Analysis
-
max time kernel
150s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 00:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
150 seconds
General
-
Target
03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe
-
Size
103KB
-
MD5
03bd58e83831d9d25b02177e0fcc383e
-
SHA1
ba027fc61ab677572d20b028a3d99e0b68763a98
-
SHA256
50fd2f67f428bccf1370a93aace3afb670c216ef37c39de09e630947902c974b
-
SHA512
020012df443f96caa3e11819c8b73c866a4d1f7a2a8ca9183db485566f320d684375df2d2d885ab3f62f4da6a215dff72e81d98c2fc5933eeb63abdb639395a6
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2lmf6g7xifKhLdEH:ymb3NkkiQ3mdBjF+3TU20LifKhLY
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/4860-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4564-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3672-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4132-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1288-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2580-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3440-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4548-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4996-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3324-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3584-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3208-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/912-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4596-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3824-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1784-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3444-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2424-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3428-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/740-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4612 lxxxrrr.exe 4796 nnhtbh.exe 4564 xrlxxxx.exe 4120 tbttbn.exe 3672 ttnbtb.exe 2980 3pvpp.exe 4132 hhnhnn.exe 1288 jvddd.exe 4412 rrxrrrr.exe 4884 thbnth.exe 4548 dvvvd.exe 3764 lxxfxfx.exe 3440 btttnb.exe 2580 ttbnhn.exe 4996 pvppp.exe 2084 1fxllll.exe 3324 httnnh.exe 3584 jdppj.exe 4664 fxflllr.exe 3208 flfllll.exe 912 ttbbnn.exe 4596 xxrrrxx.exe 864 hhhntt.exe 3824 vppjd.exe 1784 rfrrxff.exe 3444 lllllll.exe 2424 jpdjj.exe 3428 lrfffll.exe 4356 ntnhtb.exe 740 vddpj.exe 4084 xlxxxfl.exe 3424 lxxrffx.exe 4804 ntbtnh.exe 2716 vvpdv.exe 2488 ddppv.exe 1640 lrfrlxl.exe 1248 7thhnt.exe 2196 9pddp.exe 3960 3djdv.exe 2800 xxflllf.exe 2176 hnnhhh.exe 4836 hhbbbb.exe 3672 pvjdj.exe 4532 rfffrrx.exe 3012 flxrffr.exe 3128 nnbnbh.exe 4068 vppjj.exe 1288 pvddv.exe 3024 frxxrrx.exe 2660 bnbnnt.exe 4884 dppdd.exe 3332 ppvvp.exe 3124 rffxxxx.exe 4260 tnnhhn.exe 948 nhnnnt.exe 4996 lfllffl.exe 5068 flxxxlx.exe 2540 tnhhbb.exe 3584 vpddp.exe 1820 pjvpd.exe 868 xllrlrr.exe 3052 bnbhbb.exe 2420 tntnhh.exe 2276 pdvvp.exe -
