Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe
Resource
win10v2004-20240419-en
General
-
Target
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe
-
Size
40KB
-
MD5
a1c4584147f6adad815bb97051e9bed2
-
SHA1
f89e7bd6d29aae35201dac24b3ec28bea12bef1f
-
SHA256
6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4
-
SHA512
ebcd306d197f47380aa3f775a1154908955e618d44b4b4885a2b8847c06542f6c4a773741850fc2310086286934130a6cfc151803771fc6189554497d9fe7010
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZuZmLaFQ:nSgy19JSVO1ONn511/tivXZxLaq
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4528 tnnhhh.exe 1980 bbtnbb.exe 3116 lxlfrrr.exe 2004 vjjdp.exe 3440 3ttnbt.exe 3376 ddjpj.exe 2488 fllfxrl.exe 4200 7bthtt.exe 1504 9tthtn.exe 4068 jdddd.exe 1148 rxfflfx.exe 2480 1xfflfl.exe 4820 pdpjd.exe 1632 lrxlfxx.exe 888 1bbbtt.exe 3312 vjdpj.exe 5104 jdjvp.exe 3468 rrxrrll.exe 3592 bhnhbb.exe 4256 djppv.exe 4560 thbnbb.exe 1388 thbttt.exe 5080 pjjvp.exe 1132 dppdp.exe 668 1rxrxrx.exe 676 xrxxrrx.exe 3948 hbtnhh.exe 4920 dpvpd.exe 4868 vppjp.exe 4632 xllffxf.exe 3436 lllrlfx.exe 4608 tnthbt.exe 4332 thnhtt.exe 3360 9dvpd.exe 2316 vdjvj.exe 1076 xlfrffr.exe 3148 fxffxff.exe 4668 hntnhh.exe 816 3pvvj.exe 2152 vjvjj.exe 1504 7xxrffr.exe 4636 xrxrrrx.exe 3288 bhhbnh.exe 4304 bnhbnh.exe 4684 tnhbnh.exe 2612 vpppj.exe 2008 1rrrfff.exe 2640 httnhh.exe 1516 bttthh.exe 1636 djvvp.exe 888 jvdvd.exe 4000 ppvpp.exe 4100 lxfxrlf.exe 2924 tnhhbb.exe 4268 thnbnn.exe 2172 nhbhhn.exe 4352 5pvpd.exe 4416 lflfxxx.exe 4576 llxxffl.exe 4552 9ntnbt.exe 4560 vvdvj.exe 212 pjvdd.exe 4432 rllxfxl.exe 4420 xxfrlfx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4528 1088 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 84 PID 1088 wrote to memory of 4528 1088 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 84 PID 1088 wrote to memory of 4528 1088 6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe 84 PID 4528 wrote to memory of 1980 4528 tnnhhh.exe 87 PID 4528 wrote to memory of 1980 4528 tnnhhh.exe 87 PID 4528 wrote to memory of 1980 4528 tnnhhh.exe 87 PID 1980 wrote to memory of 3116 1980 bbtnbb.exe 89 PID 1980 wrote to memory of 3116 1980 bbtnbb.exe 89 PID 1980 wrote to memory of 3116 1980 bbtnbb.exe 89 PID 3116 wrote to memory of 2004 3116 lxlfrrr.exe 90 PID 3116 wrote to memory of 2004 3116 lxlfrrr.exe 90 PID 3116 wrote to memory of 2004 3116 lxlfrrr.exe 90 PID 2004 wrote to memory of 3440 2004 vjjdp.exe 91 PID 2004 wrote to memory of 3440 2004 vjjdp.exe 91 PID 2004 wrote to memory of 3440 2004 vjjdp.exe 91 PID 3440 wrote to memory of 3376 3440 3ttnbt.exe 92 PID 3440 wrote to memory of 3376 3440 3ttnbt.exe 92 PID 3440 wrote to memory of 3376 3440 3ttnbt.exe 92 PID 3376 wrote to memory of 2488 3376 ddjpj.exe 93 PID 3376 wrote to memory of 2488 3376 ddjpj.exe 93 PID 3376 wrote to memory of 2488 3376 ddjpj.exe 93 PID 2488 wrote to memory of 4200 2488 fllfxrl.exe 94 PID 2488 wrote to memory of 4200 2488 fllfxrl.exe 94 PID 2488 wrote to memory of 4200 2488 fllfxrl.exe 94 PID 4200 wrote to memory of 1504 4200 7bthtt.exe 95 PID 4200 wrote to memory