Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe
Resource
win10v2004-20240426-en
General
-
Target
bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe
-
Size
42KB
-
MD5
a3dc04b4a58c25597a2295982b5d32da
-
SHA1
f4684328c33a98db3e3b1d489ec59d585daa399a
-
SHA256
bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb
-
SHA512
1877f751d9a40b6ab63fba11c37fcf0fde602c083e45164721dbbbee0833d26195843ccaa98e0b8fc6f5e7ad7377fde65e11f6ec4e1560ab632cc0ca04bbebc9
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZuZmLaI2p1:nSgy19JSVO1ONn511/tivXZxLaTpWq
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2416 txfhj.exe 2104 lpnjj.exe 2480 bnbnxj.exe 2568 bfdld.exe 884 lrppd.exe 2512 xtdjhp.exe 2648 jdrhdxj.exe 2504 xvxbvf.exe 2604 fvnnt.exe 2384 frxjpxd.exe 2608 vhhjvrb.exe 1012 vxtvfj.exe 1240 rddbhv.exe 1956 hrpjlv.exe 2548 xhppd.exe 2812 thjjbf.exe 1636 xrxhr.exe 1948 bbxdvh.exe 2000 hrplp.exe 1468 nlddjd.exe 2392 tlbdrx.exe 2508 fvxjx.exe 1460 xbjrp.exe 764 ddrlhr.exe 2264 vthlb.exe 324 lfhdt.exe 584 xhjhfvp.exe 524 prhhd.exe 2072 jnnvtv.exe 3020 thrhbl.exe 1048 nphlv.exe 1296 flldv.exe 1180 jdtjtrn.exe 1548 rbvxjbf.exe 2100 lxlbjdx.exe 2024 thjpjdp.exe 2284 tnjbb.exe 2748 drfhdnd.exe 940 hpxnthp.exe 804 pvnjvv.exe 948 rfdvfld.exe 2128 tbtvhb.exe 1204 hdddpxl.exe 1624 xlxdhv.exe 1704 xprxbb.exe 2704 hlrdt.exe 2144 lxrxbpl.exe 2552 lltjj.exe 2340 lbbfr.exe 2612 rhlvbp.exe 2640 rpjpnb.exe 2648 bxlpt.exe 2500 lrpftj.exe 2396 dvrjf.exe 1724 vbbbdh.exe 1892 xllnrt.exe 2844 ldlbhv.exe 1236 ptfhdvt.exe 1124 nnhdfft.exe 1372 lptvbb.exe 840 xhrnd.exe 2700 htxxt.exe 2792 vrvbhn.exe 2816 jvxljjd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2416 2300 bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe 28 PID 2300 wrote to memory of 2416 2300 bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe 28 PID 2300 wrote to memory of 2416 2300 bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe 28 PID 2300 wrote to memory of 2416 2300 bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe 28 PID 2416 wrote to memory of 2104 2416 txfhj.exe 29 PID 2416 wrote to memory of 2104 2416 txfhj.exe 29 PID 2416 wrote to memory of 2104 2416 txfhj.exe 29 PID 2416 wrote to memory of 2104 2416 txfhj.exe 29 PID 2104 wrote to memory of 2480 2104 lpnjj.exe 30 PID 2104 wrote to memory of 2480 2104 lpnjj.exe 30 PID 2104 wrote to memory of 2480 2104 lpnjj.exe 30 PID 2104 wrote to memory of 2480 2104 lpnjj.exe 30 PID 2480 wrote to memory