Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ac2eda72fb54fa7affa8c7f802ac3c6.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ac2eda72fb54fa7affa8c7f802ac3c6.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7ac2eda72fb54fa7affa8c7f802ac3c6.exe
-
Size
84KB
-
MD5
7ac2eda72fb54fa7affa8c7f802ac3c6
-
SHA1
a13153797adb79692ab67ee1a570992361e99e32
-
SHA256
148f9323bfa012015d99745e7920268dfa39750704abf2e544dafc26a11aa29b
-
SHA512
7ec5f47eaba7a335a1a1ed3f3fb5a5160afd4fa8d0367f178718b0db52a864b6acc0cb5b977399acafb4b1e425a55ade95f08ad04ec6b6eef2ff7421ac0ac7ac
-
SSDEEP
1536:nSgy19JSVO1ONn511/tiOJXZzOmRkFOCWkdZnB5F2WQjtzSKQ8D0:nS7BE51XiOJpzOckFOi/B5FnEzTQT
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4872 lrlrxfx.exe 2556 1dvvp.exe 2732 vdjdp.exe 2888 pjppd.exe 4028 htbbtb.exe 3060 jjjdp.exe 1612 xfxlxll.exe 1308 nbhbbb.exe 5080 pjdvp.exe 524 xrrlxrl.exe 2316 tbtbht.exe 3808 dpddd.exe 3964 rrfxrrf.exe 4340 5hhhbh.exe 2780 flrlffx.exe 1336 tnhnnt.exe 436 xflfrxf.exe 3588 ppppj.exe 2804 5hhbhh.exe 4744 dpjjd.exe 3352 lxxrlfx.exe 1700 nthhbt.exe 4088 fxfxrrl.exe 2716 thnnnn.exe 4048 vvjjd.exe 684 1ttthh.exe 4836 vdvpd.exe 4244 bhnhbb.exe 884 dpjjd.exe 2264 rxrrfxr.exe 4332 tnthbb.exe 924 vvpjj.exe 5100 rrfxrrr.exe 3916 dvdvv.exe 4788 xlrlxxr.exe 4028 nnntnh.exe 3060 djdjp.exe 224 rfxxrrr.exe 4716 ntbtnn.exe 1308 1jjdp.exe 4508 fflfrll.exe 1280 hntnbt.exe 408 jdvpv.exe 4388 fxrflfr.exe 1764 flrrlll.exe 4908 pjvjv.exe 4400 jvdvp.exe 4340 bthhhh.exe 1204 jdpjv.exe 4576 3djdp.exe 4336 lxrlxrf.exe 3416 thtbtt.exe 3700 jdjdp.exe 3488 vvvpv.exe 3252 frrlxxr.exe 3616 bhtbtb.exe 4212 7dddd.exe 4088 ppvpv.exe 2076 frrfrrx.exe 2272 1ttbtt.exe 2096 vvppd.exe 3952 vjpjv.exe 1736 llffrrl.exe 2444 jpvpd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 4872 3904 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 89 PID 3904 wrote to memory of 4872 3904 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 89 PID 3904 wrote to memory of 4872 3904 7ac2eda72fb54fa7affa8c7f802ac3c6.exe 89 PID 4872 wrote to memory of 2556 4872 lrlrxfx.exe 93 PID 4872 wrote to memory of 2556 4872 lrlrxfx.exe 93 PID 4872 wrote to memory of 2556 4872 lrlrxfx.exe 93 PID 2556 wrote to memory of 2732 2556 1dvvp.exe 94 PID 2556 wrote to memory of 2732 2556 1dvvp.exe 94 PID 2556 wrote to memory of 2732 2556 1dvvp.exe 94 PID 2732 wrote to memory of 2888 2732 vdjdp.exe 95 PID 2732 wrote to memory of 2888 2732 vdjdp.exe 95 PID 2732 wrote to memory of 2888 