of 1504 4200 7bthtt.exe 95 PID 4200 wrote to memory of 1504 4200 7bthtt.exe 95 PID 1504 wrote to memory of 4068 1504 9tthtn.exe 96 PID 1504 wrote to memory of 4068 1504 9tthtn.exe 96 PID 1504 wrote to memory of 4068 1504 9tthtn.exe 96 PID 4068 wrote to memory of 1148 4068 jdddd.exe 97 PID 4068 wrote to memory of 1148 4068 jdddd.exe 97 PID 4068 wrote to memory of 1148 4068 jdddd.exe 97 PID 1148 wrote to memory of 2480 1148 rxfflfx.exe 98 PID 1148 wrote to memory of 2480 1148 rxfflfx.exe 98 PID 1148 wrote to memory of 2480 1148 rxfflfx.exe 98 PID 2480 wrote to memory of 4820 2480 1xfflfl.exe 101 PID 2480 wrote to memory of 4820 2480 1xfflfl.exe 101 PID 2480 wrote to memory of 4820 2480 1xfflfl.exe 101 PID 4820 wrote to memory of 1632 4820 pdpjd.exe 102 PID 4820 wrote to memory of 1632 4820 pdpjd.exe 102 PID 4820 wrote to memory of 1632 4820 pdpjd.exe 102 PID 1632 wrote to memory of 888 1632 lrxlfxx.exe 105 PID 1632 wrote to memory of 888 1632 lrxlfxx.exe 105 PID 1632 wrote to memory of 888 1632 lrxlfxx.exe 105 PID 888 wrote to memory of 3312 888 1bbbtt.exe 106 PID 888 wrote to memory of 3312 888 1bbbtt.exe 106 PID 888 wrote to memory of 3312 888 1bbbtt.exe 106 PID 3312 wrote to memory of 5104 3312 vjdpj.exe 107 PID 3312 wrote to memory of 5104 3312 vjdpj.exe 107 PID 3312 wrote to memory of 5104 3312 vjdpj.exe 107 PID 5104 wrote to memory of 3468 5104 jdjvp.exe 108 PID 5104 wrote to memory of 3468 5104 jdjvp.exe 108 PID 5104 wrote to memory of 3468 5104 jdjvp.exe 108 PID 3468 wrote to memory of 3592 3468 rrxrrll.exe 111 PID 3468 wrote to memory of 3592 3468 rrxrrll.exe 111 PID 3468 wrote to memory of 3592 3468 rrxrrll.exe 111 PID 3592 wrote to memory of 4256 3592 bhnhbb.exe 113 PID 3592 wrote to memory of 4256 3592 bhnhbb.exe 113 PID 3592 wrote to memory of 4256 3592 bhnhbb.exe 113 PID 4256 wrote to memory of 4560 4256 djppv.exe 114 PID 4256 wrote to memory of 4560 4256 djppv.exe 114 PID 4256 wrote to memory of 4560 4256 djppv.exe 114 PID 4560 wrote to memory of 1388 4560 thbnbb.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe"C:\Users\Admin\AppData\Local\Temp\6fe8287e897dbd825d02b00a2d59f464127b90497b3eb7aa263fb1c39056d8f4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
\??\c:\tnnhhh.exec:\tnnhhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\bbtnbb.exec:\bbtnbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\lxlfrrr.exec:\lxlfrrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
\??\c:\vjjdp.exec:\vjjdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\3ttnbt.exec:\3ttnbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\ddjpj.exec:\ddjpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
