Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 03:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
150 seconds
General
-
Target
d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe
-
Size
590KB
-
MD5
f2a764bb54e03f4a6388d1a7c7aa78e0
-
SHA1
aa9573570e345434caf6b289da4f84c09a16d806
-
SHA256
d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7
-
SHA512
d96acdff66c97c1adb96477318d61601713aa7e6090c1c6d4bb0e7b843210551a011ad9811705ae263294ae8a7530325a5c575bc92874c727360363a6b9a16a1
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayB:n3C9Lebz+xt4vFeFmgayB
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral2/memory/1316-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1696-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3064-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4692-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1460-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3660-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4388-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4440-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/748-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1944-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4716-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2284-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2236-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3648-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1696 xlxlrlx.exe 3064 xrxrlfx.exe 4692 thhbth.exe 3408 tttntn.exe 1460 hbbtbb.exe 3436 pvvpj.exe 4388 bnnhtn.exe 3660 vppdv.exe 4928 ffxlxlx.exe 2072 nbnhnh.exe 3148 vdpdj.exe 3200 tttnnh.exe 4656 frrlxrl.exe 4440 nhhtnh.exe 2028 vpjvv.exe 1232 htbnbb.exe 3648 pjjvp.exe 4884 7hnnnn.exe 2236 9dvpp.exe 1608 vpjdv.exe 1896 lflllll.exe 408 btbbtt.exe 2284 1pvdd.exe 2368 nntnhh.exe 2844 7bbttn.exe 4000 flxfrrr.exe 748 xxxrllf.exe 4344 htbtnb.exe 5056 rxlrrxf.exe 4716 xxxrfxr.exe 1944 9xxfxfr.exe 4080 thntnt.exe 3968 rfxrffx.exe 1844 hbhhbb.exe 3992 5xlfxfx.exe 4104 ntnhth.exe 3348 dvjpv.exe 4524 9jpvd.exe 4964 xxrrlll.exe 376 btbhnb.exe 4588 vvpdv.exe 2508 djvvp.exe 4260 lllxrrl.exe 2848 tbhhtt.exe 2752 jdvpp.exe 3184 pjjvj.exe 440 rrxxlfr.exe 2548 nbhbnh.exe 3084 bhnhhb.exe 2512 9jpjp.exe 2400 flllfxr.exe 1960 rlrlflf.exe 2376 3nhtnt.exe 4584 pvpdp.exe 3272 djjpv.exe 4032 5xfxxxr.exe 740 nbtbtn.exe 1080 tbhtnh.exe 940 1pvpj.exe 2128 rfxrlfx.exe 2040 rxlfxll.exe 3784 hbbnhb.exe 1880 7jppd.exe 3996 vjpjj.exe -