of 2568 2480 bnbnxj.exe 31 PID 2480 wrote to memory of 2568 2480 bnbnxj.exe 31 PID 2480 wrote to memory of 2568 2480 bnbnxj.exe 31 PID 2480 wrote to memory of 2568 2480 bnbnxj.exe 31 PID 2568 wrote to memory of 884 2568 bfdld.exe 32 PID 2568 wrote to memory of 884 2568 bfdld.exe 32 PID 2568 wrote to memory of 884 2568 bfdld.exe 32 PID 2568 wrote to memory of 884 2568 bfdld.exe 32 PID 884 wrote to memory of 2512 884 lrppd.exe 33 PID 884 wrote to memory of 2512 884 lrppd.exe 33 PID 884 wrote to memory of 2512 884 lrppd.exe 33 PID 884 wrote to memory of 2512 884 lrppd.exe 33 PID 2512 wrote to memory of 2648 2512 xtdjhp.exe 34 PID 2512 wrote to memory of 2648 2512 xtdjhp.exe 34 PID 2512 wrote to memory of 2648 2512 xtdjhp.exe 34 PID 2512 wrote to memory of 2648 2512 xtdjhp.exe 34 PID 2648 wrote to memory of 2504 2648 jdrhdxj.exe 35 PID 2648 wrote to memory of 2504 2648 jdrhdxj.exe 35 PID 2648 wrote to memory of 2504 2648 jdrhdxj.exe 35 PID 2648 wrote to memory of 2504 2648 jdrhdxj.exe 35 PID 2504 wrote to memory of 2604 2504 xvxbvf.exe 36 PID 2504 wrote to memory of 2604 2504 xvxbvf.exe 36 PID 2504 wrote to memory of 2604 2504 xvxbvf.exe 36 PID 2504 wrote to memory of 2604 2504 xvxbvf.exe 36 PID 2604 wrote to memory of 2384 2604 fvnnt.exe 37 PID 2604 wrote to memory of 2384 2604 fvnnt.exe 37 PID 2604 wrote to memory of 2384 2604 fvnnt.exe 37 PID 2604 wrote to memory of 2384 2604 fvnnt.exe 37 PID 2384 wrote to memory of 2608 2384 frxjpxd.exe 38 PID 2384 wrote to memory of 2608 2384 frxjpxd.exe 38 PID 2384 wrote to memory of 2608 2384 frxjpxd.exe 38 PID 2384 wrote to memory of 2608 2384 frxjpxd.exe 38 PID 2608 wrote to memory of 1012 2608 vhhjvrb.exe 39 PID 2608 wrote to memory of 1012 2608 vhhjvrb.exe 39 PID 2608 wrote to memory of 1012 2608 vhhjvrb.exe 39 PID 2608 wrote to memory of 1012 2608 vhhjvrb.exe 39 PID 1012 wrote to memory of 1240 1012 vxtvfj.exe 40 PID 1012 wrote to memory of 1240 1012 vxtvfj.exe 40 PID 1012 wrote to memory of 1240 1012 vxtvfj.exe 40 PID 1012 wrote to memory of 1240 1012 vxtvfj.exe 40 PID 1240 wrote to memory of 1956 1240 rddbhv.exe 41 PID 1240 wrote to memory of 1956 1240 rddbhv.exe 41 PID 1240 wrote to memory of 1956 1240 rddbhv.exe 41 PID 1240 wrote to memory of 1956 1240 rddbhv.exe 41 PID 1956 wrote to memory of 2548 1956 hrpjlv.exe 42 PID 1956 wrote to memory of 2548 1956 hrpjlv.exe 42 PID 1956 wrote to memory of 2548 1956 hrpjlv.exe 42 PID 1956 wrote to memory of 2548 1956 hrpjlv.exe 