2732 vdjdp.exe 95 PID 2888 wrote to memory of 4028 2888 pjppd.exe 96 PID 2888 wrote to memory of 4028 2888 pjppd.exe 96 PID 2888 wrote to memory of 4028 2888 pjppd.exe 96 PID 4028 wrote to memory of 3060 4028 htbbtb.exe 97 PID 4028 wrote to memory of 3060 4028 htbbtb.exe 97 PID 4028 wrote to memory of 3060 4028 htbbtb.exe 97 PID 3060 wrote to memory of 1612 3060 jjjdp.exe 98 PID 3060 wrote to memory of 1612 3060 jjjdp.exe 98 PID 3060 wrote to memory of 1612 3060 jjjdp.exe 98 PID 1612 wrote to memory of 1308 1612 xfxlxll.exe 99 PID 1612 wrote to memory of 1308 1612 xfxlxll.exe 99 PID 1612 wrote to memory of 1308 1612 xfxlxll.exe 99 PID 1308 wrote to memory of 5080 1308 nbhbbb.exe 100 PID 1308 wrote to memory of 5080 1308 nbhbbb.exe 100 PID 1308 wrote to memory of 5080 1308 nbhbbb.exe 100 PID 5080 wrote to memory of 524 5080 pjdvp.exe 101 PID 5080 wrote to memory of 524 5080 pjdvp.exe 101 PID 5080 wrote to memory of 524 5080 pjdvp.exe 101 PID 524 wrote to memory of 2316 524 xrrlxrl.exe 102 PID 524 wrote to memory of 2316 524 xrrlxrl.exe 102 PID 524 wrote to memory of 2316 524 xrrlxrl.exe 102 PID 2316 wrote to memory of 3808 2316 tbtbht.exe 103 PID 2316 wrote to memory of 3808 2316 tbtbht.exe 103 PID 2316 wrote to memory of 3808 2316 tbtbht.exe 103 PID 3808 wrote to memory of 3964 3808 dpddd.exe 104 PID 3808 wrote to memory of 3964 3808 dpddd.exe 104 PID 3808 wrote to memory of 3964 3808 dpddd.exe 104 PID 3964 wrote to memory of 4340 3964 rrfxrrf.exe 105 PID 3964 wrote to memory of 4340 3964 rrfxrrf.exe 105 PID 3964 wrote to memory of 4340 3964 rrfxrrf.exe 105 PID 4340 wrote to memory of 2780 4340 5hhhbh.exe 106 PID 4340 wrote to memory of 2780 4340 5hhhbh.exe 106 PID 4340 wrote to memory of 2780 4340 5hhhbh.exe 106 PID 2780 wrote to memory of 1336 2780 flrlffx.exe 107 PID 2780 wrote to memory of 1336 2780 flrlffx.exe 107 PID 2780 wrote to memory of 1336 2780 flrlffx.exe 107 PID 1336 wrote to memory of 436 1336 tnhnnt.exe 108 PID 1336 wrote to memory of 436 1336 tnhnnt.exe 108 PID 1336 wrote to memory of 436 1336 tnhnnt.exe 108 PID 436 wrote to memory of 3588 436 xflfrxf.exe 109 PID 436 wrote to memory of 3588 436 xflfrxf.exe 109 PID 436 wrote to memory of 3588 436 xflfrxf.exe 109 PID 3588 wrote to memory of 2804 3588 ppppj.exe 110 PID 3588 wrote to memory of 2804 3588 ppppj.exe 110 PID 3588 wrote to memory of 2804 3588 ppppj.exe 110 PID 2804 wrote to memory of 4744 2804 5hhbhh.exe 111 PID 2804 wrote to memory of 4744 2804 5hhbhh.exe 111 PID 2804 wrote to memory of 4744 2804 5hhbhh.exe 111 PID 4744 wrote to memory of 3352 4744 dpjjd.exe 112 PID 4744 wrote to memory of 3352 4744 dpjjd.exe 112 PID 4744 wrote to memory of 3352 4744 dpjjd.exe 112 PID 3352 wrote to memory of 1700 3352 lxxrlfx.