Overview
overview
10Static
static
10Dropper/Berbew.exe
windows7-x64
10Dropper/Berbew.exe
windows10-2004-x64
10Dropper/Phorphiex.exe
windows7-x64
10Dropper/Phorphiex.exe
windows10-2004-x64
10RAT/31.exe
windows7-x64
10RAT/31.exe
windows10-2004-x64
10RAT/XClient.exe
windows7-x64
10RAT/XClient.exe
windows10-2004-x64
10RAT/file.exe
windows7-x64
7RAT/file.exe
windows10-2004-x64
7Ransomware...-2.exe
windows7-x64
10Ransomware...-2.exe
windows10-2004-x64
10Ransomware...01.exe
windows7-x64
10Ransomware...01.exe
windows10-2004-x64
10Ransomware...lt.exe
windows7-x64
10Ransomware...lt.exe
windows10-2004-x64
10Stealers/Azorult.exe
windows7-x64
10Stealers/Azorult.exe
windows10-2004-x64
10Stealers/B...on.exe
windows7-x64
10Stealers/B...on.exe
windows10-2004-x64
10Stealers/Dridex.dll
windows7-x64
10Stealers/Dridex.dll
windows10-2004-x64
Stealers/M..._2.exe
windows7-x64
9Stealers/M..._2.exe
windows10-2004-x64
10Stealers/lumma.exe
windows7-x64
10Stealers/lumma.exe
windows10-2004-x64
10Trojan/BetaBot.exe
windows7-x64
10Trojan/BetaBot.exe
windows10-2004-x64
10Trojan/Smo...er.exe
windows7-x64
10Trojan/Smo...er.exe
windows10-2004-x64
10Resubmissions
12-09-2024 02:23
240912-cvfznswere 1004-09-2024 00:09
240904-afvheascla 1003-09-2024 18:57
240903-xl8csavfrb 1003-09-2024 18:12
240903-ws828asgnm 10Analysis
-
max time kernel
72s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 18:57
Behavioral task
behavioral1
Sample
Dropper/Berbew.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Dropper/Berbew.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Dropper/Phorphiex.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Dropper/Phorphiex.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RAT/31.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
RAT/31.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RAT/XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RAT/XClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RAT/file.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
RAT/file.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Ransomware/Client-2.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Ransomware/Client-2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Ransomware/criticalupdate01.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ransomware/criticalupdate01.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Ransomware/default.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Ransomware/default.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Stealers/Azorult.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Stealers/Azorult.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Stealers/BlackMoon.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Stealers/BlackMoon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Stealers/Dridex.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Stealers/Dridex.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Stealers/lumma.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Stealers/lumma.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Trojan/BetaBot.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Trojan/BetaBot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Trojan/SmokeLoader.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Trojan/SmokeLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
Stealers/BlackMoon.exe
-
Size
387KB
-
MD5
336efa7460c08e3d47f29121742eb010
-
SHA1
f41c36cd83879d170309dede056563d35741b87b
-
SHA256
e6dd3fa33ad938b07c8978691f86b73e9f6fd84104b92f42566498bdb6b2930e
-
SHA512
e8d118fbe907a00d89c2514af4de475a0ea54943076bf90174234f77f2ec093a1246a0d4e78d1104a0dcda150b5441d28f4f3d1e768ecb20ae86383a99863c14
-
SSDEEP
12288:n3C9ytvngQjpUXoSWlnwJv90aKToFqwfN:SgdnJVU4TlnwJ6Goo
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