42 PID 2548 wrote to memory of 2812 2548 xhppd.exe 43 PID 2548 wrote to memory of 2812 2548 xhppd.exe 43 PID 2548 wrote to memory of 2812 2548 xhppd.exe 43 PID 2548 wrote to memory of 2812 2548 xhppd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe"C:\Users\Admin\AppData\Local\Temp\bccec3303777b582cfe3bfaa52c163bf92e41f66b9bd7a24a88df34bb4a50edb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\txfhj.exec:\txfhj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\lpnjj.exec:\lpnjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\bnbnxj.exec:\bnbnxj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\bfdld.exec:\bfdld.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\lrppd.exec:\lrppd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\xtdjhp.exec:\xtdjhp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\jdrhdxj.exec:\jdrhdxj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\xvxbvf.exec:\xvxbvf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\fvnnt.exec:\fvnnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\frxjpxd.exec:\frxjpxd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\vhhjvrb.exec:\vhhjvrb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\vxtvfj.exec:\vxtvfj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\rddbhv.exec:\rddbhv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\hrpjlv.exec:\hrpjlv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\xhppd.exec:\xhppd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\thjjbf.exec:\thjjbf.exe17⤵
- Executes dropped EXE
PID:2812 -
\??\c:\xrxhr.exec:\xrxhr.exe18⤵
- Executes dropped EXE
PID:1636 -
\??\c:\bbxdvh.exec:\bbxdvh.exe19⤵
- Executes dropped EXE
PID:1948 -
\??\c:\hrplp.exec:\hrplp.exe20⤵
- Executes dropped EXE
PID:2000 -
\??\c:\nlddjd.exec:\nlddjd.exe21⤵
- Executes dropped EXE
PID:1468 -
\??\c:\tlbdrx.exec:\tlbdrx.exe22⤵
- Executes dropped EXE
PID:2392 -
\??\c:\fvxjx.exec:\fvxjx.exe23⤵
- Executes dropped EXE
PID:2508 -
\??\c:\xbjrp.exec:\xbjrp.exe24⤵
- Executes dropped EXE
PID:1460 -
\??\c:\ddrlhr.exec:\ddrlhr.exe25⤵
- Executes dropped EXE
PID:764 -
\??\c:\vthlb.exec:\vthlb.exe26⤵
- Executes dropped EXE
PID:2264 -
\??\c:\lfhdt.exec:\lfhdt.exe27⤵
- Executes dropped EXE
PID:324 -
\??\c:\xhjhfvp.exec:\xhjhfvp.exe28⤵
- Executes dropped EXE
PID:584 -
\??\c:\prhhd.exec:\prhhd.exe29⤵
- Executes dropped EXE
PID:524 -
\??\c:\jnnvtv.exec:\jnnvtv.exe30⤵
- Executes dropped EXE
PID:2072 -
\??\c:\thrhbl.exec:\thrhbl.exe31⤵
