Analysis

  • max time kernel
    92s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 19:32

General

  • Target

    MultiMC/Qt5Svg.dll

  • Size

    349KB

  • MD5

    96934c8f93716fb4c5ab7433c3fcf660

  • SHA1

    e411016b245b77813f8ea5ed9dc8dcf9403ac831

  • SHA256

    adb44de5a537f5fadb9288e3852189f799ba7b95cef847f2198a8864ab6f063b

  • SHA512

    bcd231289cf4900886a4a5c55c0584073da36d5dd823ebf6a59986932fdb1cf70ead079fcdc7e9cfd4837e6212eb7037a7b5b7b0704e073b06c6fc4f5dbbc97d

  • SSDEEP

    6144:GCJ8N/2aVIOLZS5Qyk2MIwe8x1TB3JJ+Wd5J/LCW2V:GCJQ2arZS2yAG8x1TRjDL

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\MultiMC\Qt5Svg.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\MultiMC\Qt5Svg.dll,#1
      2⤵
        PID:2192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 676
          3⤵
          • Program crash
          PID:3988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2192 -ip 2192
      1⤵
        PID:4232

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2192-0-0x0000000002AF0000-0x0000000003134000-memory.dmp

        Filesize

        6.3MB

      • memory/2192-4-0x0000000068880000-0x0000000068DAF000-memory.dmp

        Filesize

        5.2MB

      • memory/2192-2-0x0000000002AF0000-0x0000000003134000-memory.dmp

        Filesize

        6.3MB

      • memory/2192-5-0x0000000061940000-0x0000000061EB5000-memory.dmp

        Filesize

        5.5MB

      • memory/2192-6-0x0000000002AF0000-0x0000000003134000-memory.dmp

        Filesize

        6.3MB

      • memory/2192-7-0x0000000067740000-0x000000006779F000-memory.dmp

        Filesize

        380KB

      • memory/2192-10-0x0000000064940000-0x0000000064954000-memory.dmp

        Filesize

        80KB

      • memory/2192-8-0x000000006FC40000-0x000000006FD41000-memory.dmp

        Filesize

        1.0MB

      • memory/2192-9-0x000000006E940000-0x000000006E964000-memory.dmp

        Filesize

        144KB

      • memory/2192-11-0x0000000068880000-0x0000000068DAF000-memory.dmp

        Filesize

        5.2MB