Overview
overview
10Static
static
3AA Master ...DF.exe
windows7-x64
10AA Master ...DF.exe
windows10-2004-x64
10ActionCenter.dll
windows7-x64
1ActionCenter.dll
windows10-2004-x64
1attach.dll
windows7-x64
1attach.dll
windows10-2004-x64
1jawt.dll
windows7-x64
1jawt.dll
windows10-2004-x64
1jli.dll
windows7-x64
1jli.dll
windows10-2004-x64
5msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
1ucrtbase.dll
windows10-2004-x64
1vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1vcruntime140_1.dll
windows7-x64
1vcruntime140_1.dll
windows10-2004-x64
1verify.dll
windows7-x64
1verify.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
AA Master Maritime Final Draft 92000118289301-PDF.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AA Master Maritime Final Draft 92000118289301-PDF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ActionCenter.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ActionCenter.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
attach.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
attach.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
jawt.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
jawt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
jli.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
jli.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
msvcp140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ucrtbase.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
vcruntime140.dll
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
vcruntime140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
vcruntime140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
vcruntime140_1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
verify.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
verify.dll
Resource
win10v2004-20240802-en
General
-
Target
jli.dll
-
Size
3.7MB
-
MD5
ab00251a16e0b607232483e4548f4b5b
-
SHA1
59e921397449cdf81789159dc2567e7dd0864d1d
-
SHA256
594d7beb2dafb0ad54e415d09fe2421eb7fa0554685d99171fbd10dc646f4e58
-
SHA512
fd77e1a779efe5467bb9390488d4d22396c2a6c3b5b63de1ab9fc64907f0507996fba320956df1eebaefe04f482c9ee64d429b188d5baf308dbd117c3fbf0bbf
-
SSDEEP
49152:MJPwtJEdvqUcEoHd2CkhA45YQzpx9gF0l9XtVYNR5PlDyr:MOtdUo8YQpYBlD
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3700 set thread context of 4516 3700 rundll32.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 556 4516 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3700 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82 PID 3700 wrote to memory of 4516 3700 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jli.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 803⤵
- Program crash
PID:556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4516 -ip 45161⤵PID:3680