\??\c:\fllfxrl.exec:\fllfxrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\7bthtt.exec:\7bthtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\9tthtn.exec:\9tthtn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\jdddd.exec:\jdddd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\rxfflfx.exec:\rxfflfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\1xfflfl.exec:\1xfflfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\pdpjd.exec:\pdpjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\lrxlfxx.exec:\lrxlfxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\1bbbtt.exec:\1bbbtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\vjdpj.exec:\vjdpj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\jdjvp.exec:\jdjvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\rrxrrll.exec:\rrxrrll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\bhnhbb.exec:\bhnhbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
\??\c:\djppv.exec:\djppv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
\??\c:\thbnbb.exec:\thbnbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\thbttt.exec:\thbttt.exe23⤵
- Executes dropped EXE
PID:1388 -
\??\c:\pjjvp.exec:\pjjvp.exe24⤵
- Executes dropped EXE
PID:5080 -
\??\c:\dppdp.exec:\dppdp.exe25⤵
- Executes dropped EXE
PID:1132 -
\??\c:\1rxrxrx.exec:\1rxrxrx.exe26⤵
- Executes dropped EXE
PID:668 -
\??\c:\xrxxrrx.exec:\xrxxrrx.exe27⤵
- Executes dropped EXE
PID:676 -
\??\c:\hhhttn.exec:\hhhttn.exe28⤵PID:5032
-
\??\c:\hbtnhh.exec:\hbtnhh.exe29⤵
- Executes dropped EXE
PID:3948 -
\??\c:\dpvpd.exec:\dpvpd.exe30⤵
- Executes dropped EXE
PID:4920 -
\??\c:\vppjp.exec:\vppjp.exe31⤵
- Executes dropped EXE
PID:4868 -
\??\c:\xllffxf.exec:\xllffxf.exe32⤵
- Executes dropped EXE
PID:4632 -
\??\c:\lllrlfx.exec:\lllrlfx.exe33⤵
- Executes dropped EXE
PID:3436 -
\??\c:\tnthbt.exec:\tnthbt.exe34⤵
- Executes dropped EXE
PID:4608 -
\??\c:\thnhtt.exec:\thnhtt.exe35⤵
- Executes dropped EXE
PID:4332 -
\??\c:\9dvpd.exec:\9dvpd.exe36⤵
- Executes dropped EXE
PID:3360 -
\??\c:\vdjvj.exec:\vdjvj.exe37⤵
- Executes dropped EXE
PID:2316 -
\??\c:\xlfrffr.exec:\xlfrffr.exe38⤵
- Executes dropped EXE
PID:1076 -
\??\c:\fxffxff.exec:\fxffxff.exe39⤵
- Executes dropped EXE
PID:3148 -
\??\c:\hntnhh.exec:\hntnhh.exe40⤵
- Executes dropped EXE
PID:4668 -
\??\c:\3pvvj.exec:\3pvvj.exe41⤵
- Executes dropped EXE
PID:816 -
\??\c:\vjvjj.exec:\vjvjj.exe42⤵
- Executes dropped EXE
PID:2152 -
\??\c:\7xxrffr.exec:\7xxrffr.exe43⤵
- Executes dropped EXE
PID:1504 -
\??\c:\xrxrrrx.exec:\xrxrrrx.exe44⤵
- Executes dropped EXE
PID:4636 -
\??\c:\bhhbnh.exec:\bhhbnh.exe45⤵
- Executes dropped EXE
PID:3288 -
\??\c:\bnhbnh.exec:\bnhbnh.exe46⤵
- Executes dropped EXE
PID:4304 -
\??\c:\tnhbnh.exec:\tnhbnh.exe47⤵
- Executes dropped EXE
PID:4684 -
\??\c:\vpppj.exec:\vpppj.exe48⤵
- Executes dropped EXE
PID:2612 -
\??\c:\1rrrfff.exec:\1rrrfff.exe49⤵
- Executes dropped EXE
PID:2008 -
\??\c:\httnhh.exec:\httnhh.exe50⤵
- Executes dropped EXE
PID:2640 -
\??\c:\bttthh.exec:\bttthh.exe51⤵
- Executes dropped EXE
PID:1516 -
\??\c:\djvvp.exec:\djvvp.exe52⤵
- Executes dropped EXE
PID:1636 -
\??\c:\jvdvd.exec:\jvdvd.exe53⤵
- Executes dropped EXE
PID:888 -
\??\c:\ppvpp.exec:\ppvpp.exe54⤵
- Executes dropped EXE
PID:4000 -
\??\c:\lxfxrlf.exec:\lxfxrlf.exe55⤵
- Executes dropped EXE
PID:4100 -
\??\c:\tnhhbb.exec:\tnhhbb.exe56⤵
- Executes dropped EXE
PID:2924 -
\??\c:\thnbnn.exec:\thnbnn.exe57⤵
- Executes dropped EXE
PID:4268 -
\??\c:\nhbhhn.exec:\nhbhhn.exe58⤵
- Executes dropped EXE
PID:2172 -
\??\c:\5pvpd.exec:\5pvpd.exe59⤵