resource yara_rule behavioral20/memory/2724-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/2724-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/1948-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/948-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3352-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/1724-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3440-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3284-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/5064-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3604-70-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral20/memory/3604-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/1924-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/2136-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/384-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/4164-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/1716-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3588-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/4776-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3736-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/4232-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3172-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/4292-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/1576-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/1348-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/2028-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3068-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/4544-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/4152-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/3972-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral20/memory/5032-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1948 pjdjj.exe 948 5xxrrrr.exe 3352 dvjpd.exe 1724 thtnnn.exe 3284 pvdvv.exe 3440 rlxxffr.exe 5064 xlllfff.exe 1924 vvvvv.exe 3604 vpdvv.exe 2136 vvddd.exe 384 hbtntb.exe 4164 pjvpp.exe 1716 7htntn.exe 4304 fxllllr.exe 3588 thbbtt.exe 4776 pjpvp.exe 3736 rfrlfff.exe 4232 ddddj.exe 4956 ffrlllr.exe 3172 nntnnn.exe 4292 jdjjj.exe 1576 lfffxxr.exe 1348 pjpvd.exe 2028 jvdvp.exe 3068 rlrfxrl.exe 4152 1nnnhb.exe 4544 vpvvv.exe 3972 hhtbhn.exe 5032 dvvvj.exe 3004 vvpvp.exe 1596 rlxrrll.exe 1696 jvvdd.exe 4436 thtnnn.exe 4848 9jjdv.exe 4208 ffxxlfl.exe 2796 xxfxffl.exe 1080 pdjdv.exe 1912 lxlfxxr.exe 1976 xlfxrrl.exe 4628 ddppv.exe 5108 xxlfllf.exe 4900 7xfxxxr.exe 3476 thhhtt.exe 3116 ppdvp.exe 4836 ddppj.exe 3556 lfrrrrr.exe 1996 7btnbb.exe 2268 vpppp.exe 3748 1djdj.exe 3108 1nnhtb.exe 1224 1djjd.exe 2596 frxrffx.exe 4032 fxfxxxr.exe 2988 bnhbtb.exe 4304 dpvvv.exe 1072 fxllllr.exe 3652 rrfxxxr.exe 4744 tnbtbb.exe 752 ppvpp.exe 2816 9nttht.exe 1136 pdjjj.exe 4568 vjppd.exe 3744 llxrxxf.exe 4988 htbttt.exe -
resource yara_rule behavioral20/memory/2724-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/2724-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/1948-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/948-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3352-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/1724-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3440-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3284-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/5064-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3604-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/1924-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/2136-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/2136-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/2136-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/384-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/4164-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/1716-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3588-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/4776-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3736-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/4232-