resource yara_rule behavioral2/memory/4860-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4564-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3672-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4132-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4132-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4132-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1288-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2580-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3440-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4996-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3324-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3584-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3208-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/912-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4596-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3824-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1784-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3444-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2424-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3428-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/740-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrflxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxflllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxfxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7httbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvvj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4612 4860 03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe 85 PID 4860 wrote to memory of 4612 4860 03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe 85 PID 4860 wrote to memory of 4612 4860 03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe 85 PID 4612 wrote to memory of 4796 4612 lxxxrrr.exe 86 PID 4612 wrote to memory of 4796 4612 lxxxrrr.exe 86 PID 4612 wrote to memory of 4796 4612 lxxxrrr.exe 86 PID 4796 wrote to memory of 4564 4796 nnhtbh.exe 87 PID 4796 wrote to memory of 4564 4796 nnhtbh.exe 87 PID 4796 wrote to memory of 4564 4796 nnhtbh.exe 87 PID 4564 wrote to memory of 4120 4564 xrlxxxx.exe 89 PID 4564 wrote to memory of 4120 4564 xrlxxxx.exe 89 PID 4564 wrote to memory of 4120 4564 xrlxxxx.exe 89 PID 4120 wrote to memory of 3672 4120 tbttbn.exe 90 PID 4120 wrote to memory of 3672 4120 tbttbn.exe 90 PID 4120 wrote to memory of 3672 4120 tbttbn.exe 90 PID 3672 wrote to memory of 2980 3672 ttnbtb.exe 91 PID 3672 wrote to memory of 2980 3672 ttnbtb.exe 91 PID 3672 wrote to memory of 2980 3672 ttnbtb.exe 91 PID 2980 wrote to memory of 4132 2980 3pvpp.exe 92 PID 2980 wrote to memory of 4132 2980 3pvpp.exe 92 PID 2980 wrote to memory of 4132 2980 3pvpp.exe 92 PID 4132 wrote to memory of 1288 4132 hhnhnn.exe 93 PID 4132 wrote to memory of 1288 4132 hhnhnn.exe 93 PID 4132 wrote to memory of 1288 4132 hhnhnn.exe 93 PID 1288 wrote to memory of 4412 1288 jvddd.exe 94 PID 1288 wrote to memory of 4412 1288 jvddd.exe 94 PID 1288 wrote to memory of 4412 1288 jvddd.exe 94 PID 4412 wrote to memory of 4884 4412 rrxrrrr.exe 95 PID 4412 wrote to memory of 4884 4412 rrxrrrr.exe 95 PID 4412 wrote to memory of 4884 4412 rrxrrrr.exe 