Overview
overview
10Static
static
10VirusSign....f3.exe
windows7-x64
10VirusSign....f3.exe
windows10-2004-x64
10VirusSign....ff.exe
windows7-x64
7VirusSign....ff.exe
windows10-2004-x64
7VirusSign....2d.exe
windows7-x64
1VirusSign....2d.exe
windows10-2004-x64
1VirusSign....31.exe
windows7-x64
VirusSign....31.exe
windows10-2004-x64
VirusSign....67.exe
windows7-x64
1VirusSign....67.exe
windows10-2004-x64
10VirusSign....f9.exe
windows7-x64
10VirusSign....f9.exe
windows10-2004-x64
10VirusSign....76.exe
windows7-x64
10VirusSign....76.exe
windows10-2004-x64
10VirusSign....45.exe
windows7-x64
1VirusSign....45.exe
windows10-2004-x64
1VirusSign....3a.exe
windows7-x64
10VirusSign....3a.exe
windows10-2004-x64
10VirusSign....2b.exe
windows7-x64
7VirusSign....2b.exe
windows10-2004-x64
7VirusSign....74.exe
windows7-x64
1VirusSign....74.exe
windows10-2004-x64
1VirusSign....9e.exe
windows7-x64
7VirusSign....9e.exe
windows10-2004-x64
7VirusSign....22.exe
windows7-x64
7VirusSign....22.exe
windows10-2004-x64
7VirusSign....ef.exe
windows7-x64
7VirusSign....ef.exe
windows10-2004-x64
7VirusSign....f3.exe
windows7-x64
3VirusSign....f3.exe
windows10-2004-x64
3VirusSign....d8.exe
windows7-x64
1VirusSign....d8.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral3
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral5
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral11
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral29
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
-
Size
454KB
-
MD5
0399febb08bcbf43227bad19576af767
-
SHA1
459789cf3623cc2913230ca823216500220b8cc0
-
SHA256
b7aaa7af3f1f74a8e568280995303f7b2ec9fb9280dfb222c61e0e90b4f20390
-
SHA512
a05f1ac57f38c70f80119ea80069fd1a2e37c510fa233d5d9f355078268015f986fd7550f8e5318004ac7943688f744bd4ba8e92f0c2ad97d90cc531857c9666
-
SSDEEP
12288:n3C9uDIPh2kkkkK4kXkkkkkkkkl888888888888888888nQYu:ShPh2kkkkK4kXkkkkkkkkS5
Malware Config
Signatures
-
Detect Blackmoon payload 44 IoCs
resource yara_rule behavioral10/memory/4984-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1844-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2356-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/3460-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1864-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4224-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2308-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4484-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4472-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4016-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4812-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/3656-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4204-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1824-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1136-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/3656-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/928-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4252-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1072-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4164-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/3796-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2748-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/3292-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/5116-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4088-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4760-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2088-234-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4352-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/5052-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1488-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4456-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1584-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/3836-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2380-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4808-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2996-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4800-308-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1968-312-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4064-318-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/2140-322-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/396-328-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/4092-347-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/1136-351-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral10/memory/928-357-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1844 