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3172-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/4292-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/1576-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/1348-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/2028-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3068-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/4544-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/4152-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/3972-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral20/memory/5032-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lrfxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxfllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5htthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tnnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxllfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxrrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 1948 2724 BlackMoon.exe 85 PID 2724 wrote to memory of 1948 2724 BlackMoon.exe 85 PID 2724 wrote to memory of 1948 2724 BlackMoon.exe 85 PID 1948 wrote to memory of 948 1948 pjdjj.exe 86 PID 1948 wrote to memory of 948 1948 pjdjj.exe 86 PID 1948 wrote to memory of 948 1948 pjdjj.exe 86 PID 948 wrote to memory of 3352 948 5xxrrrr.exe 87 PID 948 wrote to memory of 3352 948 5xxrrrr.exe 87 PID 948 wrote to memory of 3352 948 5xxrrrr.exe 87 PID 3352 wrote to memory of 1724 3352 dvjpd.exe 88 PID 3352 wrote to memory of 1724 3352 dvjpd.exe 88 PID 3352 wrote to memory of 1724 3352 dvjpd.exe 88 PID 1724 wrote to memory of 3284 1724 thtnnn.exe 89 PID 1724 wrote to memory of 3284 1724 thtnnn.exe 89 PID 1724 wrote to memory of 3284 1724 thtnnn.exe 89 PID 3284 wrote to memory of 3440 3284 pvdvv.exe 90 PID 3284 wrote to memory of 3440 3284 pvdvv.exe 90 PID 3284 wrote to memory of 3440 3284 pvdvv.exe 90 PID 3440 wrote to memory of 5064 3440 rlxxffr.exe 91 PID 3440 wrote to memory of 5064 3440 rlxxffr.exe 91 PID 3440 wrote to memory of 5064 3440 rlxxffr.exe 91 PID 5064 wrote to memory of 1924 5064 xlllfff.exe 92 PID 5064 wrote to memory of 1924 5064 xlllfff.exe 92 PID 5064 wrote to memory of 1924 5064 xlllfff.exe 92 PID 1924 wrote to memory of 3604 1924 vvvvv.exe 94 PID 1924 wrote to memory of 3604 1924 vvvvv.exe 94 PID 1924 wrote to memory of 3604 1924 vvvvv.exe 94 PID 3604 wrote to memory of 2136 3604 vpdvv.exe 95 PID 3604 wrote to memory of 2136 3604 vpdvv.exe 95 PID 3604 wrote to memory of 2136 3604 vpdvv.exe 95 PID 2136 wrote to memory of 384 2136 vvddd.exe 96 PID 2136 wrote to memory of 384 2136 vvddd.exe 96 PID 2136 wrote to memory of 384 2136 vvddd.exe 96 PID 384 wrote to memory of 4164 384 hbtntb.exe 98 PID 384 wrote to memory of 4164 384 hbtntb.exe 98 PID 384 wrote to memory of 4164 384 hbtntb.exe 98 PID 4164 wrote to memory of 1716 4164 pjvpp.exe 99 PID 4164 wrote to memory of 1716 4164 pjvpp.exe 99 PID 4164 wrote to memory of 1716 4164 pjvpp.exe 99 PID 1716 wrote to memory of 4304 1716 7htntn.exe 100 PID 1716 wrote to memory of 4304 1716 7htntn.exe 100 PID 1716 wrote to memory of 4304 1716 7htntn.exe 100 PID 4304 wrote to memory of 3588 4304 fxllllr.exe 101 PID 4304 wrote to memory of 3588 4304 fxllllr.exe 101 PID 4304 wrote to memory of 3588 4304 fxllllr.exe 101 PID 3588 wrote to memory of 4776 3588 thbbtt.exe 102 PID 3588 wrote to memory of 4776 3588 thbbtt.exe 102 PID 3588 wrote to memory of 4776 3588 thbbtt.exe 102 PID 4776 wrote to memory of 3736 4776 pjpvp.exe 103 PID 4776 wrote to memory of 3736 4776 pjpvp.exe 103 PID 4776 wrote to memory of 3736 4776 pjpvp.exe 103 PID 3736 wrote to memory of 4232 3736 rfrlfff.exe 104 PID 3736 wrote to memory of 4232 3736 rfrlfff.exe 104 PID 3736 wrote to memory of 4232 3736 rfrlfff.exe 104 PID 4232 wrote to memory of 4956 4232 ddddj.exe 105 PID 4232 wrote to memory of 4956 4232 ddddj.exe 105 PID 4232 wrote to memory of 4956 4232 ddddj.exe 105 PID 4956 wrote to memory of 3172 4956 ffrlllr.exe 107 PID 4956 wrote to memory of 3172 4956 ffrlllr.exe 107 PID 4956 wrote to memory of 3172 4956 ffrlllr.exe 107 PID 3172 wrote to memory of 4292 3172 nntnnn.exe 108 PID 3172 wrote to memory of 4292 3172 nntnnn.exe 108 PID 3172 wrote to memory of 4292 3172 nntnnn.exe 108 PID 4292 wrote to memory of 1576 4292 jdjjj.