- Executes dropped EXE
PID:4352 -
\??\c:\lflfxxx.exec:\lflfxxx.exe60⤵
- Executes dropped EXE
PID:4416 -
\??\c:\llxxffl.exec:\llxxffl.exe61⤵
- Executes dropped EXE
PID:4576 -
\??\c:\9ntnbt.exec:\9ntnbt.exe62⤵
- Executes dropped EXE
PID:4552 -
\??\c:\vvdvj.exec:\vvdvj.exe63⤵
- Executes dropped EXE
PID:4560 -
\??\c:\pjvdd.exec:\pjvdd.exe64⤵
- Executes dropped EXE
PID:212 -
\??\c:\rllxfxl.exec:\rllxfxl.exe65⤵
- Executes dropped EXE
PID:4432 -
\??\c:\xxfrlfx.exec:\xxfrlfx.exe66⤵
- Executes dropped EXE
PID:4420 -
\??\c:\hbhhbh.exec:\hbhhbh.exe67⤵PID:208
-
\??\c:\jdppj.exec:\jdppj.exe68⤵PID:4892
-
\??\c:\rxfxlll.exec:\rxfxlll.exe69⤵PID:4444
-
\??\c:\9lxrxxf.exec:\9lxrxxf.exe70⤵PID:5080
-
\??\c:\tnnhbb.exec:\tnnhbb.exe71⤵PID:4860
-
\??\c:\tnnnbt.exec:\tnnnbt.exe72⤵PID:2572
-
\??\c:\jddpp.exec:\jddpp.exe73⤵PID:2596
-
\??\c:\vvdvj.exec:\vvdvj.exe74⤵PID:5032
-
\??\c:\pjpjj.exec:\pjpjj.exe75⤵PID:3772
-
\??\c:\xrrfxxr.exec:\xrrfxxr.exe76⤵PID:3728
-
\??\c:\btbbtb.exec:\btbbtb.exe77⤵PID:404
-
\??\c:\bnnnbb.exec:\bnnnbb.exe78⤵PID:2516
-
\??\c:\vvjdp.exec:\vvjdp.exe79⤵PID:2816
-
\??\c:\vppjd.exec:\vppjd.exe80⤵PID:4332
-
\??\c:\3jjdp.exec:\3jjdp.exe81⤵PID:1156
-
\??\c:\fxxrllf.exec:\fxxrllf.exe82⤵PID:3376
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe83⤵PID:1076
-
\??\c:\5hhbtt.exec:\5hhbtt.exe84⤵PID:3800
-
\??\c:\vjvvv.exec:\vjvvv.exe85⤵PID:4668
-
\??\c:\pdjvp.exec:\pdjvp.exe86⤵PID:816
-
\??\c:\rlrlxxx.exec:\rlrlxxx.exe87⤵PID:3100
-
\??\c:\hbtntt.exec:\hbtntt.exe88⤵PID:4068
-
\??\c:\btnnbb.exec:\btnnbb.exe89⤵PID:748
-
\??\c:\nhhbtt.exec:\nhhbtt.exe90⤵PID:4236
-
\??\c:\dpvvp.exec:\dpvvp.exe91⤵PID:1028
-
\??\c:\pjjdv.exec:\pjjdv.exe92⤵PID:1448
-
\??\c:\lxxfrfx.exec:\lxxfrfx.exe93⤵PID:752
-
\??\c:\xxfxrfx.exec:\xxfxrfx.exe94⤵PID:4280
-
\??\c:\httnhh.exec:\httnhh.exe95⤵PID:740
-
\??\c:\hbtthh.exec:\hbtthh.exe96⤵PID:3580
-
\??\c:\btbbnn.exec:\btbbnn.exe97⤵PID:1784
-
\??\c:\lffxxxx.exec:\lffxxxx.exe98⤵PID:4000
-
\??\c:\rflfxxr.exec:\rflfxxr.exe99⤵PID:2400
-
\??\c:\thnnhb.exec:\thnnhb.exe100⤵PID:988
-
\??\c:\hbbtth.exec:\hbbtth.exe101⤵PID:4268
-
\??\c:\jdjdp.exec:\jdjdp.exe102⤵PID:3592
-
\??\c:\dddvp.exec:\dddvp.exe103⤵PID:4152
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe104⤵PID:4416
-
\??\c:\btttnn.exec:\btttnn.exe105⤵PID:3996
-
\??\c:\nbhhbb.exec:\nbhhbb.exe106⤵PID:4856
-
\??\c:\tnbthb.exec:\tnbthb.exe107⤵PID:4560
-
\??\c:\dvjpv.exec:\dvjpv.exe108⤵PID:2264
-
\??\c:\rlfxrrx.exec:\rlfxrrx.exe109⤵PID:4432
-
\??\c:\5hhbtt.exec:\5hhbtt.exe110⤵PID:4864
-
\??\c:\htbtnn.exec:\htbtnn.exe111⤵PID:208
-
\??\c:\pdjdv.exec:\pdjdv.exe112⤵PID:4892
-
\??\c:\rffxffr.exec:\rffxffr.exe113⤵PID:3692
-
\??\c:\fxxlfxr.exec:\fxxlfxr.exe114⤵PID:4320
-
\??\c:\fxxrrrx.exec:\fxxrrrx.exe115⤵PID:2388
-
\??\c:\ntttnn.exec:\ntttnn.exe116⤵PID:4832
-
\??\c:\dvppd.exec:\dvppd.exe117⤵PID:1088
-
\??\c:\vpvdp.exec:\vpvdp.exe118⤵PID:636
-
\??\c:\xfflllr.exec:\xfflllr.exe119⤵PID:4088
-
\??\c:\xlrrrlr.exec:\xlrrrlr.exe120⤵PID:2776
-
\??\c:\nhhbbb.exec:\nhhbbb.exe121⤵PID:4608
-
\??\c:\bhnbbn.exec:\bhnbbn.exe122⤵PID:2332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-