Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe
Resource
win10v2004-20240419-en
General
-
Target
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe
-
Size
40KB
-
MD5
a1c4584147f6adad815bb97051e9bed2
-
SHA1
f89e7bd6d29aae35201dac24b3ec28bea12bef1f
-
SHA256
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4
-
SHA512
ebcd306d197f47380aa3f775a1154908955e618d44b4b4885a2b8847c06542f6c4a773741850fc2310086286934130a6cfc151803771fc6189554497d9fe7010
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZuZmLaFQ:nSgy19JSVO1ONn511/tivXZxLaq
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2952 686000.exe 2740 xrxllfr.exe 2304 fflrlfl.exe 2648 1vddj.exe 2596 0244600.exe 2716 20880.exe 2600 206842.exe 2464 6424668.exe 2664 pjddj.exe 2472 0484066.exe 840 bbnbhb.exe 2780 w48200.exe 2940 fxlxfll.exe 1508 q42844.exe 1740 864806.exe 1832 s4440.exe 2256 jpjdd.exe 1532 vpddj.exe 2752 44040.exe 1760 04246.exe 1268 nthbbb.exe 1728 604062.exe 1972 80280.exe 1944 8680022.exe 2828 hbbhbb.exe 2420 thnbhn.exe 596 84042.exe 312 nhnbtt.exe 848 xrffxrr.exe 1804 pjvdv.exe 420 rfxxlrx.exe 1372 9tbbbt.exe 2032 86604.exe 1668 5vddd.exe 1396 tbhtnn.exe 2144 e08406.exe 556 u866844.exe 1020 84262.exe 3044 e42244.exe 1696 4244666.exe 2008 020466.exe 1092 lflxffl.exe 2040 vpddj.exe 1636 g0400.exe 2220 086022.exe 1712 02064.exe 2232 28840.exe 2736 ddppp.exe 3000 e26624.exe 3060 20440.exe 3020 tnbhtb.exe 2564 8628884.exe 2732 86282.exe 2712 hhhtnb.exe 2528 dpvdj.exe 2600 080026.exe 2976 hbnthh.exe 2460 08240.exe 2456 o026666.exe 2776 9pvvv.exe 2892 dvjdj.exe 2932 nhnttn.exe 2936 w40400.exe 2152 08000.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2952 2212 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 28 PID 2212 wrote to memory of 2952 2212 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 28 PID 2212 wrote to memory of 2952 2212 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 28 PID 2212 wrote to memory of 2952 2212 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 28 PID 2952 wrote to memory of 2740 2952 686000.exe 29 PID 2952 wrote to memory of 2740 2952 686000.exe 29 PID 2952 wrote to memory of 2740 2952 686000.exe 29 PID 2952 wrote to memory of 2740 2952 686000.exe 29 PID 2740 wrote to memory of 2304 2740 xrxllfr.exe 30 PID 2740 wrote to memory of 2304 2740 xrxllfr.exe 30 PID 2740 wrote to memory of 2304 2740 xrxllfr.exe 30 PID 2740 wrote to memory of 2304 2740 xrxllfr.exe 30 PID 2304 wrote to memory of 2648 2304 fflrlfl.exe 31 PID 2304 wrote to memory of 2648 2304 fflrlfl.exe 31 PID 2304 wrote to memory of 2648 2304 fflrlfl.exe 31 PID 2304 wrote to memory of 2648 2304 fflrlfl.exe 31 PID 2648 wrote to memory of 2596 2648 1vddj.exe 32 PID 2648 wrote to memory of 2596 2648 1vddj.exe 32 PID 2648 wrote to memory of 2596 2648 1vddj.exe 32 PID 2648 wrote to memory of 2596 2648 1vddj.exe 32 PID 2596 wrote to memory of 2716 2596 0244600.exe 33 PID 2596 wrote to memory of 2716 2596 0244600.exe 33 PID 2596 wrote to memory of 2716 2596 0244600.exe 33 PID 2596 wrote to memory of 2716 2596 0244600.exe 33 PID 