Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 01:13

General

  • Target

    suyu-windows-mingw-20240410-0de49070e4_/Qt5Multimedia.dll

  • Size

    927KB

  • MD5

    b739f6ebab1db10373b7e0a007f3241d

  • SHA1

    c0cede74a20d8051a292f7b129d21267982d8459

  • SHA256

    5005553587ae0b0e6e118bfe966ff55ffd65ba352b746a608a4edff4ab81e3bd

  • SHA512

    21de863202402afb7aae61d424e2d2f1a19902a1794e01622d7c86a9e62cdd9b824ad096a09b40feda4eaf323c59e77fca70ffadc9fed2698e044a0bb1c9b7aa

  • SSDEEP

    24576:gKSW1XKuplKMFD6h0XInVuYql8Eggovn0cxk8Jp:gKSCXKyKMFD6eInVisn0cxk8Jp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\suyu-windows-mingw-20240410-0de49070e4_\Qt5Multimedia.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2088 -s 264
      2⤵
        PID:1932

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2088-1-0x000007FEF6010000-0x000007FEF60FA000-memory.dmp

      Filesize

      936KB

    • memory/2088-0-0x000007FEF4D60000-0x000007FEF5669000-memory.dmp

      Filesize

      9.0MB

    • memory/2088-3-0x000007FEFB1F0000-0x000007FEFB1FE000-memory.dmp

      Filesize

      56KB

    • memory/2088-2-0x000007FEF6010000-0x000007FEF60FA000-memory.dmp

      Filesize

      936KB

    • memory/2088-6-0x000007FEFA9F0000-0x000007FEFAA07000-memory.dmp

      Filesize

      92KB

    • memory/2088-5-0x000007FEFABF0000-0x000007FEFAC15000-memory.dmp

      Filesize

      148KB

    • memory/2088-4-0x000007FEF5DE0000-0x000007FEF6004000-memory.dmp

      Filesize

      2.1MB

    • memory/2088-10-0x000007FEFA9C0000-0x000007FEFA9E6000-memory.dmp

      Filesize

      152KB

    • memory/2088-11-0x000007FEF5670000-0x000007FEF5790000-memory.dmp

      Filesize

      1.1MB

    • memory/2088-12-0x000007FEF4D60000-0x000007FEF5669000-memory.dmp

      Filesize

      9.0MB

    • memory/2088-17-0x000007FEFA5E0000-0x000007FEFA60D000-memory.dmp

      Filesize

      180KB

    • memory/2088-19-0x000007FEF7300000-0x000007FEF7339000-memory.dmp

      Filesize

      228KB

    • memory/2088-23-0x000007FEF45C0000-0x000007FEF4761000-memory.dmp

      Filesize

      1.6MB

    • memory/2088-22-0x000007FEF4770000-0x000007FEF47B0000-memory.dmp

      Filesize

      256KB

    • memory/2088-21-0x0000000070540000-0x000000007056F000-memory.dmp

      Filesize

      188KB

    • memory/2088-20-0x000007FEF4A00000-0x000007FEF4AA2000-memory.dmp

      Filesize

      648KB

    • memory/2088-18-0x000007FEF4AB0000-0x000007FEF4C13000-memory.dmp

      Filesize

      1.4MB

    • memory/2088-16-0x000007FEFA6C0000-0x000007FEFA6D7000-memory.dmp

      Filesize

      92KB

    • memory/2088-15-0x0000000069CC0000-0x0000000069CDC000-memory.dmp

      Filesize

      112KB

    • memory/2088-14-0x000007FEF6770000-0x000007FEF682F000-memory.dmp

      Filesize

      764KB

    • memory/2088-13-0x000007FEF4C20000-0x000007FEF4D5B000-memory.dmp

      Filesize

      1.2MB

    • memory/2088-9-0x000007FEF7340000-0x000007FEF73D4000-memory.dmp

      Filesize

      592KB

    • memory/2088-8-0x000007FEF6830000-0x000007FEF6928000-memory.dmp

      Filesize

      992KB

    • memory/2088-7-0x000007FEF5790000-0x000007FEF5DDE000-memory.dmp

      Filesize

      6.3MB