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ac2eda72fb54fa7affa8c7f802ac3c6.exe"C:\Users\Admin\AppData\Local\Temp\7ac2eda72fb54fa7affa8c7f802ac3c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
\??\c:\lrlrxfx.exec:\lrlrxfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\1dvvp.exec:\1dvvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\vdjdp.exec:\vdjdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\pjppd.exec:\pjppd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\htbbtb.exec:\htbbtb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\jjjdp.exec:\jjjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\xfxlxll.exec:\xfxlxll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\nbhbbb.exec:\nbhbbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
\??\c:\pjdvp.exec:\pjdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\xrrlxrl.exec:\xrrlxrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\tbtbht.exec:\tbtbht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\dpddd.exec:\dpddd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\rrfxrrf.exec:\rrfxrrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\5hhhbh.exec:\5hhhbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\flrlffx.exec:\flrlffx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\tnhnnt.exec:\tnhnnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\xflfrxf.exec:\xflfrxf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\ppppj.exec:\ppppj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\5hhbhh.exec:\5hhbhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\dpjjd.exec:\dpjjd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\nthhbt.exec:\nthhbt.exe23⤵
- Executes dropped EXE
PID:1700 -
\??\c:\fxfxrrl.exec:\fxfxrrl.exe24⤵
- Executes dropped EXE
PID:4088 -
\??\c:\thnnnn.exec:\thnnnn.exe25⤵
- Executes dropped EXE
PID:2716 -
\??\c:\vvjjd.exec:\vvjjd.exe26⤵
- Executes dropped EXE
PID:4048 -
\??\c:\1ttthh.exec:\1ttthh.exe27⤵
- Executes dropped EXE
PID:684 -
\??\c:\vdvpd.exec:\vdvpd.exe28⤵
- Executes dropped EXE
PID:4836 -
\??\c:\bhnhbb.exec:\bhnhbb.exe29⤵
- Executes dropped EXE
PID:4244 -
\??\c:\dpjjd.exec:\dpjjd.exe30⤵
- Executes dropped EXE
PID:884 -
