Analysis
-
max time kernel
58s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 19:56
Behavioral task
behavioral1
Sample
1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe
-
Size
81KB
-
MD5
9955aecf57d405d0ae85452145b769fe
-
SHA1
9bb93e535c8de60b61b0dbbad197cfc3fb8ebfb1
-
SHA256
1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47
-
SHA512
d15380045c6e785538a805d8d1c13ef880480598d618d47edcd4df46143352f0918a5d426e642e6a280d57e0018aed30ff7bc4d1b7b05becca5c3f6f318b917f
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8yaVskCzYBbKd+XsWgADUOjgRpnzQX:9hOmTsF93UYfwC6GIoutyaVszyKd+XY8
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2312-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3612-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3048-14-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4208-22-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4996-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4876-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2284-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3308-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1492-53-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4756-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3568-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2644-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3984-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4860-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1560-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2984-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3916-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1688-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4932-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1244-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5056-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4408-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3660-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1516-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4812-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4844-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1356-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1760-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4208-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/224-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1972-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1708-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5020-240-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5096-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1216-247-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/392-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-282-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5108-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2984-305-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3316-319-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4932-324-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1052-345-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4784-365-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4736-372-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2484-377-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2428-383-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4208-390-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4568-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1220-412-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1156-425-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2480-427-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2644-450-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4820-464-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2740-474-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2556-518-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/944-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3048-536-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3580-540-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3648-557-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4752-621-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4336-655-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3580-672-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/456-688-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2636-1142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3048 