2716 wrote to memory of 2600 2716 20880.exe 34 PID 2716 wrote to memory of 2600 2716 20880.exe 34 PID 2716 wrote to memory of 2600 2716 20880.exe 34 PID 2716 wrote to memory of 2600 2716 20880.exe 34 PID 2600 wrote to memory of 2464 2600 206842.exe 35 PID 2600 wrote to memory of 2464 2600 206842.exe 35 PID 2600 wrote to memory of 2464 2600 206842.exe 35 PID 2600 wrote to memory of 2464 2600 206842.exe 35 PID 2464 wrote to memory of 2664 2464 6424668.exe 36 PID 2464 wrote to memory of 2664 2464 6424668.exe 36 PID 2464 wrote to memory of 2664 2464 6424668.exe 36 PID 2464 wrote to memory of 2664 2464 6424668.exe 36 PID 2664 wrote to memory of 2472 2664 pjddj.exe 37 PID 2664 wrote to memory of 2472 2664 pjddj.exe 37 PID 2664 wrote to memory of 2472 2664 pjddj.exe 37 PID 2664 wrote to memory of 2472 2664 pjddj.exe 37 PID 2472 wrote to memory of 840 2472 0484066.exe 38 PID 2472 wrote to memory of 840 2472 0484066.exe 38 PID 2472 wrote to memory of 840 2472 0484066.exe 38 PID 2472 wrote to memory of 840 2472 0484066.exe 38 PID 840 wrote to memory of 2780 840 bbnbhb.exe 39 PID 840 wrote to memory of 2780 840 bbnbhb.exe 39 PID 840 wrote to memory of 2780 840 bbnbhb.exe 39 PID 840 wrote to memory of 2780 840 bbnbhb.exe 39 PID 2780 wrote to memory of 2940 2780 w48200.exe 40 PID 2780 wrote to memory of 2940 2780 w48200.exe 40 PID 2780 wrote to memory of 2940 2780 w48200.exe 40 PID 2780 wrote to memory of 2940 2780 w48200.exe 40 PID 2940 wrote to memory of 1508 2940 fxlxfll.exe 41 PID 2940 wrote to memory of 1508 2940 fxlxfll.exe 41 PID 2940 wrote to memory of 1508 2940 fxlxfll.exe 41 PID 2940 wrote to memory of 1508 2940 fxlxfll.exe 41 PID 1508 wrote to memory of 1740 1508 q42844.exe 42 PID 1508 wrote to memory of 1740 1508 q42844.exe 42 PID 1508 wrote to memory of 1740 1508 q42844.exe 42 PID 1508 wrote to memory of 1740 1508 q42844.exe 42 PID 1740 wrote to memory of 1832 1740 864806.exe 43 PID 1740 wrote to memory of 1832 1740 864806.exe 43 PID 1740 wrote to memory of 1832 1740 864806.exe 43 PID 1740 wrote to memory of 1832 1740 864806.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe"C:\Users\Admin\AppData\Local\Temp\6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\686000.exec:\686000.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\xrxllfr.exec:\xrxllfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\fflrlfl.exec:\fflrlfl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\1vddj.exec:\1vddj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\0244600.exec:\0244600.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\20880.exec:\20880.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\206842.exec:\206842.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\6424668.exec:\6424668.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\pjddj.exec:\pjddj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\0484066.exec:\0484066.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\bbnbhb.exec:\bbnbhb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\w48200.exec:\w48200.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\fxlxfll.exec:\fxlxfll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\q42844.exec:\q42844.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\864806.exec:\864806.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\s4440.exec:\s4440.exe17⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jpjdd.exec:\jpjdd.exe18⤵
