Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 15:03
Behavioral task
behavioral1
Sample
qrspoofer.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
qrspoofer.exe
Resource
win10v2004-20241007-en
General
-
Target
qrspoofer.exe
-
Size
12.5MB
-
MD5
416f978b32c00b2d8ab65eca1aab3f6e
-
SHA1
e0869f684b5fb07f2aac11520117d01c28991379
-
SHA256
fbf37eec3f7bae65dd29f9fda29d53ed689869b9486106c3a65511094a1304e0
-
SHA512
987b50db51b142a4c4feaa657beaaa124f4169ff623ee533b5aa5e6fea281cde872a1e0c5e82ceff6e41290a978be8dd6b39cb719a519f44c6270a162e2ec8c5
-
SSDEEP
196608:uUPFeR2UqZt/TLx4hz7DIxyOwfI9jsC8XMvH8zPjweqpZ0chXcMwQjeVFcXKgzwy:ztecTGz7k2In8XgHqSq+cMgqDsEG5
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2940 qrspoofer.exe -
resource yara_rule behavioral1/files/0x00050000000194f1-61.dat upx behavioral1/memory/2940-63-0x000007FEF5DB0000-0x000007FEF6472000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2940 1700 qrspoofer.exe 30 PID 1700 wrote to memory of 2940 1700 qrspoofer.exe 30 PID 1700 wrote to memory of 2940 1700 qrspoofer.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5a37c6b85c5682a63123fd7082a655326
SHA11ce7ced2379c25babaad75502c25e1d221b0fd54
SHA2560992a1d6c8d44588ff187b66eff3e813f2bd85972ac51adf2ad66c1591a6146a
SHA512d8014663d1fe8aee022773565fd59796f3cde4eed6ccc94b0e3177e8764fc5b4527a4cfaad50cc8a29f94b47dc2d1b3e697783bb167b37727a687c365144311e