\??\c:\rxrrfxr.exec:\rxrrfxr.exe31⤵
- Executes dropped EXE
PID:2264 -
\??\c:\tnthbb.exec:\tnthbb.exe32⤵
- Executes dropped EXE
PID:4332 -
\??\c:\vvpjj.exec:\vvpjj.exe33⤵
- Executes dropped EXE
PID:924 -
\??\c:\rrfxrrr.exec:\rrfxrrr.exe34⤵
- Executes dropped EXE
PID:5100 -
\??\c:\dvdvv.exec:\dvdvv.exe35⤵
- Executes dropped EXE
PID:3916 -
\??\c:\xlrlxxr.exec:\xlrlxxr.exe36⤵
- Executes dropped EXE
PID:4788 -
\??\c:\nnntnh.exec:\nnntnh.exe37⤵
- Executes dropped EXE
PID:4028 -
\??\c:\djdjp.exec:\djdjp.exe38⤵
- Executes dropped EXE
PID:3060 -
\??\c:\rfxxrrr.exec:\rfxxrrr.exe39⤵
- Executes dropped EXE
PID:224 -
\??\c:\ntbtnn.exec:\ntbtnn.exe40⤵
- Executes dropped EXE
PID:4716 -
\??\c:\1jjdp.exec:\1jjdp.exe41⤵
- Executes dropped EXE
PID:1308 -
\??\c:\fflfrll.exec:\fflfrll.exe42⤵
- Executes dropped EXE
PID:4508 -
\??\c:\hntnbt.exec:\hntnbt.exe43⤵
- Executes dropped EXE
PID:1280 -
\??\c:\jdvpv.exec:\jdvpv.exe44⤵
- Executes dropped EXE
PID:408 -
\??\c:\fxrflfr.exec:\fxrflfr.exe45⤵
- Executes dropped EXE
PID:4388 -
\??\c:\flrrlll.exec:\flrrlll.exe46⤵
- Executes dropped EXE
PID:1764 -
\??\c:\pjvjv.exec:\pjvjv.exe47⤵
- Executes dropped EXE
PID:4908 -
\??\c:\jvdvp.exec:\jvdvp.exe48⤵
- Executes dropped EXE
PID:4400 -
\??\c:\bthhhh.exec:\bthhhh.exe49⤵
- Executes dropped EXE
PID:4340 -
\??\c:\jdpjv.exec:\jdpjv.exe50⤵
- Executes dropped EXE
PID:1204 -
\??\c:\3djdp.exec:\3djdp.exe51⤵
- Executes dropped EXE
PID:4576 -
\??\c:\lxrlxrf.exec:\lxrlxrf.exe52⤵
- Executes dropped EXE
PID:4336 -
\??\c:\thtbtt.exec:\thtbtt.exe53⤵
- Executes dropped EXE
PID:3416 -
\??\c:\jdjdp.exec:\jdjdp.exe54⤵
- Executes dropped EXE
PID:3700 -
\??\c:\vvvpv.exec:\vvvpv.exe55⤵
- Executes dropped EXE
PID:3488 -
\??\c:\frrlxxr.exec:\frrlxxr.exe56⤵
- Executes dropped EXE
PID:3252 -
\??\c:\bhtbtb.exec:\bhtbtb.exe57⤵
- Executes dropped EXE
PID:3616 -
\??\c:\7dddd.exec:\7dddd.exe58⤵
- Executes dropped EXE
PID:4212 -
\??\c:\ppvpv.exec:\ppvpv.exe59⤵
- Executes dropped EXE
PID:4088 -
\??\c:\frrfrrx.exec:\frrfrrx.exe60⤵
- Executes dropped EXE
PID:2076 -
\??\c:\1ttbtt.exec:\1ttbtt.exe61⤵
- Executes dropped EXE
PID:2272 -
\??\c:\vvppd.exec:\vvppd.exe62⤵
- Executes dropped EXE
PID:2096 -
\??\c:\vjpjv.exec:\vjpjv.exe63⤵
- Executes dropped EXE
PID:3952 -
\??\c:\llffrrl.exec:\llffrrl.exe64⤵
- Executes dropped EXE
PID:1736 -
\??\c:\rfflrfl.exec:\rfflrfl.exe65⤵PID:2444
-
\??\c:\hbnntt.exec:\hbnntt.exe66⤵PID:3960
-
\??\c:\djdvj.exec:\djdvj.exe67⤵PID:848
-
\??\c:\9ffxrrr.exec:\9ffxrrr.exe68⤵PID:1536