resource yara_rule behavioral2/memory/1316-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3064-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4692-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1460-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3660-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4388-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4440-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1944-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2284-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2236-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3648-122-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9frlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1696 1316 d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe 81 PID 1316 wrote to memory of 1696 1316 d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe 81 PID 1316 wrote to memory of 1696 1316 d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe 81 PID 1696 wrote to memory of 3064 1696 xlxlrlx.exe 82 PID 1696 wrote to memory of 3064 1696 xlxlrlx.exe 82 PID 1696 wrote to memory of 3064 1696 xlxlrlx.exe 82 PID 3064 wrote to memory of 4692 3064 xrxrlfx.exe 83 PID 3064 wrote to memory of 4692 3064 xrxrlfx.exe 83 PID 3064 wrote to memory of 4692 3064 xrxrlfx.exe 83 PID 4692 wrote to memory of 3408 4692 thhbth.exe 296 PID 4692 wrote to memory of 3408 4692 thhbth.exe 296 PID 4692 wrote to memory of 3408 4692 thhbth.exe 296 PID 3408 wrote to memory of 1460 3408 tttntn.exe 87 PID 3408 wrote to memory of 1460 3408 tttntn.exe 87 PID 3408 wrote to memory of 1460 3408 tttntn.exe 87 PID 1460 wrote to memory of 3436 1460 hbbtbb.exe 88 PID 1460 wrote to memory of 3436 1460 hbbtbb.exe 88 PID 1460 wrote to memory of 3436 1460 hbbtbb.exe 88 PID 3436 wrote to memory of 4388 3436 pvvpj.exe 302 PID 3436 wrote to memory of 4388 3436 pvvpj.exe 302 PID 3436 wrote to memory of 4388 3436 pvvpj.exe 302 PID 4388 wrote to memory of 3660 4388 bnnhtn.exe 303 PID 4388 wrote to memory of 3660 4388 bnnhtn.exe 303 PID 4388 wrote to memory of 3660 4388 bnnhtn.exe 303 PID 3660 wrote to memory of 4928 3660 vppdv.exe 92 PID 3660 wrote to memory of 4928 3660 vppdv.exe 92 PID 3660 wrote to memory of 4928 3660 vppdv.exe 92 PID 4928 wrote to memory of 2072 4928 ffxlxlx.exe 196 PID 4928 wrote to memory of 2072 4928 ffxlxlx.exe 196 PID 4928 wrote to memory of 2072 4928 ffxlxlx.exe 196 PID 2072 wrote to memory of 3148 2072 nbnhnh.exe 94 PID 2072 wrote to memory of 3148 2072 nbnhnh.exe 94 PID 2072 wrote to memory of 3148 2072 nbnhnh.exe 94 PID 3148 wrote to memory of 3200 3148 vdpdj.exe 95 PID 3148 wrote to memory of 3200 3148 vdpdj.exe 95 PID 3148 wrote to memory of 3200 3148 vdpdj.exe 95 PID 3200 wrote to memory of 4656 3200 tttnnh.exe 254 PID 3200 wrote to memory of 4656 3200 tttnnh.exe 254 PID 3200 wrote to memory of 4656 3200 tttnnh.exe 254 PID 4656 wrote to memory of 4440 4656 frrlxrl.exe 311 PID 4656 wrote to memory of 4440 4656 frrlxrl.exe 311 PID 4656 wrote to memory of 4440 4656 frrlxrl.exe 311 PID 4440 wrote to memory of 2028 4440 nhhtnh.exe 314 PID 