vjjpd.exe 3612 frflrxf.exe 4208 pdpjp.exe 4996 xxlflrl.exe 4876 nhhtnb.exe 2284 bnnttt.exe 3308 jpdjj.exe 1492 jvpvv.exe 4896 dpdjd.exe 3936 bbthnt.exe 4756 xxxrlfr.exe 4488 3rllffx.exe 3568 3nntbn.exe 3984 fflxxrl.exe 2644 ddjjd.exe 4860 lxxxxxr.exe 1920 ppvpv.exe 4472 ffflrfr.exe 1560 pvvjj.exe 2984 ttbnbh.exe 4504 lllrxrf.exe 3916 lrlxffr.exe 2000 pjppj.exe 1688 dpdvv.exe 4932 dpppp.exe 1244 rxfrrrx.exe 5056 btbnnb.exe 4048 jjdvv.exe 2964 bntbbh.exe 4408 tbbttt.exe 3660 tbnhbb.exe 1516 hnnbbh.exe 4812 9httht.exe 4844 jvvpd.exe 4448 ntbhhh.exe 1356 xfrxlfl.exe 1760 vddvp.exe 1696 dvpjv.exe 3580 tntttb.exe 3972 frrlrxx.exe 5080 rrrxrfr.exe 4208 bnnhtt.exe 224 frrxxfl.exe 1972 jdppp.exe 3616 thntbb.exe 1708 thnnhh.exe 5020 rxxrllx.exe 5096 bhtbnh.exe 1216 nbnbhn.exe 3968 ntnnbh.exe 2708 frfxfrf.exe 3636 bbhbbt.exe 2116 vjvpd.exe 2236 bhnbbb.exe 2876 rflrrxf.exe 1844 vpjdj.exe 1128 1bbbnn.exe 772 xflfffr.exe 392 tnthtb.exe 5116 lrxflfl.exe 1660 djvpp.exe 3800 frlrrll.exe 1528 llxrrrl.exe 5108 ddddv.exe -
resource yara_rule behavioral2/memory/2312-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000900000002345b-4.dat upx behavioral2/memory/2312-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00090000000234ae-10.dat upx behavioral2/memory/3612-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3048-14-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234b5-11.dat upx behavioral2/files/0x00090000000234b2-21.dat upx behavioral2/memory/4208-22-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4876-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234b6-29.dat upx behavioral2/memory/4996-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234b8-33.dat upx behavioral2/memory/4876-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234b9-39.dat upx behavioral2/memory/2284-42-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234ba-45.dat upx behavioral2/memory/3308-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234bb-51.dat upx behavioral2/memory/1492-53-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234bc-58.dat upx behavioral2/files/0x00070000000234bd-62.dat upx behavioral2/files/0x00070000000234be-68.dat upx behavioral2/memory/4756-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234bf-73.dat upx behavioral2/files/0x00070000000234c0-81.dat upx behavioral2/memory/3568-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234c1-83.dat upx behavioral2/files/0x00070000000234c2-93.dat upx behavioral2/memory/4860-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2644-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3984-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234c3-98.dat upx behavioral2/memory/4860-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234c4-103.dat upx behavioral2/files/0x00070000000234c5-108.dat upx behavioral2/files/0x00070000000234c6-114.dat upx behavioral2/memory/1560-116-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2984-115-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234c7-119.dat upx behavioral2/memory/2984-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234c8-124.dat upx behavioral2/files/0x00070000000234c9-129.dat upx behavioral2/memory/3916-131-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234ca-135.dat upx behavioral2/files/0x00070000000234cb-140.dat upx behavioral2/memory/1688-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234cd-146.dat upx behavioral2/memory/4932-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234ce-153.dat upx behavioral2/memory/1244-154-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234cf-158.dat upx behavioral2/memory/5056-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234d0-163.dat upx behavioral2/files/0x0002000000022aa7-168.dat upx behavioral2/files/0x00070000000234d1-175.dat upx