Overview
overview
10Static
static
3ExCheats Loader.exe
windows10-2004-x64
10jre/Welcome.html
windows10-2004-x64
1jre/bin/JA...32.dll
windows10-2004-x64
1jre/bin/JA...ge.dll
windows10-2004-x64
1jre/bin/Ja...32.dll
windows10-2004-x64
1jre/bin/Ja...ge.dll
windows10-2004-x64
1jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows10-2004-x64
1jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows10-2004-x64
1jre/bin/de...se.dll
windows10-2004-x64
3jre/bin/deploy.dll
windows10-2004-x64
3jre/bin/dt_shmem.dll
windows10-2004-x64
3jre/bin/dt_socket.dll
windows10-2004-x64
1jre/bin/dt...a1.dll
windows10-2004-x64
1jre/bin/dt...a1.dll
windows10-2004-x64
3jre/bin/eula.dll
windows10-2004-x64
1jre/bin/fo...er.dll
windows10-2004-x64
1jre/bin/fxplugins.dll
windows10-2004-x64
3jre/bin/glass.dll
windows10-2004-x64
1jre/bin/glib-lite.dll
windows10-2004-x64
3jre/bin/gs...te.dll
windows10-2004-x64
3jre/bin/hprof.dll
windows10-2004-x64
3jre/bin/in...nt.dll
windows10-2004-x64
3jre/bin/j2pcsc.dll
windows10-2004-x64
1jre/bin/j2pkcs11.dll
windows10-2004-x64
1jre/bin/jaas_nt.dll
windows10-2004-x64
3jre/bin/jabswitch.exe
windows10-2004-x64
1jre/bin/java-rmi.exe
windows10-2004-x64
1jre/bin/java.dll
windows10-2004-x64
1Analysis
-
max time kernel
1731s -
max time network
1163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
ExCheats Loader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
jre/Welcome.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
jre/bin/awt.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
jre/bin/bci.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
jre/bin/decora_sse.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
jre/bin/deploy.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
jre/bin/dt_shmem.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
jre/bin/dt_socket.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
jre/bin/dtplugin/deployJava1.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral18
Sample
jre/bin/dtplugin/npdeployJava1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
jre/bin/eula.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral20
Sample
jre/bin/fontmanager.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
jre/bin/fxplugins.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
jre/bin/glass.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
jre/bin/glib-lite.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
jre/bin/gstreamer-lite.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
jre/bin/hprof.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
jre/bin/instrument.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
jre/bin/j2pcsc.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral28
Sample
jre/bin/j2pkcs11.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
jre/bin/jaas_nt.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
jre/bin/jabswitch.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
jre/bin/java-rmi.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
jre/bin/java.dll
Resource
win10v2004-20240412-en
General
-
Target
jre/bin/hprof.dll
-
Size
129KB
-
MD5
6376b76728e4a873b2bb7233cbcd5659
-
SHA1
3be08074527d5b5bc4a1ddcec41375e3b3a8a615
-
SHA256
4fdf86d78abc66b44b8aff4bbce1f2a5d6d9900767be3caae450409924dbc5ad
-
SHA512
955e7c5ab735183b491a753710b6f598a142a2876ddae5ad301c3da82a65ce82238e0f20c9f558f80138d58f8dc00b4ebd21483ceed0aabeeda32cca5d2e3d48
-
SSDEEP
3072:HGBc2vf2AWlvx+Kre9vVv3CoLORljxWEXyB/NK3GyNf9:mxvffVvyo0X8NKW+1
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1020 4956 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 852 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3572 wrote to memory of 4956 3572 rundll32.exe rundll32.exe PID 3572 wrote to memory of 4956 3572 rundll32.exe rundll32.exe PID 3572 wrote to memory of 4956 3572 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\hprof.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\hprof.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 6483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4956 -ip 49561⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/852-0-0x00000152B4A40000-0x00000152B4A50000-memory.dmpFilesize
64KB
-
memory/852-16-0x00000152B4B40000-0x00000152B4B50000-memory.dmpFilesize
64KB
-
memory/852-32-0x00000152BE120000-0x00000152BE121000-memory.dmpFilesize
4KB
-
memory/852-33-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-34-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-35-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-36-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-37-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-38-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-39-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-40-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-41-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-42-0x00000152BE140000-0x00000152BE141000-memory.dmpFilesize
4KB
-
memory/852-43-0x00000152BCD70000-0x00000152BCD71000-memory.dmpFilesize
4KB
-
memory/852-44-0x00000152BCD60000-0x00000152BCD61000-memory.dmpFilesize
4KB
-
memory/852-46-0x00000152BCD70000-0x00000152BCD71000-memory.dmpFilesize
4KB
-
memory/852-49-0x00000152BCD60000-0x00000152BCD61000-memory.dmpFilesize
4KB
-
memory/852-52-0x00000152BCCA0000-0x00000152BCCA1000-memory.dmpFilesize
4KB
-
memory/852-64-0x00000152BCEA0000-0x00000152BCEA1000-memory.dmpFilesize
4KB
-
memory/852-66-0x00000152BCEB0000-0x00000152BCEB1000-memory.dmpFilesize
4KB
-
memory/852-67-0x00000152BCEB0000-0x00000152BCEB1000-memory.dmpFilesize
4KB
-
memory/852-68-0x00000152BCFC0000-0x00000152BCFC1000-memory.dmpFilesize
4KB