4440 wrote to memory of 2028 4440 nhhtnh.exe 314 PID 4440 wrote to memory of 2028 4440 nhhtnh.exe 314 PID 2028 wrote to memory of 1232 2028 vpjvv.exe 99 PID 2028 wrote to memory of 1232 2028 vpjvv.exe 99 PID 2028 wrote to memory of 1232 2028 vpjvv.exe 99 PID 1232 wrote to memory of 3648 1232 htbnbb.exe 205 PID 1232 wrote to memory of 3648 1232 htbnbb.exe 205 PID 1232 wrote to memory of 3648 1232 htbnbb.exe 205 PID 3648 wrote to memory of 4884 3648 pjjvp.exe 101 PID 3648 wrote to memory of 4884 3648 pjjvp.exe 101 PID 3648 wrote to memory of 4884 3648 pjjvp.exe 101 PID 4884 wrote to memory of 2236 4884 7hnnnn.exe 102 PID 4884 wrote to memory of 2236 4884 7hnnnn.exe 102 PID 4884 wrote to memory of 2236 4884 7hnnnn.exe 102 PID 2236 wrote to memory of 1608 2236 9dvpp.exe 319 PID 2236 wrote to memory of 1608 2236 9dvpp.exe 319 PID 2236 wrote to memory of 1608 2236 9dvpp.exe 319 PID 1608 wrote to memory of 1896 1608 vpjdv.exe 104 PID 1608 wrote to memory of 1896 1608 vpjdv.exe 104 PID 1608 wrote to memory of 1896 1608 vpjdv.exe 104 PID 1896 wrote to memory of 408 1896 lflllll.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe"C:\Users\Admin\AppData\Local\Temp\d53072307e680283f8539b05b929f38526abb8b8ad2115fee59a007f7cc48ac7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
\??\c:\xlxlrlx.exec:\xlxlrlx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\xrxrlfx.exec:\xrxrlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\thhbth.exec:\thhbth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\tttntn.exec:\tttntn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\hbbtbb.exec:\hbbtbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\pvvpj.exec:\pvvpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\bnnhtn.exec:\bnnhtn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
\??\c:\vppdv.exec:\vppdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
\??\c:\ffxlxlx.exec:\ffxlxlx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\nbnhnh.exec:\nbnhnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\vdpdj.exec:\vdpdj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\tttnnh.exec:\tttnnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\frrlxrl.exec:\frrlxrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
\??\c:\nhhtnh.exec:\nhhtnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\vpjvv.exec:\vpjvv.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\htbnbb.exec:\htbnbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\pjjvp.exec:\pjjvp.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
\??\c:\7hnnnn.exec:\7hnnnn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\9dvpp.exec:\9dvpp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\vpjdv.exec:\vpjdv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