- Executes dropped EXE
PID:2256 -
\??\c:\vpddj.exec:\vpddj.exe19⤵
- Executes dropped EXE
PID:1532 -
\??\c:\44040.exec:\44040.exe20⤵
- Executes dropped EXE
PID:2752 -
\??\c:\04246.exec:\04246.exe21⤵
- Executes dropped EXE
PID:1760 -
\??\c:\nthbbb.exec:\nthbbb.exe22⤵
- Executes dropped EXE
PID:1268 -
\??\c:\604062.exec:\604062.exe23⤵
- Executes dropped EXE
PID:1728 -
\??\c:\80280.exec:\80280.exe24⤵
- Executes dropped EXE
PID:1972 -
\??\c:\8680022.exec:\8680022.exe25⤵
- Executes dropped EXE
PID:1944 -
\??\c:\hbbhbb.exec:\hbbhbb.exe26⤵
- Executes dropped EXE
PID:2828 -
\??\c:\thnbhn.exec:\thnbhn.exe27⤵
- Executes dropped EXE
PID:2420 -
\??\c:\84042.exec:\84042.exe28⤵
- Executes dropped EXE
PID:596 -
\??\c:\nhnbtt.exec:\nhnbtt.exe29⤵
- Executes dropped EXE
PID:312 -
\??\c:\xrffxrr.exec:\xrffxrr.exe30⤵
- Executes dropped EXE
PID:848 -
\??\c:\pjvdv.exec:\pjvdv.exe31⤵
- Executes dropped EXE
PID:1804 -
\??\c:\rfxxlrx.exec:\rfxxlrx.exe32⤵
- Executes dropped EXE
PID:420 -
\??\c:\9tbbbt.exec:\9tbbbt.exe33⤵
- Executes dropped EXE
PID:1372 -
\??\c:\86604.exec:\86604.exe34⤵
- Executes dropped EXE
PID:2032 -
\??\c:\5vddd.exec:\5vddd.exe35⤵
- Executes dropped EXE
PID:1668 -
\??\c:\tbhtnn.exec:\tbhtnn.exe36⤵
- Executes dropped EXE
PID:1396 -
\??\c:\e08406.exec:\e08406.exe37⤵
- Executes dropped EXE
PID:2144 -
\??\c:\u866844.exec:\u866844.exe38⤵
- Executes dropped EXE
PID:556 -
\??\c:\84262.exec:\84262.exe39⤵
- Executes dropped EXE
PID:1020 -
\??\c:\e42244.exec:\e42244.exe40⤵
- Executes dropped EXE
PID:3044 -
\??\c:\4244666.exec:\4244666.exe41⤵
- Executes dropped EXE
PID:1696 -
\??\c:\020466.exec:\020466.exe42⤵
- Executes dropped EXE
PID:2008 -
\??\c:\lflxffl.exec:\lflxffl.exe43⤵
- Executes dropped EXE
PID:1092 -
\??\c:\vpddj.exec:\vpddj.exe44⤵
- Executes dropped EXE
PID:2040 -
\??\c:\g0400.exec:\g0400.exe45⤵
- Executes dropped EXE
PID:1636 -
\??\c:\086022.exec:\086022.exe46⤵
- Executes dropped EXE
PID:2220 -
\??\c:\02064.exec:\02064.exe47⤵
- Executes dropped EXE
PID:1712 -
\??\c:\28840.exec:\28840.exe48⤵
- Executes dropped EXE
PID:2232 -
\??\c:\ddppp.exec:\ddppp.exe49⤵
- Executes dropped EXE
PID:2736 -
\??\c:\e26624.exec:\e26624.exe50⤵
- Executes dropped EXE
PID:3000 -
\??\c:\20440.exec:\20440.exe51⤵
- Executes dropped EXE
PID:3060 -
\??\c:\tnbhtb.exec:\tnbhtb.exe52⤵
- Executes dropped EXE
PID:3020 -
\??\c:\8628884.exec:\8628884.exe53⤵
- Executes dropped EXE
PID:2564 -
\??\c:\86282.exec:\86282.exe54⤵
- Executes dropped EXE
PID:2732 -
\??\c:\hhhtnb.exec:\hhhtnb.exe55⤵
- Executes dropped EXE
PID:2712 -
\??\c:\dpvdj.exec:\dpvdj.exe56⤵
- Executes dropped EXE
PID:2528 -
\??\c:\080026.exec:\080026.exe57⤵
- Executes dropped EXE
PID:2600 -
\??\c:\hbnthh.exec:\hbnthh.exe58⤵
- Executes dropped EXE