behavioral2/memory/4408-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3660-178-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00070000000234d2-180.dat upx behavioral2/memory/1516-183-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4812-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4844-194-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1356-201-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1760-203-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlllxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rxrlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxlxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfflxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlffxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5djjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrlrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbntbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxflrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfflrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lfrxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfxrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7djvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpppd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 3048 2312 1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe 86 PID 2312 wrote to memory of 3048 2312 1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe 86 PID 2312 wrote to memory of 3048 2312 1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe 86 PID 3048 wrote to memory of 3612 3048 vjjpd.exe 87 PID 3048 wrote to memory of 3612 3048 vjjpd.exe 87 PID 3048 wrote to memory of 3612 3048 vjjpd.exe 87 PID 3612 wrote to memory of 4208 3612 frflrxf.exe 88 PID 3612 wrote to memory of 4208 3612 frflrxf.exe 88 PID 3612 wrote to memory of 4208 3612 frflrxf.exe 88 PID 4208 wrote to memory of 4996 4208 pdpjp.exe 90 PID 4208 wrote to memory of 4996 4208 pdpjp.exe 90 PID 4208 wrote to memory of 4996 4208 pdpjp.exe 90 PID 4996 wrote to memory of 4876 4996 xxlflrl.exe 91 PID 4996 wrote to memory of 4876 4996 xxlflrl.exe 91 PID 4996 wrote to memory of 4876 4996 xxlflrl.exe 91 PID 4876 wrote to memory of 2284 4876 nhhtnb.exe 92 PID 4876 wrote to memory of 2284 4876 nhhtnb.exe 92 PID 4876 wrote to memory of 2284 4876 nhhtnb.exe 92 PID 2284 wrote to memory of 3308 2284 bnnttt.exe 93 PID 2284 wrote to memory of 3308 2284 bnnttt.exe 93 PID 2284 wrote to memory of 3308 2284 bnnttt.exe 93 PID 3308 wrote to memory of 1492 3308 jpdjj.exe 94 PID 3308 wrote to memory of 1492 3308 jpdjj.exe 94 PID 3308 wrote to memory of 1492 3308 jpdjj.exe 94 PID 1492 wrote to memory of 4896 1492 jvpvv.exe 95 PID 1492 wrote to memory of 4896 1492 jvpvv.exe 95 PID 1492 wrote to memory of 4896 1492 jvpvv.exe 95 PID 4896 wrote to memory of 3936 4896 dpdjd.exe 96 PID 4896 wrote to memory of 3936 4896 dpdjd.exe 96 PID 4896 wrote to memory of 3936 4896 dpdjd.exe 96 PID 3936 wrote to memory of 4756 3936 bbthnt.exe 97 PID 3936 wrote to memory of 4756 3936 bbthnt.exe 97 PID 3936 wrote to memory of 4756 3936 bbthnt.exe 97 PID 4756 wrote to memory of 4488 4756 xxxrlfr.exe 98 PID 4756 wrote to memory of 4488 4756 xxxrlfr.exe 98 PID 4756 wrote to memory of 4488 4756 xxxrlfr.exe 98 PID 4488 wrote to memory of 3568 4488 3rllffx.exe 99 PID 4488 wrote to memory of 3568 4488 3rllffx.exe 99 PID 4488 wrote to memory of 3568 4488 3rllffx.exe 99 PID 3568 wrote to memory of 3984 3568 3nntbn.exe 100 PID 3568 wrote to memory of 3984 3568 3nntbn.exe 100 PID 3568 wrote to memory of 3984 3568 3nntbn.exe 100 PID 3984 wrote to memory of 2644 3984 fflxxrl.exe 101 PID 3984 wrote to memory of 2644 3984 fflxxrl.exe 101 PID 3984 wrote to memory of 2644 3984 fflxxrl.exe 101 PID 2644 wrote to memory of 4860 2644 ddjjd.exe 102 PID 2644 wrote to memory of 4860 2644 ddjjd.exe 102 PID 2644 wrote to memory of 4860 2644 ddjjd.exe 102 PID 4860 wrote to memory of 1920 4860 lxxxxxr.exe 103 PID 4860 wrote to memory of 1920 4860 lxxxxxr.exe 103 PID 4860 wrote to memory of 1920 4860 lxxxxxr.exe 103 PID 1920 wrote to memory of 4472 1920 ppvpv.exe 104 PID 1920 wrote to memory of 4472 1920 ppvpv.exe 104 PID 1920 wrote to memory of 4472 1920 ppvpv.exe 104 PID 4472 wrote to memory of 1560 4472 ffflrfr.exe 199 PID 4472 wrote to memory of 1560 4472 ffflrfr.exe 199 PID 4472 wrote to memory of 1560 4472 ffflrfr.exe 199 PID 1560 wrote to memory of 2984 1560 pvvjj.exe 152 PID 1560 wrote to memory of 2984 1560 pvvjj.exe 152 PID 1560 wrote to memory of 2984 1560 pvvjj.exe 152 PID 2984 wrote to memory of 4504 2984 ttbnbh.exe 107 PID 2984 wrote to memory of 4504 2984 ttbnbh.exe 107 PID 2984 wrote to memory of 4504 2984 ttbnbh.exe 107 PID 4504 wrote to memory of 3916 4504 lllrxrf.