Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:59

General

  • Target

    $_10_/Qt5Gui.dll

  • Size

    6.1MB

  • MD5

    ebcc111c829b2c3a424489e371eabf34

  • SHA1

    23b48f7cdcfbaab5539c3ddef47ac1bd1e2ba346

  • SHA256

    724fc4e53dd6dd11ad4f93bfa8e8cd8563c75af482023cc970c6eafa10e6f2b6

  • SHA512

    e4d4ac14bfc43e1552fd9036ea70d5b7bc519670d6fc76129a3f1261a27f12f992a5eed3b02e2faae9a0ab9fd2324a3ab79bc652112360ed8e365e23d498bba6

  • SSDEEP

    98304:Hug1SBox2gjZ5p0eUS+j/0m/i67+pOeewHC25bSbIwue8UZVN3L/wxQXLKhYQSjV:d1/xxjZsLj8Yeewi2tde8vxeLiYDZ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$_10_\Qt5Gui.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$_10_\Qt5Gui.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 272
        3⤵
        • Program crash
        PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2260-0-0x00000000742B0000-0x00000000744E8000-memory.dmp

    Filesize

    2.2MB

  • memory/2260-1-0x00000000742B1000-0x00000000743F9000-memory.dmp

    Filesize

    1.3MB

  • memory/2260-2-0x00000000744F0000-0x0000000074B21000-memory.dmp

    Filesize

    6.2MB

  • memory/2260-3-0x00000000742B0000-0x00000000744E8000-memory.dmp

    Filesize

    2.2MB

  • memory/2260-4-0x00000000744F0000-0x0000000074B21000-memory.dmp

    Filesize

    6.2MB

  • memory/2260-10-0x0000000074220000-0x00000000742AF000-memory.dmp

    Filesize

    572KB

  • memory/2260-9-0x0000000074BB0000-0x0000000074BC4000-memory.dmp

    Filesize

    80KB

  • memory/2260-8-0x0000000074BD0000-0x0000000074BEE000-memory.dmp

    Filesize

    120KB

  • memory/2260-6-0x00000000739F0000-0x0000000073D6D000-memory.dmp

    Filesize

    3.5MB

  • memory/2260-5-0x0000000074BF0000-0x000000007516C000-memory.dmp

    Filesize

    5.5MB

  • memory/2260-14-0x00000000738C0000-0x00000000739EC000-memory.dmp

    Filesize

    1.2MB

  • memory/2260-15-0x0000000073540000-0x00000000736ED000-memory.dmp

    Filesize

    1.7MB

  • memory/2260-13-0x0000000074B30000-0x0000000074B56000-memory.dmp

    Filesize

    152KB

  • memory/2260-11-0x0000000073DF0000-0x0000000073FB2000-memory.dmp

    Filesize

    1.8MB

  • memory/2260-12-0x00000000741B0000-0x000000007421E000-memory.dmp

    Filesize

    440KB

  • memory/2260-16-0x00000000731B0000-0x0000000073534000-memory.dmp

    Filesize

    3.5MB

  • memory/2260-20-0x0000000072FB0000-0x000000007301B000-memory.dmp

    Filesize

    428KB

  • memory/2260-19-0x0000000073020000-0x000000007305C000-memory.dmp

    Filesize

    240KB

  • memory/2260-18-0x0000000073060000-0x0000000073086000-memory.dmp

    Filesize

    152KB

  • memory/2260-17-0x0000000073090000-0x00000000731A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2260-24-0x0000000072B60000-0x0000000072BD7000-memory.dmp

    Filesize

    476KB

  • memory/2260-23-0x0000000072BE0000-0x0000000072D50000-memory.dmp

    Filesize

    1.4MB

  • memory/2260-21-0x0000000072DD0000-0x0000000072FA9000-memory.dmp

    Filesize

    1.8MB

  • memory/2260-22-0x0000000072D50000-0x0000000072DC9000-memory.dmp

    Filesize

    484KB