3xrrlrr.exe 2356 hhnnnb.exe 3460 hbtttt.exe 1864 ffxxrrl.exe 4484 9frxrxl.exe 2308 tntnnh.exe 4224 rrrfxlf.exe 4472 dvjjd.exe 4016 fxrlfxr.exe 5076 pvvjd.exe 4812 lllxrlf.exe 3656 dvpjd.exe 1252 5rfrffr.exe 4204 pjpjv.exe 1824 dvpjj.exe 1136 bnnbtn.exe 928 ppdpd.exe 4660 htnhbb.exe 4252 lllxlfr.exe 728 rrrlffx.exe 1072 nnbtnt.exe 4844 xxrlxrl.exe 3184 xllxllx.exe 4164 dvjpj.exe 628 nbhttn.exe 3796 lxrfrlx.exe 2748 ffrlfff.exe 3292 hthtnh.exe 5116 bthbhh.exe 4088 xlrxfxf.exe 4760 dvdpp.exe 4600 bbbnhb.exe 2088 lfxlrxl.exe 4352 hbbtbb.exe 4516 frrxxxf.exe 5052 thbnhb.exe 1488 xxflxrf.exe 1852 ddjdv.exe 4456 xlfxrrl.exe 1584 bhhhbb.exe 4824 vjpjd.exe 4308 tbbnht.exe 3836 pjdjv.exe 2380 rrxrffr.exe 4808 nhnhht.exe 2716 djddv.exe 2996 fxfrrll.exe 4800 vvpvp.exe 1968 bhtntn.exe 4064 vdvpj.exe 2140 thbthb.exe 396 5jppv.exe 5040 5xrlxxf.exe 2776 1nnhtn.exe 1556 lfxfrlr.exe 4092 nhbtnh.exe 1136 xlfrlfr.exe 928 frrlffx.exe 4892 pjvpv.exe 3500 xxxlfxr.exe 1804 hthbnh.exe 4408 lfffxxr.exe 1072 7ttnhb.exe 3148 rffrlfx.exe -
resource yara_rule behavioral10/memory/4984-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4984-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1844-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1844-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2356-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2356-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3460-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1864-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4484-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4224-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2308-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4484-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4472-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4472-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4016-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4016-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4812-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3656-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3656-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4204-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1824-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1136-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/928-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4252-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4252-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1072-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4164-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3796-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3796-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2748-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3292-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/5116-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4088-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4088-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4760-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2088-234-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4352-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/5052-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1488-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1852-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4456-