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stealers\BlackMoon.exe"C:\Users\Admin\AppData\Local\Temp\Stealers\BlackMoon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\pjdjj.exec:\pjdjj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\5xxrrrr.exec:\5xxrrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
\??\c:\dvjpd.exec:\dvjpd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\thtnnn.exec:\thtnnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\pvdvv.exec:\pvdvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
\??\c:\rlxxffr.exec:\rlxxffr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\xlllfff.exec:\xlllfff.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\vvvvv.exec:\vvvvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\vpdvv.exec:\vpdvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
\??\c:\vvddd.exec:\vvddd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\hbtntb.exec:\hbtntb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
\??\c:\pjvpp.exec:\pjvpp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\7htntn.exec:\7htntn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\fxllllr.exec:\fxllllr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
\??\c:\thbbtt.exec:\thbbtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\pjpvp.exec:\pjpvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
\??\c:\rfrlfff.exec:\rfrlfff.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\ddddj.exec:\ddddj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
\??\c:\ffrlllr.exec:\ffrlllr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\nntnnn.exec:\nntnnn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
\??\c:\jdjjj.exec:\jdjjj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
\??\c:\lfffxxr.exec:\lfffxxr.exe23⤵
- Executes dropped EXE
PID:1576 -
\??\c:\pjpvd.exec:\pjpvd.exe24⤵
- Executes dropped EXE
PID:1348 -
\??\c:\jvdvp.exec:\jvdvp.exe25⤵
- Executes dropped EXE
PID:2028 -
\??\c:\rlrfxrl.exec:\rlrfxrl.exe26⤵
- Executes dropped EXE
PID:3068 -
\??\c:\1nnnhb.exec:\1nnnhb.exe27⤵
- Executes dropped EXE
PID:4152 -
\??\c:\vpvvv.exec:\vpvvv.exe28⤵
- Executes dropped EXE
PID:4544 -
\??\c:\hhtbhn.exec:\hhtbhn.exe29⤵
- Executes dropped EXE
PID:3972 -
\??\c:\dvvvj.exec:\dvvvj.exe30⤵
- Executes dropped EXE
PID:5032 -
\??\c:\vvpvp.exec:\vvpvp.exe31⤵
- Executes dropped EXE
PID:3004 -
\??\c:\rlxrrll.exec:\rlxrrll.exe32⤵
- Executes dropped EXE
PID:1596 -
\??\c:\jvvdd.exec:\jvvdd.exe33⤵
- Executes dropped EXE
PID:1696 -
\??\c:\thtnnn.exec:\thtnnn.exe34⤵
- Executes dropped EXE
PID:4436 -
\??\c:\9jjdv.exec:\9jjdv.exe35⤵
- Executes dropped EXE
PID:4848 -
\??\c:\ffxxlfl.exec:\ffxxlfl.exe36⤵
- Executes dropped EXE
PID:4208 -
\??\c:\xxfxffl.exec:\xxfxffl.exe37⤵
- Executes dropped EXE
PID:2796 -
\??\c:\pdjdv.exec:\pdjdv.exe38⤵
- Executes dropped EXE
PID:1080 -
\??\c:\lxlfxxr.exec:\lxlfxxr.exe39⤵
- Executes dropped EXE
PID:1912 -
\??\c:\xlfxrrl.exec:\xlfxrrl.exe40⤵
- Executes dropped EXE
PID:1976 -
\??\c:\ddppv.exec:\ddppv.exe41⤵
- Executes dropped EXE
PID:4628 -
\??\c:\xxlfllf.exec:\xxlfllf.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5108 -
\??\c:\7xfxxxr.exec:\7xfxxxr.exe43⤵
- Executes dropped EXE
PID:4900 -
\??\c:\thhhtt.exec:\thhhtt.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3476 -
\??\c:\ppdvp.exec:\ppdvp.exe45⤵
- Executes dropped EXE
PID:3116 -
\??\c:\ddppj.exec:\ddppj.exe46⤵
- Executes dropped EXE
PID:4836 -
\??\c:\lfrrrrr.exec:\lfrrrrr.exe47⤵
- Executes dropped EXE
PID:3556 -
\??\c:\7btnbb.exec:\7btnbb.exe48⤵
- Executes dropped EXE
PID:1996 -