- Executes dropped EXE
PID:3020 -
\??\c:\nphlv.exec:\nphlv.exe32⤵
- Executes dropped EXE
PID:1048 -
\??\c:\flldv.exec:\flldv.exe33⤵
- Executes dropped EXE
PID:1296 -
\??\c:\jdtjtrn.exec:\jdtjtrn.exe34⤵
- Executes dropped EXE
PID:1180 -
\??\c:\rbvxjbf.exec:\rbvxjbf.exe35⤵
- Executes dropped EXE
PID:1548 -
\??\c:\lxlbjdx.exec:\lxlbjdx.exe36⤵
- Executes dropped EXE
PID:2100 -
\??\c:\thjpjdp.exec:\thjpjdp.exe37⤵
- Executes dropped EXE
PID:2024 -
\??\c:\tnjbb.exec:\tnjbb.exe38⤵
- Executes dropped EXE
PID:2284 -
\??\c:\drfhdnd.exec:\drfhdnd.exe39⤵
- Executes dropped EXE
PID:2748 -
\??\c:\hpxnthp.exec:\hpxnthp.exe40⤵
- Executes dropped EXE
PID:940 -
\??\c:\pvnjvv.exec:\pvnjvv.exe41⤵
- Executes dropped EXE
PID:804 -
\??\c:\rfdvfld.exec:\rfdvfld.exe42⤵
- Executes dropped EXE
PID:948 -
\??\c:\tbtvhb.exec:\tbtvhb.exe43⤵
- Executes dropped EXE
PID:2128 -
\??\c:\hdddpxl.exec:\hdddpxl.exe44⤵
- Executes dropped EXE
PID:1204 -
\??\c:\xlxdhv.exec:\xlxdhv.exe45⤵
- Executes dropped EXE
PID:1624 -
\??\c:\xprxbb.exec:\xprxbb.exe46⤵
- Executes dropped EXE
PID:1704 -
\??\c:\hlrdt.exec:\hlrdt.exe47⤵
- Executes dropped EXE
PID:2704 -
\??\c:\lxrxbpl.exec:\lxrxbpl.exe48⤵
- Executes dropped EXE
PID:2144 -
\??\c:\lltjj.exec:\lltjj.exe49⤵
- Executes dropped EXE
PID:2552 -
\??\c:\lbbfr.exec:\lbbfr.exe50⤵
- Executes dropped EXE
PID:2340 -
\??\c:\rhlvbp.exec:\rhlvbp.exe51⤵
- Executes dropped EXE
PID:2612 -
\??\c:\rpjpnb.exec:\rpjpnb.exe52⤵
- Executes dropped EXE
PID:2640 -
\??\c:\bxlpt.exec:\bxlpt.exe53⤵
- Executes dropped EXE
PID:2648 -
\??\c:\lrpftj.exec:\lrpftj.exe54⤵
- Executes dropped EXE
PID:2500 -
\??\c:\dvrjf.exec:\dvrjf.exe55⤵
- Executes dropped EXE
PID:2396 -
\??\c:\vbbbdh.exec:\vbbbdh.exe56⤵
- Executes dropped EXE
PID:1724 -
\??\c:\xllnrt.exec:\xllnrt.exe57⤵
- Executes dropped EXE
PID:1892 -
\??\c:\ldlbhv.exec:\ldlbhv.exe58⤵
- Executes dropped EXE
PID:2844 -
\??\c:\ptfhdvt.exec:\ptfhdvt.exe59⤵
- Executes dropped EXE
PID:1236 -
\??\c:\nnhdfft.exec:\nnhdfft.exe60⤵
- Executes dropped EXE
PID:1124 -
\??\c:\lptvbb.exec:\lptvbb.exe61⤵
- Executes dropped EXE
PID:1372 -
\??\c:\xhrnd.exec:\xhrnd.exe62⤵
- Executes dropped EXE
PID:840 -
\??\c:\htxxt.exec:\htxxt.exe63⤵
- Executes dropped EXE
PID:2700 -
\??\c:\vrvbhn.exec:\vrvbhn.exe64⤵
- Executes dropped EXE
PID:2792 -
\??\c:\jvxljjd.exec:\jvxljjd.exe65⤵
- Executes dropped EXE
PID:2816 -
\??\c:\lpxxjv.exec:\lpxxjv.exe66⤵PID:1628
-
\??\c:\txbbnd.exec:\txbbnd.exe67⤵PID:1340
-
\??\c:\prhvjd.exec:\prhvjd.exe68⤵PID:1928
