Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 07:43

General

  • Target

    $_10_/Qt5Gui.dll

  • Size

    6.1MB

  • MD5

    ebcc111c829b2c3a424489e371eabf34

  • SHA1

    23b48f7cdcfbaab5539c3ddef47ac1bd1e2ba346

  • SHA256

    724fc4e53dd6dd11ad4f93bfa8e8cd8563c75af482023cc970c6eafa10e6f2b6

  • SHA512

    e4d4ac14bfc43e1552fd9036ea70d5b7bc519670d6fc76129a3f1261a27f12f992a5eed3b02e2faae9a0ab9fd2324a3ab79bc652112360ed8e365e23d498bba6

  • SSDEEP

    98304:Hug1SBox2gjZ5p0eUS+j/0m/i67+pOeewHC25bSbIwue8UZVN3L/wxQXLKhYQSjV:d1/xxjZsLj8Yeewi2tde8vxeLiYDZ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$_10_\Qt5Gui.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$_10_\Qt5Gui.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 276
        3⤵
        • Program crash
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2848-2-0x0000000074571000-0x00000000746B9000-memory.dmp

    Filesize

    1.3MB

  • memory/2848-0-0x0000000074570000-0x00000000747A8000-memory.dmp

    Filesize

    2.2MB

  • memory/2848-3-0x0000000074570000-0x00000000747A8000-memory.dmp

    Filesize

    2.2MB

  • memory/2848-1-0x00000000747B0000-0x0000000074DE1000-memory.dmp

    Filesize

    6.2MB

  • memory/2848-5-0x0000000074EB0000-0x000000007542C000-memory.dmp

    Filesize

    5.5MB

  • memory/2848-6-0x0000000073E40000-0x00000000741BD000-memory.dmp

    Filesize

    3.5MB

  • memory/2848-15-0x0000000073810000-0x00000000739BD000-memory.dmp

    Filesize

    1.7MB

  • memory/2848-14-0x0000000073B40000-0x0000000073C6C000-memory.dmp

    Filesize

    1.2MB

  • memory/2848-24-0x0000000072E30000-0x0000000072EA7000-memory.dmp

    Filesize

    476KB

  • memory/2848-23-0x0000000072EB0000-0x0000000073020000-memory.dmp

    Filesize

    1.4MB

  • memory/2848-22-0x0000000073020000-0x0000000073099000-memory.dmp

    Filesize

    484KB

  • memory/2848-21-0x00000000730A0000-0x0000000073279000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-20-0x0000000073280000-0x00000000732EB000-memory.dmp

    Filesize

    428KB

  • memory/2848-19-0x00000000732F0000-0x000000007332C000-memory.dmp

    Filesize

    240KB

  • memory/2848-17-0x0000000073360000-0x0000000073471000-memory.dmp

    Filesize

    1.1MB

  • memory/2848-18-0x0000000073330000-0x0000000073356000-memory.dmp

    Filesize

    152KB

  • memory/2848-16-0x0000000073480000-0x0000000073804000-memory.dmp

    Filesize

    3.5MB

  • memory/2848-13-0x0000000074440000-0x0000000074466000-memory.dmp

    Filesize

    152KB

  • memory/2848-11-0x0000000073C70000-0x0000000073E32000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-12-0x0000000074470000-0x00000000744DE000-memory.dmp

    Filesize

    440KB

  • memory/2848-10-0x00000000744E0000-0x000000007456F000-memory.dmp

    Filesize

    572KB

  • memory/2848-9-0x0000000074E70000-0x0000000074E84000-memory.dmp

    Filesize

    80KB

  • memory/2848-8-0x0000000074E90000-0x0000000074EAE000-memory.dmp

    Filesize

    120KB

  • memory/2848-4-0x00000000747B0000-0x0000000074DE1000-memory.dmp

    Filesize

    6.2MB