\??\c:\vpppp.exec:\vpppp.exe49⤵
- Executes dropped EXE
PID:2268 -
\??\c:\1djdj.exec:\1djdj.exe50⤵
- Executes dropped EXE
PID:3748 -
\??\c:\1nnhtb.exec:\1nnhtb.exe51⤵
- Executes dropped EXE
PID:3108 -
\??\c:\1djjd.exec:\1djjd.exe52⤵
- Executes dropped EXE
PID:1224 -
\??\c:\frxrffx.exec:\frxrffx.exe53⤵
- Executes dropped EXE
PID:2596 -
\??\c:\fxfxxxr.exec:\fxfxxxr.exe54⤵
- Executes dropped EXE
PID:4032 -
\??\c:\bnhbtb.exec:\bnhbtb.exe55⤵
- Executes dropped EXE
PID:2988 -
\??\c:\dpvvv.exec:\dpvvv.exe56⤵
- Executes dropped EXE
PID:4304 -
\??\c:\fxllllr.exec:\fxllllr.exe57⤵
- Executes dropped EXE
PID:1072 -
\??\c:\rrfxxxr.exec:\rrfxxxr.exe58⤵
- Executes dropped EXE
PID:3652 -
\??\c:\tnbtbb.exec:\tnbtbb.exe59⤵
- Executes dropped EXE
PID:4744 -
\??\c:\ppvpp.exec:\ppvpp.exe60⤵
- Executes dropped EXE
PID:752 -
\??\c:\9nttht.exec:\9nttht.exe61⤵
- Executes dropped EXE
PID:2816 -
\??\c:\pdjjj.exec:\pdjjj.exe62⤵
- Executes dropped EXE
PID:1136 -
\??\c:\vjppd.exec:\vjppd.exe63⤵
- Executes dropped EXE
PID:4568 -
\??\c:\llxrxxf.exec:\llxrxxf.exe64⤵
- Executes dropped EXE
PID:3744 -
\??\c:\htbttt.exec:\htbttt.exe65⤵
- Executes dropped EXE
PID:4988 -
\??\c:\jjddv.exec:\jjddv.exe66⤵PID:4340
-
\??\c:\lxrrflf.exec:\lxrrflf.exe67⤵PID:1548
-
\??\c:\ttthtb.exec:\ttthtb.exe68⤵PID:4004
-
\??\c:\jvppd.exec:\jvppd.exe69⤵PID:2028
-
\??\c:\7vvjd.exec:\7vvjd.exe70⤵PID:3080
-
\??\c:\hnbtnt.exec:\hnbtnt.exe71⤵PID:4584
-
\??\c:\5bnhnn.exec:\5bnhnn.exe72⤵PID:3436
-
\??\c:\pvpjp.exec:\pvpjp.exe73⤵PID:3972
-
\??\c:\xfrllrl.exec:\xfrllrl.exe74⤵PID:4984
-
\??\c:\tthhbb.exec:\tthhbb.exe75⤵
- System Location Discovery: System Language Discovery
PID:1864 -
\??\c:\1ddvv.exec:\1ddvv.exe76⤵
- System Location Discovery: System Language Discovery
PID:3716 -
\??\c:\fxxrllf.exec:\fxxrllf.exe77⤵PID:1840
-
\??\c:\frxrrxl.exec:\frxrrxl.exe78⤵PID:4416
-
\??\c:\hhnnnn.exec:\hhnnnn.exe79⤵
- System Location Discovery: System Language Discovery
PID:2700 -
\??\c:\pvvvp.exec:\pvvvp.exe80⤵PID:1192
-
\??\c:\1rfxrrr.exec:\1rfxrrr.exe81⤵PID:1948
-
\??\c:\bnbtbb.exec:\bnbtbb.exe82⤵PID:740
-
\??\c:\nnbbnn.exec:\nnbbnn.exe83⤵PID:2796
-
\??\c:\ddvdj.exec:\ddvdj.exe84⤵PID:948
-
\??\c:\xrxfrxr.exec:\xrxfrxr.exe85⤵PID:1912
-
\??\c:\bthhtt.exec:\bthhtt.exe86⤵PID:1976
-
\??\c:\9tnnbn.exec:\9tnnbn.exe87⤵
- System Location Discovery: System Language Discovery
PID:4572 -
\??\c:\3vvpp.exec:\3vvpp.exe88⤵PID:4680
-
\??\c:\ntnbbb.exec:\ntnbbb.exe89⤵PID:4812
-
\??\c:\vvdvp.exec:\vvdvp.exe90⤵PID:3420
-
\??\c:\flxrlfx.exec:\flxrlfx.exe91⤵PID:812
-
\??\c:\nnthhh.exec:\nnthhh.exe92⤵PID:3408
-
\??\c:\jvvjj.exec:\jvvjj.exe93⤵PID:2020
-
\??\c:\5fffxff.exec:\5fffxff.exe94⤵PID:2732
-
\??\c:\fxxxfff.exec:\fxxxfff.exe95⤵PID:4060
-
\??\c:\bbbbtb.exec:\bbbbtb.exe96⤵PID:2596
-
\??\c:\ppvvp.exec:\ppvvp.exe97⤵PID:3828
-
\??\c:\rrrfffl.exec:\rrrfffl.exe98⤵PID:2904
-
\??\c:\httbnt.exec:\httbnt.exe99⤵PID:3736
-
\??\c:\hnnntb.exec:\hnnntb.exe100⤵PID:3872
-
\??\c:\jpppp.exec:\jpppp.exe101⤵PID:1380
-
\??\c:\rrlxfrx.exec:\rrlxfrx.exe102⤵PID:436
-
\??\c:\hthhhh.exec:\hthhhh.exe103⤵PID:4956
-
\??\c:\ddddv.exec:\ddddv.exe104⤵PID:1056
-
\??\c:\3xlfrlf.exec:\3xlfrlf.exe105⤵PID:3744
-
\??\c:\3nbbtt.exec:\3nbbtt.exe106⤵PID:4988
-
\??\c:\thhbbb.exec:\thhbbb.exe107⤵PID:1844
-
\??\c:\pjjvv.exec:\pjjvv.exe108⤵PID:5000
-
\??\c:\3fffrrl.exec:\3fffrrl.exe109⤵PID:3068
-
\??\c:\btttnh.exec:\btttnh.exe110⤵PID:4048
-
\??\c:\vdjdj.exec:\vdjdj.exe111⤵PID:1700
-
\??\c:\jdvvj.exec:\jdvvj.exe112⤵PID:4584
-
\??\c:\frfxrxx.exec:\frfxrxx.exe113⤵PID:4104
-
\??\c:\9ntbtt.exec:\9ntbtt.exe114⤵PID:3972
-
\??\c:\ppdvp.exec:\ppdvp.exe115⤵PID:4984
-
\??\c:\ppvvp.exec:\ppvvp.exe116⤵PID:3120
-
\??\c:\rrxlflf.exec:\rrxlflf.exe117⤵PID:3220
-
\??\c:\hbhhtn.exec:\hbhhtn.exe118⤵PID:3008
-
\??\c:\pvjpj.exec:\pvjpj.exe119⤵PID:5048
-
\??\c:\ffrlllr.exec:\ffrlllr.exe120⤵PID:2724
-
\??\c:\nntnnn.exec:\nntnnn.exe121⤵PID:1192
-
\??\c:\ttbhbh.exec:\ttbhbh.exe122⤵PID:2524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-