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1584-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3836-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2380-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4808-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2716-296-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2996-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2996-302-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4800-308-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1968-312-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4064-318-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2140-322-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/396-328-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/5040-332-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2776-337-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4092-347-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/1136-351-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/928-357-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/4892-361-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3500-366-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/3148-383-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral10/memory/2532-392-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1844 4984 0399febb08bcbf43227bad19576af767.exe 86 PID 4984 wrote to memory of 1844 4984 0399febb08bcbf43227bad19576af767.exe 86 PID 4984 wrote to memory of 1844 4984 0399febb08bcbf43227bad19576af767.exe 86 PID 1844 wrote to memory of 2356 1844 3xrrlrr.exe 87 PID 1844 wrote to memory of 2356 1844 3xrrlrr.exe 87 PID 1844 wrote to memory of 2356 1844 3xrrlrr.exe 87 PID 2356 wrote to memory of 3460 2356 hhnnnb.exe 88 PID 2356 wrote to memory of 3460 2356 hhnnnb.exe 88 PID 2356 wrote to memory of 3460 2356 hhnnnb.exe 88 PID 3460 wrote to memory of 1864 3460 hbtttt.exe 89 PID 3460 wrote to memory of 1864 3460 hbtttt.exe 89 PID 3460 wrote to memory of 1864 3460 hbtttt.exe 89 PID 1864 wrote to memory of 4484 1864 ffxxrrl.exe 90 PID 1864 wrote to memory of 4484 1864 ffxxrrl.exe 90 PID 1864 wrote to memory of 4484 1864 ffxxrrl.exe 90 PID 4484 wrote to memory of 2308 4484 9frxrxl.exe 91 PID 4484 wrote to memory of 2308 4484 9frxrxl.exe 91 PID 4484 wrote to memory of 2308 4484 9frxrxl.exe 91 PID 2308 wrote to memory of 4224 2308 tntnnh.exe 92 PID 2308 wrote to memory of 4224 2308 tntnnh.exe 92 PID 2308 wrote to memory of 4224 2308 tntnnh.exe 92 PID 4224 wrote to memory of 4472 4224 rrrfxlf.exe 93 PID 4224 wrote to memory of 4472 4224 rrrfxlf.exe 93 PID 4224 wrote to memory of 4472 4224 rrrfxlf.exe 93 PID 4472 wrote to memory of 4016 4472 dvjjd.exe 94 PID 4472 wrote to memory of 4016 4472 dvjjd.exe 94 PID 4472 wrote to memory of 4016 4472 dvjjd.exe 94 PID 4016 wrote to memory of 5076 4016 fxrlfxr.exe 95 PID 4016 wrote to memory of 5076 4016 fxrlfxr.exe 95 PID 4016 wrote to memory of 5076 4016 fxrlfxr.exe 95 PID 5076 wrote to memory of 4812 5076 pvvjd.exe 96 PID 5076 wrote to memory of 4812 5076 pvvjd.exe 96 PID 5076 wrote to memory of 4812 5076 pvvjd.exe 96 PID 4812 wrote to memory of 3656 4812 lllxrlf.exe 97 PID 4812 wrote to memory of 3656 4812 lllxrlf.exe 97 PID 4812 wrote to memory of 3656 4812 lllxrlf.exe 97 PID 3656 wrote to memory of 1252 3656 dvpjd.exe 98 PID 3656 wrote to memory of 1252 3656 dvpjd.exe 98 PID 3656 wrote to memory of 1252 3656 dvpjd.exe 98 PID 1252 wrote to memory of 4204 1252 5rfrffr.exe 99 PID 1252 wrote to memory of 4204 1252 5rfrffr.exe 99 PID 1252 wrote to memory of 4204 1252 5rfrffr.exe 99 PID 4204 wrote to memory of 1824 4204 pjpjv.exe 100 PID 4204 wrote to memory of 1824 4204 pjpjv.exe 100 PID 4204 wrote to memory of 1824 4204 pjpjv.exe 100 PID 1824 wrote to memory of 1136 1824 dvpjj.exe 101 PID 1824 wrote to memory of 1136 1824 dvpjj.exe 101 PID 1824 wrote to memory of 1136 1824 dvpjj.exe 101 PID 1136 wrote to memory of 928 1136 bnnbtn.exe 102 PID 1136 wrote to memory of 928 1136 bnnbtn.exe 102 PID 1136 