95 PID 4884 wrote to memory of 4548 4884 thbnth.exe 96 PID 4884 wrote to memory of 4548 4884 thbnth.exe 96 PID 4884 wrote to memory of 4548 4884 thbnth.exe 96 PID 4548 wrote to memory of 3764 4548 dvvvd.exe 97 PID 4548 wrote to memory of 3764 4548 dvvvd.exe 97 PID 4548 wrote to memory of 3764 4548 dvvvd.exe 97 PID 3764 wrote to memory of 3440 3764 lxxfxfx.exe 98 PID 3764 wrote to memory of 3440 3764 lxxfxfx.exe 98 PID 3764 wrote to memory of 3440 3764 lxxfxfx.exe 98 PID 3440 wrote to memory of 2580 3440 btttnb.exe 100 PID 3440 wrote to memory of 2580 3440 btttnb.exe 100 PID 3440 wrote to memory of 2580 3440 btttnb.exe 100 PID 2580 wrote to memory of 4996 2580 ttbnhn.exe 101 PID 2580 wrote to memory of 4996 2580 ttbnhn.exe 101 PID 2580 wrote to memory of 4996 2580 ttbnhn.exe 101 PID 4996 wrote to memory of 2084 4996 pvppp.exe 102 PID 4996 wrote to memory of 2084 4996 pvppp.exe 102 PID 4996 wrote to memory of 2084 4996 pvppp.exe 102 PID 2084 wrote to memory of 3324 2084 1fxllll.exe 103 PID 2084 wrote to memory of 3324 2084 1fxllll.exe 103 PID 2084 wrote to memory of 3324 2084 1fxllll.exe 103 PID 3324 wrote to memory of 3584 3324 httnnh.exe 104 PID 3324 wrote to memory of 3584 3324 httnnh.exe 104 PID 3324 wrote to memory of 3584 3324 httnnh.exe 104 PID 3584 wrote to memory of 4664 3584 jdppj.exe 105 PID 3584 wrote to memory of 4664 3584 jdppj.exe 105 PID 3584 wrote to memory of 4664 3584 jdppj.exe 105 PID 4664 wrote to memory of 3208 4664 fxflllr.exe 106 PID 4664 wrote to memory of 3208 4664 fxflllr.exe 106 PID 4664 wrote to memory of 3208 4664 fxflllr.exe 106 PID 3208 wrote to memory of 912 3208 flfllll.exe 108 PID 3208 wrote to memory of 912 3208 flfllll.exe 108 PID 3208 wrote to memory of 912 3208 flfllll.exe 108 PID 912 wrote to memory of 4596 912 ttbbnn.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03bd58e83831d9d25b02177e0fcc383e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\lxxxrrr.exec:\lxxxrrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\nnhtbh.exec:\nnhtbh.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\xrlxxxx.exec:\xrlxxxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\tbttbn.exec:\tbttbn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
\??\c:\ttnbtb.exec:\ttnbtb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\3pvpp.exec:\3pvpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\hhnhnn.exec:\hhnhnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
\??\c:\jvddd.exec:\jvddd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
\??\c:\rrxrrrr.exec:\rrxrrrr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\thbnth.exec:\thbnth.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\dvvvd.exec:\dvvvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\lxxfxfx.exec:\lxxfxfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\btttnb.exec:\btttnb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\ttbnhn.exec:\ttbnhn.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\pvppp.exec:\pvppp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\1fxllll.exec:\1fxllll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\httnnh.exec:\httnnh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