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe"C:\Users\Admin\AppData\Local\Temp\1fc543a4b6aa653c7f29a5ce554e69c3f2cce38a866dbf6be3201f12f4919a47.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\vjjpd.exec:\vjjpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\frflrxf.exec:\frflrxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\pdpjp.exec:\pdpjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\xxlflrl.exec:\xxlflrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\nhhtnb.exec:\nhhtnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\bnnttt.exec:\bnnttt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\jpdjj.exec:\jpdjj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
\??\c:\jvpvv.exec:\jvpvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
\??\c:\dpdjd.exec:\dpdjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\bbthnt.exec:\bbthnt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\xxxrlfr.exec:\xxxrlfr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\3rllffx.exec:\3rllffx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\3nntbn.exec:\3nntbn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\fflxxrl.exec:\fflxxrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
\??\c:\ddjjd.exec:\ddjjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\lxxxxxr.exec:\lxxxxxr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\ppvpv.exec:\ppvpv.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\ffflrfr.exec:\ffflrfr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\pvvjj.exec:\pvvjj.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\ttbnbh.exec:\ttbnbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\lllrxrf.exec:\lllrxrf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\lrlxffr.exec:\lrlxffr.exe23⤵
- Executes dropped EXE
PID:3916 -
\??\c:\pjppj.exec:\pjppj.exe24⤵
- Executes dropped EXE
PID:2000 -
\??\c:\dpdvv.exec:\dpdvv.exe25⤵
- Executes dropped EXE
PID:1688 -
\??\c:\dpppp.exec:\dpppp.exe26⤵
- Executes dropped EXE
PID:4932 -
\??\c:\rxfrrrx.exec:\rxfrrrx.exe27⤵
- Executes dropped EXE
PID:1244 -
\??\c:\btbnnb.exec:\btbnnb.exe28⤵
- Executes dropped EXE
PID:5056 -
\??\c:\jjdvv.exec:\jjdvv.exe29⤵
- Executes dropped EXE
PID:4048 -
\??\c:\bntbbh.exec:\bntbbh.exe30⤵
- Executes dropped EXE
PID:2964 -
\??\c:\tbbttt.exec:\tbbttt.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408 -
\??\c:\tbnhbb.exec:\tbnhbb.exe32⤵
- Executes dropped EXE
PID:3660 -
\??\c:\hnnbbh.exec:\hnnbbh.exe33⤵
- Executes dropped EXE
PID:1516 -
\??\c:\9httht.exec:\9httht.exe34⤵
- Executes dropped EXE
PID:4812 -
\??\c:\jvvpd.exec:\jvvpd.exe35⤵
- Executes dropped EXE
PID:4844 -
\??\c:\ntbhhh.exec:\ntbhhh.exe36⤵
- Executes dropped EXE
PID:4448 -
\??\c:\xfrxlfl.exec:\xfrxlfl.exe37⤵
- Executes dropped EXE
PID:1356 -
\??\c:\vddvp.exec:\vddvp.exe38⤵
- Executes dropped EXE
PID:1760 -
\??\c:\dvpjv.exec:\dvpjv.exe39⤵
- Executes dropped EXE
PID:1696 -
\??\c:\tntttb.exec:\tntttb.exe40⤵
- Executes dropped EXE
PID:3580 -
\??\c:\frrlrxx.exec:\frrlrxx.exe41⤵
- Executes dropped EXE
PID:3972 -
\??\c:\rrrxrfr.exec:\rrrxrfr.exe42⤵
- Executes dropped EXE
PID:5080 -
\??\c:\bnnhtt.exec:\bnnhtt.exe43⤵
- Executes dropped EXE
PID:4208 -
\??\c:\frrxxfl.exec:\frrxxfl.exe44⤵
- Executes dropped EXE
PID:224 -
\??\c:\jdppp.exec:\jdppp.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972 -
\??\c:\thntbb.exec:\thntbb.exe46⤵
- Executes dropped EXE
PID:3616 -
\??\c:\thnnhh.exec:\thnnhh.exe47⤵
- Executes dropped EXE
PID:1708 -
\??\c:\rxxrllx.exec:\rxxrllx.exe48⤵
- Executes dropped EXE
PID:5020 -
\??\c:\bhtbnh.exec:\bhtbnh.exe49⤵
- Executes dropped EXE