-
\??\c:\vfvxp.exec:\vfvxp.exe69⤵PID:1688
-
\??\c:\brrlj.exec:\brrlj.exe70⤵PID:2156
-
\??\c:\tlllt.exec:\tlllt.exe71⤵PID:2632
-
\??\c:\bttrtnt.exec:\bttrtnt.exe72⤵PID:2588
-
\??\c:\vdvdth.exec:\vdvdth.exe73⤵PID:2004
-
\??\c:\vbbhb.exec:\vbbhb.exe74⤵PID:1100
-
\??\c:\dttvt.exec:\dttvt.exe75⤵PID:952
-
\??\c:\rrdnn.exec:\rrdnn.exe76⤵PID:2428
-
\??\c:\dnxlpjt.exec:\dnxlpjt.exe77⤵PID:2264
-
\??\c:\ntddt.exec:\ntddt.exe78⤵PID:336
-
\??\c:\lntjpnp.exec:\lntjpnp.exe79⤵PID:2140
-
\??\c:\bxhrt.exec:\bxhrt.exe80⤵PID:1728
-
\??\c:\pdddjl.exec:\pdddjl.exe81⤵PID:2084
-
\??\c:\ntvhtp.exec:\ntvhtp.exe82⤵PID:416
-
\??\c:\dvrldl.exec:\dvrldl.exe83⤵PID:876
-
\??\c:\xbdpnpn.exec:\xbdpnpn.exe84⤵PID:1788
-
\??\c:\rtnnhhn.exec:\rtnnhhn.exe85⤵PID:1796
-
\??\c:\lpjhd.exec:\lpjhd.exe86⤵PID:1156
-
\??\c:\tlhthn.exec:\tlhthn.exe87⤵PID:1612
-
\??\c:\ttlvxl.exec:\ttlvxl.exe88⤵PID:1828
-
\??\c:\xdxhph.exec:\xdxhph.exe89⤵PID:908
-
\??\c:\hhhjtbn.exec:\hhhjtbn.exe90⤵PID:608
-
\??\c:\xjnjltx.exec:\xjnjltx.exe91⤵PID:2976
-
\??\c:\brvlx.exec:\brvlx.exe92⤵PID:1616
-
\??\c:\nfdjbp.exec:\nfdjbp.exe93⤵PID:1756
-
\??\c:\jjltvpt.exec:\jjltvpt.exe94⤵PID:1824
-
\??\c:\tpddpf.exec:\tpddpf.exe95⤵PID:704
-
\??\c:\dbjnljl.exec:\dbjnljl.exe96⤵PID:1524
-
\??\c:\bljpx.exec:\bljpx.exe97⤵PID:2076
-
\??\c:\vflhtt.exec:\vflhtt.exe98⤵PID:2172
-
\??\c:\rxjnjf.exec:\rxjnjf.exe99⤵PID:2300
-
\??\c:\dpbhp.exec:\dpbhp.exe100⤵PID:2908
-
\??\c:\phjpx.exec:\phjpx.exe101⤵PID:2476
-
\??\c:\hjdvbdh.exec:\hjdvbdh.exe102⤵PID:2456
-
\??\c:\ldhpxh.exec:\ldhpxh.exe103⤵PID:2436
-
\??\c:\fvnplj.exec:\fvnplj.exe104⤵PID:2680
-
\??\c:\vltrtb.exec:\vltrtb.exe105⤵PID:2672
-
\??\c:\hfthnxl.exec:\hfthnxl.exe106⤵PID:2712
-
\??\c:\ndhjpbb.exec:\ndhjpbb.exe107⤵PID:2352
-
\??\c:\thtpf.exec:\thtpf.exe108⤵PID:2452
-
\??\c:\ndrvp.exec:\ndrvp.exe109⤵PID:1084
-
\??\c:\brrth.exec:\brrth.exe110⤵PID:2176
-
\??\c:\rvpxnt.exec:\rvpxnt.exe111⤵PID:1300
-
\??\c:\nthpdxx.exec:\nthpdxx.exe112⤵PID:1364
-
\??\c:\flpdpd.exec:\flpdpd.exe113⤵PID:1632
-
\??\c:\hdrrjj.exec:\hdrrjj.exe114⤵PID:1172
-
\??\c:\hjpnx.exec:\hjpnx.exe115⤵PID:284
-
\??\c:\dnlfdhl.exec:\dnlfdhl.exe116⤵PID:1904
-
\??\c:\jhtnr.exec:\jhtnr.exe117⤵PID:2820
-
\??\c:\thvlbr.exec:\thvlbr.exe118⤵PID:2584
-
\??\c:\bblxbp.exec:\bblxbp.exe119⤵PID:1140
-
\??\c:\vvvhrbf.exec:\vvvhrbf.exe120⤵PID:2372
-
\??\c:\jhhhpn.exec:\jhhhpn.exe121⤵PID:2224
-
\??\c:\xdlfh.exec:\xdlfh.exe122⤵PID:1540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-