wrote to memory of 928 1136 bnnbtn.exe 102 PID 928 wrote to memory of 4660 928 ppdpd.exe 103 PID 928 wrote to memory of 4660 928 ppdpd.exe 103 PID 928 wrote to memory of 4660 928 ppdpd.exe 103 PID 4660 wrote to memory of 4252 4660 htnhbb.exe 104 PID 4660 wrote to memory of 4252 4660 htnhbb.exe 104 PID 4660 wrote to memory of 4252 4660 htnhbb.exe 104 PID 4252 wrote to memory of 728 4252 lllxlfr.exe 105 PID 4252 wrote to memory of 728 4252 lllxlfr.exe 105 PID 4252 wrote to memory of 728 4252 lllxlfr.exe 105 PID 728 wrote to memory of 1072 728 rrrlffx.exe 106 PID 728 wrote to memory of 1072 728 rrrlffx.exe 106 PID 728 wrote to memory of 1072 728 rrrlffx.exe 106 PID 1072 wrote to memory of 4844 1072 nnbtnt.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\0399febb08bcbf43227bad19576af767.exe"C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\0399febb08bcbf43227bad19576af767.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\3xrrlrr.exec:\3xrrlrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\hhnnnb.exec:\hhnnnb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\hbtttt.exec:\hbtttt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\ffxxrrl.exec:\ffxxrrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\9frxrxl.exec:\9frxrxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
\??\c:\tntnnh.exec:\tntnnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\rrrfxlf.exec:\rrrfxlf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\dvjjd.exec:\dvjjd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\fxrlfxr.exec:\fxrlfxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
\??\c:\pvvjd.exec:\pvvjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\lllxrlf.exec:\lllxrlf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\dvpjd.exec:\dvpjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
\??\c:\5rfrffr.exec:\5rfrffr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\pjpjv.exec:\pjpjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
\??\c:\dvpjj.exec:\dvpjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\bnnbtn.exec:\bnnbtn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\ppdpd.exec:\ppdpd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\htnhbb.exec:\htnhbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\lllxlfr.exec:\lllxlfr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\rrrlffx.exec:\rrrlffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:728 -
\??\c:\nnbtnt.exec:\nnbtnt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\xxrlxrl.exec:\xxrlxrl.exe23⤵
- Executes dropped EXE
PID:4844 -
\??\c:\xllxllx.exec:\xllxllx.exe24⤵
- Executes dropped EXE
PID:3184 -
\??\c:\dvjpj.exec:\dvjpj.exe25⤵
- Executes dropped EXE
PID:4164 -
\??\c:\nbhttn.exec:\nbhttn.exe26⤵
- Executes dropped EXE
PID:628 -
\??\c:\lxrfrlx.exec:\lxrfrlx.exe27⤵
- Executes dropped EXE
PID:3796 -
\??\c:\ffrlfff.exec:\ffrlfff.exe28⤵
- Executes dropped EXE
PID:2748 -
\??\c:\hthtnh.exec:\hthtnh.exe29⤵
- Executes dropped EXE
PID:3292 -
\??\c:\bthbhh.exec:\bthbhh.exe30⤵
- Executes dropped EXE
PID:5116 -
\??\c:\xlrxfxf.exec:\xlrxfxf.exe31⤵
- Executes dropped EXE
PID:4088 -
\??\c:\dvdpp.exec:\dvdpp.exe32⤵
- Executes dropped EXE
PID:4760 -
\??\c:\bbbnhb.exec:\bbbnhb.exe33⤵
- Executes dropped EXE
PID:4600 -
\??\c:\lfxlrxl.exec:\lfxlrxl.exe34⤵
- Executes dropped EXE
PID:2088 -
\??\c:\hbbtbb.exec:\hbbtbb.exe35⤵
- Executes dropped EXE
PID:4352 -
\??\c:\frrxxxf.exec:\frrxxxf.exe36⤵
- Executes dropped EXE
PID:4516 -
\??\c:\thbnhb.exec:\thbnhb.exe37⤵
- Executes dropped EXE
PID:5052 -
\??\c:\xxflxrf.exec:\xxflxrf.exe38⤵
- Executes dropped EXE
PID:1488 -
\??\c:\ddjdv.exec:\ddjdv.exe39⤵
- Executes dropped EXE
PID:1852 -
\??\c:\xlfxrrl.exec:\xlfxrrl.exe40⤵
- Executes dropped EXE
PID:4456 -
\??\c:\bhhhbb.exec:\bhhhbb.exe41⤵
- Executes dropped EXE
PID:1584 -
\??\c:\vjpjd.exec:\vjpjd.exe42⤵
- Executes dropped EXE
PID:4824 -
\??\c:\tbbnht.exec:\tbbnht.exe43⤵
- Executes dropped EXE
PID:4308 -
\??\c:\pjdjv.exec:\pjdjv.exe44⤵
- Executes dropped EXE
PID:3836 -
