
1jre/bin/JA...32.dll
windows10-2004-x64
1jre/bin/JA...ge.dll
windows10-2004-x64
1jre/bin/Ja...32.dll
windows10-2004-x64
1jre/bin/Ja...ge.dll
windows10-2004-x64
1jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows10-2004-x64
1jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows10-2004-x64
1jre/bin/de...se.dll
windows10-2004-x64
3jre/bin/deploy.dll
windows10-2004-x64
3jre/bin/dt_shmem.dll
windows10-2004-x64
3jre/bin/dt_socket.dll
windows10-2004-x64
1jre/bin/dt...a1.dll
windows10-2004-x64
1jre/bin/dt...a1.dll
windows10-2004-x64
3jre/bin/eula.dll
windows10-2004-x64
1jre/bin/fo...er.dll
windows10-2004-x64
1jre/bin/fxplugins.dll
windows10-2004-x64
3jre/bin/glass.dll
windows10-2004-x64
1jre/bin/glib-lite.dll
windows10-2004-x64
3jre/bin/gs...te.dll
windows10-2004-x64
3jre/bin/hprof.dll
windows10-2004-x64
3jre/bin/in...nt.dll
windows10-2004-x64
3jre/bin/j2pcsc.dll
windows10-2004-x64
1jre/bin/j2pkcs11.dll
windows10-2004-x64
1jre/bin/jaas_nt.dll
windows10-2004-x64
3jre/bin/jabswitch.exe
windows10-2004-x64
1jre/bin/java-rmi.exe
windows10-2004-x64
1jre/bin/java.dll
windows10-2004-x64
1Analysis
-
max time kernel
1772s -
max time network
1174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
ExCheats Loader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
jre/Welcome.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
jre/bin/awt.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
jre/bin/bci.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
jre/bin/decora_sse.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
jre/bin/deploy.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
jre/bin/dt_shmem.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
jre/bin/dt_socket.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
jre/bin/dtplugin/deployJava1.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral18
Sample
jre/bin/dtplugin/npdeployJava1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
jre/bin/eula.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral20
Sample
jre/bin/fontmanager.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
jre/bin/fxplugins.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
jre/bin/glass.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
jre/bin/glib-lite.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
jre/bin/gstreamer-lite.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
jre/bin/hprof.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
jre/bin/instrument.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
jre/bin/j2pcsc.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral28
Sample
jre/bin/j2pkcs11.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
jre/bin/jaas_nt.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
jre/bin/jabswitch.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
jre/bin/java-rmi.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
jre/bin/java.dll
Resource
win10v2004-20240412-en
General
-
Target
jre/bin/glib-lite.dll
-
Size
391KB
-
MD5
767bba46789597b120d01e48a685811e
-
SHA1
d2052953dde6002d590d0d89c2a052195364410a
-
SHA256
218d349986e2a0cd4a76f665434f455a8d452f1b27eaf9d01a120cb35da13694
-
SHA512
86f7f7e87514dbc62c284083d66d5f250a24fc5cd7540af573c3fb9d47b802be5ffbbc709b638f8e066ab6e4bb396320f6e65a8016415366799c74772398b530
-
SSDEEP
6144:vxDvEpBGH7t7PB7Es7va/QdqOBYswIprNWhk+URpxfu4w7J:tvEpBGH7pN57vwQd6swIp5WhkRlfu4CJ
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4356 4996 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 1136 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2964 wrote to memory of 4996 2964 rundll32.exe rundll32.exe PID 2964 wrote to memory of 4996 2964 rundll32.exe rundll32.exe PID 2964 wrote to memory of 4996 2964 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\glib-lite.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\glib-lite.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 6403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4996 -ip 49961⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1136-0-0x00000277CE240000-0x00000277CE250000-memory.dmpFilesize
64KB
-
memory/1136-16-0x00000277CE340000-0x00000277CE350000-memory.dmpFilesize
64KB
-
memory/1136-32-0x00000277D68F0000-0x00000277D68F1000-memory.dmpFilesize
4KB
-
memory/1136-33-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-34-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-35-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-36-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-37-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-38-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-39-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-40-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-41-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-42-0x00000277D6910000-0x00000277D6911000-memory.dmpFilesize
4KB
-
memory/1136-43-0x00000277D6540000-0x00000277D6541000-memory.dmpFilesize
4KB
-
memory/1136-44-0x00000277D6530000-0x00000277D6531000-memory.dmpFilesize
4KB
-
memory/1136-46-0x00000277D6540000-0x00000277D6541000-memory.dmpFilesize
4KB
-
memory/1136-49-0x00000277D6530000-0x00000277D6531000-memory.dmpFilesize
4KB
-
memory/1136-52-0x00000277D6470000-0x00000277D6471000-memory.dmpFilesize
4KB
-
memory/1136-64-0x00000277D6670000-0x00000277D6671000-memory.dmpFilesize
4KB
-
memory/1136-66-0x00000277D6680000-0x00000277D6681000-memory.dmpFilesize
4KB
-
memory/1136-68-0x00000277D6790000-0x00000277D6791000-memory.dmpFilesize
4KB
-
memory/1136-67-0x00000277D6680000-0x00000277D6681000-memory.dmpFilesize
4KB