Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 15:27

General

  • Target

    QtAV1.dll

  • Size

    975KB

  • MD5

    9d70b143da5db12d03c7acc92a156db2

  • SHA1

    b210788a2049713db4027c828d742c8fe137398e

  • SHA256

    d8b6d171b5ce0e195933107ab655b177e821756d285a60a900a17d5fd872d889

  • SHA512

    af3621a4181a0220f0f8d2a5eebefde1792b3403f9fbcfbc68ac11df863992bf5ef0727b5160d6880be0369b6ef6622f8d08c1113ca3b73c512807fce63dee9c

  • SSDEEP

    24576:OIG/aFYS0lojipU+ILENMOg+jrj1ubBGnBzLGIZyaktwshp3BnmEt0i52geph4f:OISwlnBmEt0i2gephW

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\QtAV1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\QtAV1.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 292
        3⤵
        • Program crash
        PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-0-0x0000000000270000-0x0000000000345000-memory.dmp

    Filesize

    852KB

  • memory/1104-1-0x0000000000170000-0x00000000001B8000-memory.dmp

    Filesize

    288KB

  • memory/1104-6-0x0000000000380000-0x0000000000452000-memory.dmp

    Filesize

    840KB

  • memory/1104-3-0x0000000001E10000-0x000000000313E000-memory.dmp

    Filesize

    19.2MB

  • memory/1104-4-0x0000000003140000-0x00000000032D0000-memory.dmp

    Filesize

    1.6MB