\??\c:\rrxrffr.exec:\rrxrffr.exe45⤵
- Executes dropped EXE
PID:2380 -
\??\c:\nhnhht.exec:\nhnhht.exe46⤵
- Executes dropped EXE
PID:4808 -
\??\c:\djddv.exec:\djddv.exe47⤵
- Executes dropped EXE
PID:2716 -
\??\c:\fxfrrll.exec:\fxfrrll.exe48⤵
- Executes dropped EXE
PID:2996 -
\??\c:\vvpvp.exec:\vvpvp.exe49⤵
- Executes dropped EXE
PID:4800 -
\??\c:\bhtntn.exec:\bhtntn.exe50⤵
- Executes dropped EXE
PID:1968 -
\??\c:\vdvpj.exec:\vdvpj.exe51⤵
- Executes dropped EXE
PID:4064 -
\??\c:\thbthb.exec:\thbthb.exe52⤵
- Executes dropped EXE
PID:2140 -
\??\c:\5jppv.exec:\5jppv.exe53⤵
- Executes dropped EXE
PID:396 -
\??\c:\5xrlxxf.exec:\5xrlxxf.exe54⤵
- Executes dropped EXE
PID:5040 -
\??\c:\1nnhtn.exec:\1nnhtn.exe55⤵
- Executes dropped EXE
PID:2776 -
\??\c:\lfxfrlr.exec:\lfxfrlr.exe56⤵
- Executes dropped EXE
PID:1556 -
\??\c:\nhbtnh.exec:\nhbtnh.exe57⤵
- Executes dropped EXE
PID:4092 -
\??\c:\xlfrlfr.exec:\xlfrlfr.exe58⤵
- Executes dropped EXE
PID:1136 -
\??\c:\frrlffx.exec:\frrlffx.exe59⤵
- Executes dropped EXE
PID:928 -
\??\c:\pjvpv.exec:\pjvpv.exe60⤵
- Executes dropped EXE
PID:4892 -
\??\c:\xxxlfxr.exec:\xxxlfxr.exe61⤵
- Executes dropped EXE
PID:3500 -
\??\c:\hthbnh.exec:\hthbnh.exe62⤵
- Executes dropped EXE
PID:1804 -
\??\c:\lfffxxr.exec:\lfffxxr.exe63⤵
- Executes dropped EXE
PID:4408 -
\??\c:\7ttnhb.exec:\7ttnhb.exe64⤵
- Executes dropped EXE
PID:1072 -
\??\c:\rffrlfx.exec:\rffrlfx.exe65⤵
- Executes dropped EXE
PID:3148 -
\??\c:\nbthbn.exec:\nbthbn.exe66⤵PID:4536
-
\??\c:\vvvdj.exec:\vvvdj.exe67⤵PID:2532
-
\??\c:\tntnbh.exec:\tntnbh.exe68⤵PID:4164
-
\??\c:\5xxlrrr.exec:\5xxlrrr.exe69⤵PID:4784
-
\??\c:\nnbttn.exec:\nnbttn.exe70⤵PID:2844
-
\??\c:\jddpp.exec:\jddpp.exe71⤵PID:1840
-
\??\c:\lxfxfxl.exec:\lxfxfxl.exe72⤵PID:4388
-
\??\c:\tbhtnh.exec:\tbhtnh.exe73⤵PID:3292
-
\??\c:\frxxfff.exec:\frxxfff.exe74⤵PID:5116
-
\??\c:\vjjdv.exec:\vjjdv.exe75⤵PID:1600
-
\??\c:\9xxlxrf.exec:\9xxlxrf.exe76⤵PID:548
-
\??\c:\9pdvj.exec:\9pdvj.exe77⤵PID:2360
-
\??\c:\fxxrllf.exec:\fxxrllf.exe78⤵PID:1028
-
\??\c:\jdpjd.exec:\jdpjd.exe79⤵PID:4880
-
\??\c:\fffrlll.exec:\fffrlll.exe80⤵PID:4984
-
\??\c:\tnbntn.exec:\tnbntn.exe81⤵PID:2800
-
\??\c:\lfrlfrf.exec:\lfrlfrf.exe82⤵PID:3128
-
\??\c:\bhnnnn.exec:\bhnnnn.exe83⤵PID:5020
-
\??\c:\llrfxrf.exec:\llrfxrf.exe84⤵PID:2684
-
\??\c:\7nhbtn.exec:\7nhbtn.exe85⤵PID:3460
-
\??\c:\1vvjv.exec:\1vvjv.exe86⤵PID:3668
-
\??\c:\3nthtn.exec:\3nthtn.exe87⤵PID:1584
-
\??\c:\vjjpd.exec:\vjjpd.exe88⤵PID:2932
-
\??\c:\ntthth.exec:\ntthth.exe89⤵PID:3476
-
\??\c:\pvjjj.exec:\pvjjj.exe90⤵PID:1884
-
\??\c:\bbnbnh.exec:\bbnbnh.exe91⤵PID:4012
-
\??\c:\pjdpj.exec:\pjdpj.exe92⤵PID:4472
-
\??\c:\9btnhb.exec:\9btnhb.exe93⤵PID:1376
-
\??\c:\ddjpd.exec:\ddjpd.exe94⤵PID:2772
-
\??\c:\3nnbtn.exec:\3nnbtn.exe95⤵PID:4956
-
\??\c:\1pjvp.exec:\1pjvp.exe96⤵PID:4904
-
\??\c:\5ntttb.exec:\5ntttb.exe97⤵PID:664
-
\??\c:\jvvjd.exec:\jvvjd.exe98⤵PID:2980
-
\??\c:\1nnbtt.exec:\1nnbtt.exe99⤵PID:2720
-
\??\c:\9vjdp.exec:\9vjdp.exe100⤵PID:1684
-
\??\c:\fflxlfx.exec:\fflxlfx.exe101⤵PID:1140
-
\??\c:\5jpjj.exec:\5jpjj.exe102⤵PID:2776
-
\??\c:\rlrxlfl.exec:\rlrxlfl.exe103⤵PID:1556
-
\??\c:\vpjdv.exec:\vpjdv.exe104⤵PID:4028
-
\??\c:\9ffxrlf.exec:\9ffxrlf.exe105⤵PID:1136
-
\??\c:\7vpdp.exec:\7vpdp.exe106⤵PID:928
-
\??\c:\lrxrlxr.exec:\lrxrlxr.exe107⤵PID:3488
-
\??\c:\vvvvp.exec:\vvvvp.exe108⤵PID:2852
-
\??\c:\5llxlrf.exec:\5llxlrf.exe109⤵PID:728
-
\??\c:\pvddv.exec:\pvddv.exe110⤵PID:5072
-
\??\c:\xflfxxr.exec:\xflfxxr.exe111⤵PID:1948
-
\??\c:\bhbbtt.exec:\bhbbtt.exe112⤵PID:956
-
\??\c:\5xfxlll.exec:\5xfxlll.exe113⤵PID:972
-
\??\c:\1bbtnh.exec:\1bbtnh.exe114⤵PID:2820
-
\??\c:\5rfrlfr.exec:\5rfrlfr.exe115⤵PID:2692
-
\??\c:\9hhbbt.exec:\9hhbbt.exe116⤵PID:4384
-
\??\c:\djdvp.exec:\djdvp.exe117⤵PID:4900
-
\??\c:\xrrfrlx.exec:\xrrfrlx.exe118⤵PID:2992
-
\??\c:\ppvpp.exec:\ppvpp.exe119⤵PID:1484
-
\??\c:\rrlffll.exec:\rrlffll.exe120⤵PID:4216
-
\??\c:\9nhhtn.exec:\9nhhtn.exe121⤵PID:3960
-
\??\c:\1lfxllf.exec:\1lfxllf.exe122⤵PID:1532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-