Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 07:51

General

  • Target

    v71installer/Qt5Network.dll

  • Size

    1.0MB

  • MD5

    2e3db1cd1ec59d08706438258e86ea30

  • SHA1

    bc20b1e40049386e6bea3f448a6852bc879a8821

  • SHA256

    37275f3ea79d15a2792bf21f71f1df825f201cf8b33aa1f94ca93d62d76b216c

  • SHA512

    0c0e0e02ccadc3f2b3f6c8cbf2c162fb73734b0b244c80048968a6fe268450a270a3f92b155daf6268fef246d26ad417e6cec224133fd66e6ffb3a5394b04358

  • SSDEEP

    24576:Aul0ktv339DOBVXaIFP698DWk7PVmr0qwjb:A8sJVWAcwnH

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\v71installer\Qt5Network.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\v71installer\Qt5Network.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 716
        3⤵
        • Program crash
        PID:2472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 716
        3⤵
        • Program crash
        PID:2216
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2140 -ip 2140
    1⤵
      PID:752
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4468
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4092

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4092-0-0x0000017E0F540000-0x0000017E0F550000-memory.dmp

        Filesize

        64KB

      • memory/4092-16-0x0000017E0F640000-0x0000017E0F650000-memory.dmp

        Filesize

        64KB

      • memory/4092-32-0x0000017E17990000-0x0000017E17991000-memory.dmp

        Filesize

        4KB

      • memory/4092-34-0x0000017E179C0000-0x0000017E179C1000-memory.dmp

        Filesize

        4KB

      • memory/4092-35-0x0000017E179C0000-0x0000017E179C1000-memory.dmp

        Filesize

        4KB

      • memory/4092-36-0x0000017E17AD0000-0x0000017E17AD1000-memory.dmp

        Filesize

        4KB