\??\c:\lflllll.exec:\lflllll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\btbbtt.exec:\btbbtt.exe23⤵
- Executes dropped EXE
PID:408 -
\??\c:\1pvdd.exec:\1pvdd.exe24⤵
- Executes dropped EXE
PID:2284 -
\??\c:\nntnhh.exec:\nntnhh.exe25⤵
- Executes dropped EXE
PID:2368 -
\??\c:\7bbttn.exec:\7bbttn.exe26⤵
- Executes dropped EXE
PID:2844 -
\??\c:\flxfrrr.exec:\flxfrrr.exe27⤵
- Executes dropped EXE
PID:4000 -
\??\c:\xxxrllf.exec:\xxxrllf.exe28⤵
- Executes dropped EXE
PID:748 -
\??\c:\htbtnb.exec:\htbtnb.exe29⤵
- Executes dropped EXE
PID:4344 -
\??\c:\rxlrrxf.exec:\rxlrrxf.exe30⤵
- Executes dropped EXE
PID:5056 -
\??\c:\xxxrfxr.exec:\xxxrfxr.exe31⤵
- Executes dropped EXE
PID:4716 -
\??\c:\9xxfxfr.exec:\9xxfxfr.exe32⤵
- Executes dropped EXE
PID:1944 -
\??\c:\thntnt.exec:\thntnt.exe33⤵
- Executes dropped EXE
PID:4080 -
\??\c:\rfxrffx.exec:\rfxrffx.exe34⤵
- Executes dropped EXE
PID:3968 -
\??\c:\hbhhbb.exec:\hbhhbb.exe35⤵
- Executes dropped EXE
PID:1844 -
\??\c:\5xlfxfx.exec:\5xlfxfx.exe36⤵
- Executes dropped EXE
PID:3992 -
\??\c:\ntnhth.exec:\ntnhth.exe37⤵
- Executes dropped EXE
PID:4104 -
\??\c:\dvjpv.exec:\dvjpv.exe38⤵
- Executes dropped EXE
PID:3348 -
\??\c:\9jpvd.exec:\9jpvd.exe39⤵
- Executes dropped EXE
PID:4524 -
\??\c:\xxrrlll.exec:\xxrrlll.exe40⤵
- Executes dropped EXE
PID:4964 -
\??\c:\btbhnb.exec:\btbhnb.exe41⤵
- Executes dropped EXE
PID:376 -
\??\c:\vvpdv.exec:\vvpdv.exe42⤵
- Executes dropped EXE
PID:4588 -
\??\c:\djvvp.exec:\djvvp.exe43⤵
- Executes dropped EXE
PID:2508 -
\??\c:\lllxrrl.exec:\lllxrrl.exe44⤵
- Executes dropped EXE
PID:4260 -
\??\c:\tbhhtt.exec:\tbhhtt.exe45⤵
- Executes dropped EXE
PID:2848 -
\??\c:\jdvpp.exec:\jdvpp.exe46⤵
- Executes dropped EXE
PID:2752 -
\??\c:\pjjvj.exec:\pjjvj.exe47⤵
- Executes dropped EXE
PID:3184 -
\??\c:\rrxxlfr.exec:\rrxxlfr.exe48⤵
- Executes dropped EXE
PID:440 -
\??\c:\nbhbnh.exec:\nbhbnh.exe49⤵
- Executes dropped EXE
PID:2548 -
\??\c:\bhnhhb.exec:\bhnhhb.exe50⤵
- Executes dropped EXE
PID:3084 -
\??\c:\9jpjp.exec:\9jpjp.exe51⤵
- Executes dropped EXE
PID:2512 -
\??\c:\flllfxr.exec:\flllfxr.exe52⤵
- Executes dropped EXE
PID:2400 -
\??\c:\rlrlflf.exec:\rlrlflf.exe53⤵
- Executes dropped EXE
PID:1960 -
\??\c:\3nhtnt.exec:\3nhtnt.exe54⤵
- Executes dropped EXE
PID:2376 -
\??\c:\pvpdp.exec:\pvpdp.exe55⤵
- Executes dropped EXE
PID:4584 -
\??\c:\djjpv.exec:\djjpv.exe56⤵
- Executes dropped EXE
PID:3272 -
\??\c:\5xfxxxr.exec:\5xfxxxr.exe57⤵
- Executes dropped EXE
PID:4032 -
\??\c:\nbtbtn.exec:\nbtbtn.exe58⤵
- Executes dropped EXE
PID:740 -
\??\c:\tbhtnh.exec:\tbhtnh.exe59⤵
- Executes dropped EXE
PID:1080 -
\??\c:\1pvpj.exec:\1pvpj.exe60⤵
- Executes dropped EXE
PID:940 -
\??\c:\rfxrlfx.exec:\rfxrlfx.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128 -
\??\c:\rxlfxll.exec:\rxlfxll.exe62⤵
- Executes dropped EXE
