Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 09:27

General

  • Target

    qucs-0.0.19-win32-mingw482-asco-freehdl-adms/bin/QtCore4.dll

  • Size

    2.8MB

  • MD5

    84fc1ee13ddb566861ea9e2ff4d32654

  • SHA1

    ddb0107b6dc67bc04a777c382b6e551b29dcd55d

  • SHA256

    49c90b5d1b4b38a30f976660ca5e837cc3012ea38b10e16dadebb40c3e390fd1

  • SHA512

    e247e40eaddb70dc1b1b26cb2aa289e10296f65c7e6e8f74023b0a3fc5c9981309a9907b39bdc95d6616e08747afa1119145b2064dd7f50152fc259f2a43e906

  • SSDEEP

    49152:zij8g3BeH8PrM2MfB5MRSqE3KGe9oPqL4krlX3NOZ7D4+36or87lYYkNrXbhuxPn:zij8g3BW8rMff7MRdExfGlM36or87lYy

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\qucs-0.0.19-win32-mingw482-asco-freehdl-adms\bin\QtCore4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\qucs-0.0.19-win32-mingw482-asco-freehdl-adms\bin\QtCore4.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 232
        3⤵
        • Program crash
        PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-0-0x000000006E0C1000-0x000000006E266000-memory.dmp

    Filesize

    1.6MB

  • memory/764-1-0x000000006E0C0000-0x000000006E3A0000-memory.dmp

    Filesize

    2.9MB

  • memory/764-4-0x0000000064940000-0x0000000064953000-memory.dmp

    Filesize

    76KB

  • memory/764-5-0x000000006FC40000-0x000000006FD33000-memory.dmp

    Filesize

    972KB

  • memory/764-3-0x000000006E940000-0x000000006E963000-memory.dmp

    Filesize

    140KB