PID:2976 -
\??\c:\08240.exec:\08240.exe59⤵
- Executes dropped EXE
PID:2460 -
\??\c:\o026666.exec:\o026666.exe60⤵
- Executes dropped EXE
PID:2456 -
\??\c:\9pvvv.exec:\9pvvv.exe61⤵
- Executes dropped EXE
PID:2776 -
\??\c:\dvjdj.exec:\dvjdj.exe62⤵
- Executes dropped EXE
PID:2892 -
\??\c:\nhnttn.exec:\nhnttn.exe63⤵
- Executes dropped EXE
PID:2932 -
\??\c:\w40400.exec:\w40400.exe64⤵
- Executes dropped EXE
PID:2936 -
\??\c:\08000.exec:\08000.exe65⤵
- Executes dropped EXE
PID:2152 -
\??\c:\hbnthn.exec:\hbnthn.exe66⤵PID:2064
-
\??\c:\4648440.exec:\4648440.exe67⤵PID:1740
-
\??\c:\rlllrlr.exec:\rlllrlr.exe68⤵PID:2272
-
\??\c:\frrxrxx.exec:\frrxrxx.exe69⤵PID:1624
-
\??\c:\e84000.exec:\e84000.exe70⤵PID:2256
-
\??\c:\e68840.exec:\e68840.exe71⤵PID:1532
-
\??\c:\jdvpj.exec:\jdvpj.exe72⤵PID:2616
-
\??\c:\646222.exec:\646222.exe73⤵PID:2028
-
\??\c:\00880.exec:\00880.exe74⤵PID:860
-
\??\c:\g2000.exec:\g2000.exe75⤵PID:2020
-
\??\c:\xxfflfr.exec:\xxfflfr.exe76⤵PID:1728
-
\??\c:\i240264.exec:\i240264.exe77⤵PID:1980
-
\??\c:\g6444.exec:\g6444.exe78⤵PID:2252
-
\??\c:\k68844.exec:\k68844.exe79⤵PID:2840
-
\??\c:\frxffll.exec:\frxffll.exe80⤵PID:2828
-
\??\c:\86880.exec:\86880.exe81⤵PID:2420
-
\??\c:\bthbhb.exec:\bthbhb.exe82⤵PID:940
-
\??\c:\646622.exec:\646622.exe83⤵PID:2140
-
\??\c:\jdvpp.exec:\jdvpp.exe84⤵PID:2864
-
\??\c:\dvddd.exec:\dvddd.exe85⤵PID:1840
-
\??\c:\e46088.exec:\e46088.exe86⤵PID:1888
-
\??\c:\pvdpv.exec:\pvdpv.exe87⤵PID:448
-
\??\c:\c266628.exec:\c266628.exe88⤵PID:2160
-
\??\c:\g0224.exec:\g0224.exe89⤵PID:1752
-
\??\c:\2486446.exec:\2486446.exe90⤵PID:1528
-
\??\c:\4204668.exec:\4204668.exe91⤵PID:1952
-
\??\c:\4246408.exec:\4246408.exe92⤵PID:1668
-
\??\c:\ddpvd.exec:\ddpvd.exe93⤵PID:1396
-
\??\c:\66008.exec:\66008.exe94⤵PID:2144
-
\??\c:\jvdjj.exec:\jvdjj.exe95⤵PID:564
-
\??\c:\lxfffxl.exec:\lxfffxl.exe96⤵PID:1764
-
\??\c:\xlrrxrr.exec:\xlrrxrr.exe97⤵PID:2180
-
\??\c:\bbbtnh.exec:\bbbtnh.exe98⤵PID:1696
-
\??\c:\q84440.exec:\q84440.exe99⤵PID:3052
-
\??\c:\868288.exec:\868288.exe100⤵PID:1092
-
\??\c:\80224.exec:\80224.exe101⤵PID:2196
-
\??\c:\dpvpp.exec:\dpvpp.exe102⤵PID:1636
-
\??\c:\nbhbbn.exec:\nbhbbn.exe103⤵PID:2220
-
\??\c:\vjppv.exec:\vjppv.exe104⤵PID:1712
-
\??\c:\vjjdp.exec:\vjjdp.exe105⤵PID:2212
-
\??\c:\vjvvd.exec:\vjvvd.exe106⤵PID:2736
-
\??\c:\7bnhbh.exec:\7bnhbh.exe107⤵PID:2672
-
\??\c:\46620.exec:\46620.exe108⤵PID:3060
-
\??\c:\480462.exec:\480462.exe109⤵PID:2648
-
\??\c:\vpvdv.exec:\vpvdv.exe110⤵PID:2564
-
\??\c:\04462.exec:\04462.exe111⤵PID:2732
-
\??\c:\hbnnbh.exec:\hbnnbh.exe112⤵PID:2712
-
\??\c:\e82800.exec:\e82800.exe113⤵PID:2468
-
\??\c:\804800.exec:\804800.exe114⤵PID:2576
-
\??\c:\pjvvj.exec:\pjvvj.exe115⤵PID:2976
-
\??\c:\bhhhbn.exec:\bhhhbn.exe116⤵PID:2504
-
\??\c:\7xffffl.exec:\7xffffl.exe117⤵PID:1896
-
\??\c:\rlxfllf.exec:\rlxfllf.exe118⤵PID:2888
-
\??\c:\hhbhtb.exec:\hhbhtb.exe119⤵PID:2788
-
\??\c:\2000040.exec:\2000040.exe120⤵PID:2932
-
\??\c:\rflxlrr.exec:\rflxlrr.exe121⤵PID:2000
-
\??\c:\rxlfflx.exec:\rxlfflx.exe122⤵PID:1580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-