Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 01:13

General

  • Target

    suyu-windows-mingw-20240410-0de49070e4_/Qt5Gui.dll

  • Size

    9.0MB

  • MD5

    86229269618c73d4defc6b62d6e75fd6

  • SHA1

    1a6947cfbbd942407c83d3199af836b7eba97714

  • SHA256

    03efb04ea8a93c91c426148e849b73c6918be67b3486fce057f3828c3eaf2ab4

  • SHA512

    c849c84320f12662d408f0ea7e6f690c66f4b0b5501827975f124546cdfcd585c5c3fb547a3d4fb0e5f23bbbc2eae5c70246819947e47ec8d42a0ef7d093bad6

  • SSDEEP

    98304:ZrqHb6ZrOB0nj1WrYeIHhTsrAd7pwwqdwqefus0GNBeJq9CoRqXz9uZ:N4fLIHNsmq2PB0GNBeJq9CoRqK

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\suyu-windows-mingw-20240410-0de49070e4_\Qt5Gui.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2172 -s 252
      2⤵
        PID:2272

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2172-0-0x000007FEF5140000-0x000007FEF5A49000-memory.dmp

            Filesize

            9.0MB

          • memory/2172-2-0x000007FEF5D10000-0x000007FEF635E000-memory.dmp

            Filesize

            6.3MB

          • memory/2172-9-0x000007FEF8150000-0x000007FEF8176000-memory.dmp

            Filesize

            152KB

          • memory/2172-10-0x000007FEF5020000-0x000007FEF5140000-memory.dmp

            Filesize

            1.1MB

          • memory/2172-12-0x000007FEF6720000-0x000007FEF67DF000-memory.dmp

            Filesize

            764KB

          • memory/2172-17-0x000007FEF5AA0000-0x000007FEF5AD9000-memory.dmp

            Filesize

            228KB

          • memory/2172-20-0x000007FEF4A60000-0x000007FEF4AA0000-memory.dmp

            Filesize

            256KB

          • memory/2172-19-0x0000000070540000-0x000000007056F000-memory.dmp

            Filesize

            188KB

          • memory/2172-18-0x000007FEF4CC0000-0x000007FEF4D62000-memory.dmp

            Filesize

            648KB

          • memory/2172-16-0x000007FEF4D70000-0x000007FEF4ED3000-memory.dmp

            Filesize

            1.4MB

          • memory/2172-15-0x000007FEF66F0000-0x000007FEF671D000-memory.dmp

            Filesize

            180KB

          • memory/2172-14-0x000007FEF8130000-0x000007FEF8147000-memory.dmp

            Filesize

            92KB

          • memory/2172-13-0x0000000069CC0000-0x0000000069CDC000-memory.dmp

            Filesize

            112KB

          • memory/2172-11-0x000007FEF4EE0000-0x000007FEF501B000-memory.dmp

            Filesize

            1.2MB

          • memory/2172-8-0x000007FEF5AE0000-0x000007FEF5D04000-memory.dmp

            Filesize

            2.1MB

          • memory/2172-7-0x000007FEF7300000-0x000007FEF7394000-memory.dmp

            Filesize

            592KB

          • memory/2172-6-0x000007FEF8180000-0x000007FEF818E000-memory.dmp

            Filesize

            56KB

          • memory/2172-5-0x000007FEF73A0000-0x000007FEF7498000-memory.dmp

            Filesize

            992KB

          • memory/2172-4-0x000007FEFB430000-0x000007FEFB447000-memory.dmp

            Filesize

            92KB

          • memory/2172-3-0x000007FEFA950000-0x000007FEFA975000-memory.dmp

            Filesize

            148KB

          • memory/2172-1-0x000007FEF5140000-0x000007FEF5A49000-memory.dmp

            Filesize

            9.0MB