-
\??\c:\htbtth.exec:\htbtth.exe69⤵PID:1364
-
\??\c:\9jvvd.exec:\9jvvd.exe70⤵PID:1220
-
\??\c:\xxllllr.exec:\xxllllr.exe71⤵PID:2944
-
\??\c:\xfllfff.exec:\xfllfff.exe72⤵PID:3916
-
\??\c:\bntthh.exec:\bntthh.exe73⤵PID:5040
-
\??\c:\vvvvp.exec:\vvvvp.exe74⤵PID:1112
-
\??\c:\hhbttt.exec:\hhbttt.exe75⤵PID:4840
-
\??\c:\jdpjv.exec:\jdpjv.exe76⤵PID:1480
-
\??\c:\xxxrllf.exec:\xxxrllf.exe77⤵PID:5080
-
\??\c:\nbhbtn.exec:\nbhbtn.exe78⤵PID:1392
-
\??\c:\jjjjv.exec:\jjjjv.exe79⤵PID:2560
-
\??\c:\rffxxrr.exec:\rffxxrr.exe80⤵PID:1720
-
\??\c:\bbbnhn.exec:\bbbnhn.exe81⤵PID:2488
-
\??\c:\lfxrxfr.exec:\lfxrxfr.exe82⤵PID:4672
-
\??\c:\nnhhhn.exec:\nnhhhn.exe83⤵PID:3752
-
\??\c:\htbbnn.exec:\htbbnn.exe84⤵PID:2964
-
\??\c:\jvppd.exec:\jvppd.exe85⤵PID:4868
-
\??\c:\rlllrrx.exec:\rlllrrx.exe86⤵PID:4336
-
\??\c:\hhnnbb.exec:\hhnnbb.exe87⤵PID:3400
-
\??\c:\lxxrfxr.exec:\lxxrfxr.exe88⤵PID:4492
-
\??\c:\lxxxrrx.exec:\lxxxrrx.exe89⤵PID:3392
-
\??\c:\tntnnn.exec:\tntnnn.exe90⤵PID:3880
-
\??\c:\djdpv.exec:\djdpv.exe91⤵PID:4212
-
\??\c:\nhtnhh.exec:\nhtnhh.exe92⤵PID:2716
-
\??\c:\vjvvv.exec:\vjvvv.exe93⤵PID:3908
-
\??\c:\dpddp.exec:\dpddp.exe94⤵PID:3628
-
\??\c:\rllfxxx.exec:\rllfxxx.exe95⤵PID:2052
-
\??\c:\bbhhbt.exec:\bbhhbt.exe96⤵PID:316
-
\??\c:\dvdvp.exec:\dvdvp.exe97⤵PID:4048
-
\??\c:\fflfflr.exec:\fflfflr.exe98⤵PID:4928
-
\??\c:\ddpjd.exec:\ddpjd.exe99⤵PID:3960
-
\??\c:\vjpjd.exec:\vjpjd.exe100⤵PID:2104
-
\??\c:\5rxrffx.exec:\5rxrffx.exe101⤵PID:464
-
\??\c:\bnhbnb.exec:\bnhbnb.exe102⤵PID:3904
-
\??\c:\ddjjv.exec:\ddjjv.exe103⤵PID:4384
-
\??\c:\jvdvj.exec:\jvdvj.exe104⤵PID:4004
-
\??\c:\llrlxfl.exec:\llrlxfl.exe105⤵PID:4740
-
\??\c:\flrfxxx.exec:\flrfxxx.exe106⤵PID:5040
-
\??\c:\btnnhn.exec:\btnnhn.exe107⤵PID:4796
-
\??\c:\vdjjj.exec:\vdjjj.exe108⤵PID:4716
-
\??\c:\pdpjv.exec:\pdpjv.exe109⤵PID:5108
-
\??\c:\lffxrrr.exec:\lffxrrr.exe110⤵PID:1184
-
\??\c:\bnbbhh.exec:\bnbbhh.exe111⤵PID:1280
-
\??\c:\nthbtn.exec:\nthbtn.exe112⤵PID:3808
-
\??\c:\dpppp.exec:\dpppp.exe113⤵PID:1924
-
\??\c:\dvddd.exec:\dvddd.exe114⤵PID:1720
-
\??\c:\rxfxxlx.exec:\rxfxxlx.exe115⤵PID:5092
-
\??\c:\9xxffff.exec:\9xxffff.exe116⤵PID:4660
-
\??\c:\nhtttt.exec:\nhtttt.exe117⤵PID:3792
-
\??\c:\vpvvv.exec:\vpvvv.exe118⤵PID:756
-
\??\c:\vjpjd.exec:\vjpjd.exe119⤵PID:4448
-
\??\c:\xxflllr.exec:\xxflllr.exe120⤵PID:2328
-
\??\c:\rlfrllf.exec:\rlfrllf.exe121⤵PID:4576
-
\??\c:\bnhtbt.exec:\bnhtbt.exe122⤵PID:4032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-