PID:2040 -
\??\c:\hbbnhb.exec:\hbbnhb.exe63⤵
- Executes dropped EXE
PID:3784 -
\??\c:\7jppd.exec:\7jppd.exe64⤵
- Executes dropped EXE
PID:1880 -
\??\c:\vjpjj.exec:\vjpjj.exe65⤵
- Executes dropped EXE
PID:3996 -
\??\c:\ffxrfxr.exec:\ffxrfxr.exe66⤵PID:4804
-
\??\c:\hhtntn.exec:\hhtntn.exe67⤵PID:3444
-
\??\c:\tbbnbb.exec:\tbbnbb.exe68⤵PID:3924
-
\??\c:\jpjvd.exec:\jpjvd.exe69⤵PID:404
-
\??\c:\7djvd.exec:\7djvd.exe70⤵PID:4072
-
\??\c:\3llxxxx.exec:\3llxxxx.exe71⤵PID:916
-
\??\c:\9thbnb.exec:\9thbnb.exe72⤵PID:3044
-
\??\c:\3thbtt.exec:\3thbtt.exe73⤵PID:2696
-
\??\c:\7jvpp.exec:\7jvpp.exe74⤵PID:1480
-
\??\c:\frrfxxf.exec:\frrfxxf.exe75⤵PID:1484
-
\??\c:\nbnhht.exec:\nbnhht.exe76⤵PID:812
-
\??\c:\hbbbtt.exec:\hbbbtt.exe77⤵PID:4512
-
\??\c:\lllffxr.exec:\lllffxr.exe78⤵PID:3532
-
\??\c:\9nhhbb.exec:\9nhhbb.exe79⤵PID:2932
-
\??\c:\jpjdv.exec:\jpjdv.exe80⤵PID:1948
-
\??\c:\vppjd.exec:\vppjd.exe81⤵PID:2708
-
\??\c:\lllrlrl.exec:\lllrlrl.exe82⤵PID:4548
-
\??\c:\7bhbnn.exec:\7bhbnn.exe83⤵PID:872
-
\??\c:\hhnnbh.exec:\hhnnbh.exe84⤵PID:4976
-
\??\c:\3vdvj.exec:\3vdvj.exe85⤵PID:2564
-
\??\c:\xxfxfxf.exec:\xxfxfxf.exe86⤵PID:3216
-
\??\c:\fxxxrlr.exec:\fxxxrlr.exe87⤵PID:3944
-
\??\c:\btbtbt.exec:\btbtbt.exe88⤵PID:4480
-
\??\c:\djpjj.exec:\djpjj.exe89⤵PID:3540
-
\??\c:\ppvdd.exec:\ppvdd.exe90⤵PID:5084
-
\??\c:\lrlxlfl.exec:\lrlxlfl.exe91⤵PID:3032
-
\??\c:\bntnbt.exec:\bntnbt.exe92⤵PID:4900
-
\??\c:\hnthbt.exec:\hnthbt.exe93⤵PID:4468
-
\??\c:\dppdv.exec:\dppdv.exe94⤵PID:3632
-
\??\c:\fxrlxxl.exec:\fxrlxxl.exe95⤵PID:4296
-
\??\c:\lflfxrl.exec:\lflfxrl.exe96⤵PID:2444
-
\??\c:\hhhbtn.exec:\hhhbtn.exe97⤵PID:2292
-
\??\c:\9hbhtn.exec:\9hbhtn.exe98⤵PID:3844
-
\??\c:\jdvdv.exec:\jdvdv.exe99⤵PID:1888
-
\??\c:\fflxlfx.exec:\fflxlfx.exe100⤵PID:1696
-
\??\c:\rfrrlfl.exec:\rfrrlfl.exe101⤵PID:2840
-
\??\c:\nbnhbb.exec:\nbnhbb.exe102⤵PID:2436
-
\??\c:\jdpdp.exec:\jdpdp.exe103⤵PID:3408
-
\??\c:\jpvpd.exec:\jpvpd.exe104⤵PID:4772
-
\??\c:\lffxlfx.exec:\lffxlfx.exe105⤵PID:5080
-
\??\c:\bttnhh.exec:\bttnhh.exe106⤵PID:3624
-
\??\c:\bnnthh.exec:\bnnthh.exe107⤵PID:2232
-
\??\c:\jvvdp.exec:\jvvdp.exe108⤵PID:224
-
\??\c:\rlfrfxr.exec:\rlfrfxr.exe109⤵PID:1776
-
\??\c:\xrlffxr.exec:\xrlffxr.exe110⤵PID:2180
-
\??\c:\nntnnh.exec:\nntnnh.exe111⤵PID:380
-
\??\c:\ppjvj.exec:\ppjvj.exe112⤵PID:1344
-
\??\c:\pjdvv.exec:\pjdvv.exe113⤵PID:4464
-
\??\c:\xlrfxrl.exec:\xlrfxrl.exe114⤵PID:2072
-
\??\c:\9hnhbn.exec:\9hnhbn.exe115⤵PID:1956
-
\??\c:\9nbhnh.exec:\9nbhnh.exe116⤵PID:4496
-
\??\c:\llfrlfx.exec:\llfrlfx.exe117⤵PID:2120
-
\??\c:\xffxrlf.exec:\xffxrlf.exe118⤵PID:432
-
\??\c:\nbnhtn.exec:\nbnhtn.exe119⤵PID:4332
-
\??\c:\vvppp.exec:\vvppp.exe120⤵PID:2028
-
\??\c:\dvjdd.exec:\dvjdd.exe121⤵PID:808
-
\??\c:\fxxxllf.exec:\fxxxllf.exe122⤵PID:2528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-