Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 01:13 UTC

General

  • Target

    suyu-windows-mingw-20240410-0de49070e4_/Qt5Gui.dll

  • Size

    9.0MB

  • MD5

    86229269618c73d4defc6b62d6e75fd6

  • SHA1

    1a6947cfbbd942407c83d3199af836b7eba97714

  • SHA256

    03efb04ea8a93c91c426148e849b73c6918be67b3486fce057f3828c3eaf2ab4

  • SHA512

    c849c84320f12662d408f0ea7e6f690c66f4b0b5501827975f124546cdfcd585c5c3fb547a3d4fb0e5f23bbbc2eae5c70246819947e47ec8d42a0ef7d093bad6

  • SSDEEP

    98304:ZrqHb6ZrOB0nj1WrYeIHhTsrAd7pwwqdwqefus0GNBeJq9CoRqXz9uZ:N4fLIHNsmq2PB0GNBeJq9CoRqK

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\suyu-windows-mingw-20240410-0de49070e4_\Qt5Gui.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2172 -s 252
      2⤵
        PID:2272

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2172-0-0x000007FEF5140000-0x000007FEF5A49000-memory.dmp

      Filesize

      9.0MB

    • memory/2172-2-0x000007FEF5D10000-0x000007FEF635E000-memory.dmp

      Filesize

      6.3MB

    • memory/2172-9-0x000007FEF8150000-0x000007FEF8176000-memory.dmp

      Filesize

      152KB

    • memory/2172-10-0x000007FEF5020000-0x000007FEF5140000-memory.dmp

      Filesize

      1.1MB

    • memory/2172-12-0x000007FEF6720000-0x000007FEF67DF000-memory.dmp

      Filesize

      764KB

    • memory/2172-17-0x000007FEF5AA0000-0x000007FEF5AD9000-memory.dmp

      Filesize

      228KB

    • memory/2172-20-0x000007FEF4A60000-0x000007FEF4AA0000-memory.dmp

      Filesize

      256KB

    • memory/2172-19-0x0000000070540000-0x000000007056F000-memory.dmp

      Filesize

      188KB

    • memory/2172-18-0x000007FEF4CC0000-0x000007FEF4D62000-memory.dmp

      Filesize

      648KB

    • memory/2172-16-0x000007FEF4D70000-0x000007FEF4ED3000-memory.dmp

      Filesize

      1.4MB

    • memory/2172-15-0x000007FEF66F0000-0x000007FEF671D000-memory.dmp

      Filesize

      180KB

    • memory/2172-14-0x000007FEF8130000-0x000007FEF8147000-memory.dmp

      Filesize

      92KB

    • memory/2172-13-0x0000000069CC0000-0x0000000069CDC000-memory.dmp

      Filesize

      112KB

    • memory/2172-11-0x000007FEF4EE0000-0x000007FEF501B000-memory.dmp

      Filesize

      1.2MB

    • memory/2172-8-0x000007FEF5AE0000-0x000007FEF5D04000-memory.dmp

      Filesize

      2.1MB

    • memory/2172-7-0x000007FEF7300000-0x000007FEF7394000-memory.dmp

      Filesize

      592KB

    • memory/2172-6-0x000007FEF8180000-0x000007FEF818E000-memory.dmp

      Filesize

      56KB

    • memory/2172-5-0x000007FEF73A0000-0x000007FEF7498000-memory.dmp

      Filesize

      992KB

    • memory/2172-4-0x000007FEFB430000-0x000007FEFB447000-memory.dmp

      Filesize

      92KB

    • memory/2172-3-0x000007FEFA950000-0x000007FEFA975000-memory.dmp

      Filesize

      148KB

    • memory/2172-1-0x000007FEF5140000-0x000007FEF5A49000-memory.dmp

      Filesize

      9.0MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.