Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 09:27

General

  • Target

    qucs-0.0.19-win32-mingw482-asco-freehdl-adms/bin/QtNetwork4.dll

  • Size

    1.3MB

  • MD5

    954fadd0b2b4dd130b1e9930e4af6be8

  • SHA1

    c57620d2b2022fada0c0ac712ecefd13c7cdac25

  • SHA256

    fc4f4b42fd7ea0e7e1af80e11847a6b412030217caaa7e7c7313535635ef5bff

  • SHA512

    18f12b9028e6f71109eeda472fa240cb18b7663e656a81ca419824e4a084beb601b2f9b322f3246e62cdf2c6c76933d598b6bd08e5f9938d7eef16ee2e373e5e

  • SSDEEP

    24576:LCS/2soymVdHTyqRq4U9ToJqC5/WOseEWBzWJBuvSURl1X8xARJKhNvufX+wbTrS:ETyqRDJqC5/EeEWBUBuPZYARJKhNvuf1

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\qucs-0.0.19-win32-mingw482-asco-freehdl-adms\bin\QtNetwork4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\qucs-0.0.19-win32-mingw482-asco-freehdl-adms\bin\QtNetwork4.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 252
        3⤵
        • Program crash
        PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2280-0-0x000000006E0C1000-0x000000006E266000-memory.dmp

          Filesize

          1.6MB

        • memory/2280-1-0x000000006E0C0000-0x000000006E3A0000-memory.dmp

          Filesize

          2.9MB

        • memory/2280-2-0x0000000065C80000-0x0000000065DCE000-memory.dmp

          Filesize

          1.3MB

        • memory/2280-6-0x000000006FC40000-0x000000006FD33000-memory.dmp

          Filesize

          972KB

        • memory/2280-5-0x0000000064940000-0x0000000064953000-memory.dmp

          Filesize

          76KB

        • memory/2280-4-0x000000006E940000-0x000000006E963000-memory.dmp

          Filesize

          140KB