\??\c:\jdppj.exec:\jdppj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
\??\c:\fxflllr.exec:\fxflllr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\flfllll.exec:\flfllll.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\ttbbnn.exec:\ttbbnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
\??\c:\xxrrrxx.exec:\xxrrrxx.exe23⤵
- Executes dropped EXE
PID:4596 -
\??\c:\hhhntt.exec:\hhhntt.exe24⤵
- Executes dropped EXE
PID:864 -
\??\c:\vppjd.exec:\vppjd.exe25⤵
- Executes dropped EXE
PID:3824 -
\??\c:\rfrrxff.exec:\rfrrxff.exe26⤵
- Executes dropped EXE
PID:1784 -
\??\c:\lllllll.exec:\lllllll.exe27⤵
- Executes dropped EXE
PID:3444 -
\??\c:\jpdjj.exec:\jpdjj.exe28⤵
- Executes dropped EXE
PID:2424 -
\??\c:\lrfffll.exec:\lrfffll.exe29⤵
- Executes dropped EXE
PID:3428 -
\??\c:\ntnhtb.exec:\ntnhtb.exe30⤵
- Executes dropped EXE
PID:4356 -
\??\c:\vddpj.exec:\vddpj.exe31⤵
- Executes dropped EXE
PID:740 -
\??\c:\xlxxxfl.exec:\xlxxxfl.exe32⤵
- Executes dropped EXE
PID:4084 -
\??\c:\lxxrffx.exec:\lxxrffx.exe33⤵
- Executes dropped EXE
PID:3424 -
\??\c:\ntbtnh.exec:\ntbtnh.exe34⤵
- Executes dropped EXE
PID:4804 -
\??\c:\vvpdv.exec:\vvpdv.exe35⤵
- Executes dropped EXE
PID:2716 -
\??\c:\ddppv.exec:\ddppv.exe36⤵
- Executes dropped EXE
PID:2488 -
\??\c:\lrfrlxl.exec:\lrfrlxl.exe37⤵
- Executes dropped EXE
PID:1640 -
\??\c:\7thhnt.exec:\7thhnt.exe38⤵
- Executes dropped EXE
PID:1248 -
\??\c:\9pddp.exec:\9pddp.exe39⤵
- Executes dropped EXE
PID:2196 -
\??\c:\3djdv.exec:\3djdv.exe40⤵
- Executes dropped EXE
PID:3960 -
\??\c:\xxflllf.exec:\xxflllf.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800 -
\??\c:\hnnhhh.exec:\hnnhhh.exe42⤵
- Executes dropped EXE
PID:2176 -
\??\c:\hhbbbb.exec:\hhbbbb.exe43⤵
- Executes dropped EXE
PID:4836 -
\??\c:\pvjdj.exec:\pvjdj.exe44⤵
- Executes dropped EXE
PID:3672 -
\??\c:\rfffrrx.exec:\rfffrrx.exe45⤵
- Executes dropped EXE
PID:4532 -
\??\c:\flxrffr.exec:\flxrffr.exe46⤵
- Executes dropped EXE
PID:3012 -
\??\c:\nnbnbh.exec:\nnbnbh.exe47⤵
- Executes dropped EXE
PID:3128 -
\??\c:\vppjj.exec:\vppjj.exe48⤵
- Executes dropped EXE
PID:4068 -
\??\c:\pvddv.exec:\pvddv.exe49⤵
- Executes dropped EXE
PID:1288 -
\??\c:\frxxrrx.exec:\frxxrrx.exe50⤵
- Executes dropped EXE
PID:3024 -
\??\c:\bnbnnt.exec:\bnbnnt.exe51⤵
- Executes dropped EXE
PID:2660 -
\??\c:\dppdd.exec:\dppdd.exe52⤵
- Executes dropped EXE
PID:4884 -
\??\c:\ppvvp.exec:\ppvvp.exe53⤵
- Executes dropped EXE
PID:3332 -
\??\c:\rffxxxx.exec:\rffxxxx.exe54⤵
- Executes dropped EXE
PID:3124 -
\??\c:\tnnhhn.exec:\tnnhhn.exe55⤵
- Executes dropped EXE
PID:4260 -
\??\c:\nhnnnt.exec:\nhnnnt.exe56⤵
- Executes dropped EXE
PID:948 -
\??\c:\lfllffl.exec:\lfllffl.exe57⤵
- Executes dropped EXE
PID:4996 -
\??\c:\flxxxlx.exec:\flxxxlx.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5068 -
\??\c:\tnhhbb.exec:\tnhhbb.exe59⤵
- Executes dropped EXE
PID:2540 -
\??\c:\vpddp.exec:\vpddp.exe60⤵