PID:5096 -
\??\c:\nbnbhn.exec:\nbnbhn.exe50⤵
- Executes dropped EXE
PID:1216 -
\??\c:\ntnnbh.exec:\ntnnbh.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968 -
\??\c:\frfxfrf.exec:\frfxfrf.exe52⤵
- Executes dropped EXE
PID:2708 -
\??\c:\bbhbbt.exec:\bbhbbt.exe53⤵
- Executes dropped EXE
PID:3636 -
\??\c:\vjvpd.exec:\vjvpd.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
\??\c:\bhnbbb.exec:\bhnbbb.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236 -
\??\c:\rflrrxf.exec:\rflrrxf.exe56⤵
- Executes dropped EXE
PID:2876 -
\??\c:\vpjdj.exec:\vpjdj.exe57⤵
- Executes dropped EXE
PID:1844 -
\??\c:\1bbbnn.exec:\1bbbnn.exe58⤵
- Executes dropped EXE
PID:1128 -
\??\c:\xflfffr.exec:\xflfffr.exe59⤵
- Executes dropped EXE
PID:772 -
\??\c:\tnthtb.exec:\tnthtb.exe60⤵
- Executes dropped EXE
PID:392 -
\??\c:\lrxflfl.exec:\lrxflfl.exe61⤵
- Executes dropped EXE
PID:5116 -
\??\c:\djvpp.exec:\djvpp.exe62⤵
- Executes dropped EXE
PID:1660 -
\??\c:\frlrrll.exec:\frlrrll.exe63⤵
- Executes dropped EXE
PID:3800 -
\??\c:\llxrrrl.exec:\llxrrrl.exe64⤵
- Executes dropped EXE
PID:1528 -
\??\c:\ddddv.exec:\ddddv.exe65⤵
- Executes dropped EXE
PID:5108 -
\??\c:\xllrxrx.exec:\xllrxrx.exe66⤵PID:3484
-
\??\c:\rfrxfrl.exec:\rfrxfrl.exe67⤵PID:2984
-
\??\c:\xlfxrrf.exec:\xlfxrrf.exe68⤵
- System Location Discovery: System Language Discovery
PID:2300 -
\??\c:\pjjvd.exec:\pjjvd.exe69⤵PID:3356
-
\??\c:\ttthhb.exec:\ttthhb.exe70⤵PID:4956
-
\??\c:\pdvjd.exec:\pdvjd.exe71⤵PID:5100
-
\??\c:\ppjpv.exec:\ppjpv.exe72⤵PID:3316
-
\??\c:\htbnbn.exec:\htbnbn.exe73⤵
- System Location Discovery: System Language Discovery
PID:4932 -
\??\c:\rfxrrrl.exec:\rfxrrrl.exe74⤵PID:2120
-
\??\c:\jddvd.exec:\jddvd.exe75⤵PID:4368
-
\??\c:\vppvv.exec:\vppvv.exe76⤵PID:2580
-
\??\c:\7tthhh.exec:\7tthhh.exe77⤵PID:4048
-
\??\c:\lxxxlfr.exec:\lxxxlfr.exe78⤵PID:4352
-
\??\c:\jdjjj.exec:\jdjjj.exe79⤵PID:1052
-
\??\c:\hntnhh.exec:\hntnhh.exe80⤵PID:400
-
\??\c:\vpdjv.exec:\vpdjv.exe81⤵PID:4908
-
\??\c:\7djdj.exec:\7djdj.exe82⤵PID:4452
-
\??\c:\5rrrxxx.exec:\5rrrxxx.exe83⤵PID:2568
-
\??\c:\pppjj.exec:\pppjj.exe84⤵PID:4328
-
\??\c:\nttnhn.exec:\nttnhn.exe85⤵PID:524
-
\??\c:\7frfxfl.exec:\7frfxfl.exe86⤵PID:4784
-
\??\c:\nnthhn.exec:\nnthhn.exe87⤵PID:4736
-
\??\c:\rrxrrlr.exec:\rrxrrlr.exe88⤵PID:2484
-
\??\c:\nhtnbb.exec:\nhtnbb.exe89⤵PID:832
-
\??\c:\jvjpv.exec:\jvjpv.exe90⤵
- System Location Discovery: System Language Discovery
PID:2428 -
\??\c:\ttnbhh.exec:\ttnbhh.exe91⤵PID:3964
-
\??\c:\rfrrxff.exec:\rfrrxff.exe92⤵PID:4208
-
\??\c:\pppdp.exec:\pppdp.exe93⤵PID:4568
-
\??\c:\jjjpj.exec:\jjjpj.exe94⤵PID:2872
-
\??\c:\bhnntn.exec:\bhnntn.exe95⤵PID:4940
-
\??\c:\nntnhn.exec:\nntnhn.exe96⤵PID:3424
-
\??\c:\ddvdj.exec:\ddvdj.exe97⤵PID:4552
-
\??\c:\btnhht.exec:\btnhht.exe98⤵PID:1220
-
\??\c:\lrxxffr.exec:\lrxxffr.exe99⤵PID:456
-
\??\c:\nntbbn.exec:\nntbbn.exe100⤵PID:2820
-
\??\c:\jjvvd.exec:\jjvvd.exe101⤵
- System Location Discovery: System Language Discovery
PID:3952 -
\??\c:\1xfxflr.exec:\1xfxflr.exe102⤵PID:1156
-
\??\c:\dvjpp.exec:\dvjpp.exe103⤵PID:2480
-
\??\c:\lllffxr.exec:\lllffxr.exe104⤵PID:3460
-
\??\c:\vjvpd.exec:\vjvpd.exe105⤵
- System Location Discovery: System Language Discovery
PID:4728 -
\??\c:\dddjv.exec:\dddjv.exe106⤵
- System Location Discovery: System Language Discovery
PID:4540 -
\??\c:\ntnhtb.exec:\ntnhtb.exe107⤵PID:884
-
\??\c:\pjjjp.exec:\pjjjp.exe108⤵
- System Location Discovery: System Language Discovery
PID:4244 -
\??\c:\fflrfrr.exec:\fflrfrr.exe109⤵PID:2644
-
\??\c:\dddpd.exec:\dddpd.exe110⤵PID:3268
-
\??\c:\hbthht.exec:\hbthht.exe111⤵PID:4860
-
\??\c:\hnbtnb.exec:\hnbtnb.exe112⤵PID:1836
-
\??\c:\7dvdj.exec:\7dvdj.exe113⤵PID:4820
-
\??\c:\tthhbt.exec:\tthhbt.exe114⤵PID:1560
-
\??\c:\rfrfxlf.exec:\rfrfxlf.exe115⤵PID:4496
-
\??\c:\jvjvj.exec:\jvjvj.exe116⤵PID:1668
-
\??\c:\htttbh.exec:\htttbh.exe117⤵PID:2740
-
\??\c:\5jjpj.exec:\5jjpj.exe118⤵PID:2564
-
\??\c:\5jddp.exec:\5jddp.exe119⤵PID:1688
-
\??\c:\lxlllxr.exec:\lxlllxr.exe120⤵PID:5040
-
\??\c:\ppddp.exec:\ppddp.exe121⤵
- System Location Discovery: System Language Discovery
PID:760 -
\??\c:\xlxxrfr.exec:\xlxxrfr.exe122⤵PID:3744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-