- Executes dropped EXE
PID:3584 -
\??\c:\pjvpd.exec:\pjvpd.exe61⤵
- Executes dropped EXE
PID:1820 -
\??\c:\xllrlrr.exec:\xllrlrr.exe62⤵
- Executes dropped EXE
PID:868 -
\??\c:\bnbhbb.exec:\bnbhbb.exe63⤵
- Executes dropped EXE
PID:3052 -
\??\c:\tntnhh.exec:\tntnhh.exe64⤵
- Executes dropped EXE
PID:2420 -
\??\c:\pdvvp.exec:\pdvvp.exe65⤵
- Executes dropped EXE
PID:2276 -
\??\c:\jvvvj.exec:\jvvvj.exe66⤵PID:1504
-
\??\c:\llrlrxf.exec:\llrlrxf.exe67⤵PID:1748
-
\??\c:\bntbnn.exec:\bntbnn.exe68⤵PID:4368
-
\??\c:\ttbbnt.exec:\ttbbnt.exe69⤵PID:900
-
\??\c:\jvpvv.exec:\jvpvv.exe70⤵
- System Location Discovery: System Language Discovery
PID:372 -
\??\c:\rrllffl.exec:\rrllffl.exe71⤵PID:1020
-
\??\c:\xrrrllf.exec:\xrrrllf.exe72⤵PID:4352
-
\??\c:\hnhtth.exec:\hnhtth.exe73⤵PID:4376
-
\??\c:\pvvpj.exec:\pvvpj.exe74⤵PID:4968
-
\??\c:\jpdvp.exec:\jpdvp.exe75⤵PID:2824
-
\??\c:\rfllffx.exec:\rfllffx.exe76⤵PID:4980
-
\??\c:\nhhhbh.exec:\nhhhbh.exe77⤵PID:4092
-
\??\c:\hhtnhh.exec:\hhtnhh.exe78⤵PID:736
-
\??\c:\3dpvv.exec:\3dpvv.exe79⤵PID:4804
-
\??\c:\pjjjj.exec:\pjjjj.exe80⤵PID:4580
-
\??\c:\xrrfxrf.exec:\xrrfxrf.exe81⤵PID:3580
-
\??\c:\tbnhhh.exec:\tbnhhh.exe82⤵PID:2088
-
\??\c:\7jvdd.exec:\7jvdd.exe83⤵PID:2968
-
\??\c:\vdvpj.exec:\vdvpj.exe84⤵PID:3116
-
\??\c:\rxfxffl.exec:\rxfxffl.exe85⤵PID:4156
-
\??\c:\hnnnnn.exec:\hnnnnn.exe86⤵PID:4316
-
\??\c:\hbhhbb.exec:\hbhhbb.exe87⤵PID:4836
-
\??\c:\jjdvj.exec:\jjdvj.exe88⤵
- System Location Discovery: System Language Discovery
PID:4960 -
\??\c:\fflllrr.exec:\fflllrr.exe89⤵PID:1964
-
\??\c:\rxfxfxl.exec:\rxfxfxl.exe90⤵PID:3012
-
\??\c:\hnhtbh.exec:\hnhtbh.exe91⤵PID:3128
-
\??\c:\9pjpj.exec:\9pjpj.exe92⤵PID:3976
-
\??\c:\ddjjd.exec:\ddjjd.exe93⤵PID:2244
-
\??\c:\rxxxrxr.exec:\rxxxrxr.exe94⤵PID:2944
-
\??\c:\nhbbtb.exec:\nhbbtb.exe95⤵PID:2040
-
\??\c:\ddjjp.exec:\ddjjp.exe96⤵PID:932
-
\??\c:\1vvvd.exec:\1vvvd.exe97⤵PID:4720
-
\??\c:\lfxxlfr.exec:\lfxxlfr.exe98⤵PID:2252
-
\??\c:\hbhhhn.exec:\hbhhhn.exe99⤵PID:2952
-
\??\c:\nnnhhn.exec:\nnnhhn.exe100⤵PID:2940
-
\??\c:\djjjv.exec:\djjjv.exe101⤵PID:3436
-
\??\c:\xxlllrl.exec:\xxlllrl.exe102⤵PID:4336
-
\??\c:\ntbtnt.exec:\ntbtnt.exe103⤵PID:2284
-
\??\c:\djjjd.exec:\djjjd.exe104⤵PID:4640
-
\??\c:\jddjd.exec:\jddjd.exe105⤵PID:2264
-
\??\c:\xxxrlrl.exec:\xxxrlrl.exe106⤵PID:868
-
\??\c:\rllfllx.exec:\rllfllx.exe107⤵PID:4556
-
\??\c:\3ttnhh.exec:\3ttnhh.exe108⤵PID:2964
-
\??\c:\vvppj.exec:\vvppj.exe109⤵PID:3860
-
\??\c:\pjjdp.exec:\pjjdp.exe110⤵PID:2508
-
\??\c:\rrrrxxf.exec:\rrrrxxf.exe111⤵PID:3484
-
\??\c:\lfxfxff.exec:\lfxfxff.exe112⤵PID:3172
-
\??\c:\hhbbtt.exec:\hhbbtt.exe113⤵PID:4444
-
\??\c:\nbtbhh.exec:\nbtbhh.exe114⤵PID:3412
-
\??\c:\3jppd.exec:\3jppd.exe115⤵PID:1020
-
\??\c:\vjpjj.exec:\vjpjj.exe116⤵PID:3512
-
\??\c:\lxfxllf.exec:\lxfxllf.exe117⤵PID:1456
-
\??\c:\rfxrrrr.exec:\rfxrrrr.exe118⤵PID:4856
-
\??\c:\bhhhhn.exec:\bhhhhn.exe119⤵PID:1924
-
\??\c:\vvjdv.exec:\vvjdv.exe120⤵PID:2464
-
\??\c:\5xxxrxf.exec:\5xxxrxf.exe121⤵PID:4004
-
\??\c:\hnbhtt.exec:\hnbhtt.exe122⤵PID:4116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-