Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d52e6a28da8050a2a9aaa7c1df6f5080N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
d52e6a28da8050a2a9aaa7c1df6f5080N.exe
-
Size
592KB
-
MD5
d52e6a28da8050a2a9aaa7c1df6f5080
-
SHA1
e2734c62abe5f27d6a9f57ba720a47f6cd1a9056
-
SHA256
90b504c2aed3515b5d57e6adc34a2b917f5a44fdb27763dee23ea2388609e7fb
-
SHA512
6c9f1b61d08df11ffda05d5931eb7664858b6f0c1479d7acde1d6fd0e3410ef4669530bccbb9919a18fecf9002ee18e3e5dcdbdb554a4f96bcde4edab1826f07
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayLn:n3C9Lebz+xt4vFeFmgayj
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4744-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4420-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4844-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2900-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3328-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3856-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1760-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2668-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4772-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3128-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4204-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3896-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2392-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2320-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3620-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4588-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/964-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1520-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2244-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4316-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4420 7bhbbb.exe 3856 3pjvj.exe 4844 9lfrfxl.exe 3328 xxfxlfx.exe 2900 3djdv.exe 2668 pjpdd.exe 1760 xlxrfxr.exe 4316 tbthbt.exe 112 djpdv.exe 2176 lffxllx.exe 840 9bhbhh.exe 1184 jvjdv.exe 2244 rrfxffl.exe 4472 thnhtn.exe 1520 vpdvp.exe 964 lxxlxff.exe 2716 5ttnbb.exe 4588 jpddp.exe 3620 flffxfl.exe 3972 thhtnh.exe 2320 9xrlxrl.exe 2392 3tbnhh.exe 2192 jdvpj.exe 3896 lxrlffx.exe 2960 nthbnh.exe 1684 vvddj.exe 4204 rllrllf.exe 3128 3nbnhb.exe 4044 vppjv.exe 4772 9jddp.exe 3732 xffxxxr.exe 5024 5nthtt.exe 1624 jdpjp.exe 1800 djpjd.exe 804 5rrfxxl.exe 1912 7tbtnb.exe 1172 1vdpv.exe 3256 lxrrlfx.exe 2360 1llfrrf.exe 1620 hntnbt.exe 4584 pppjp.exe 2344 xflfxxr.exe 2776 xfxrlfx.exe 920 1tnhtt.exe 3304 jdvpp.exe 1648 3xfxllx.exe 688 7xfrxrr.exe 3908 3bbthh.exe 4712 vddpj.exe 4616 xfrfxrl.exe 4684 lffrlfx.exe 4376 thbnbn.exe 2388 dvdpj.exe 4620 pjpjd.exe 3052 3llxrrl.exe 2644 nnnnht.exe 1652 7pvjj.exe 5080 jpvpj.exe 4988 fxxrrlr.exe 2900 hbbnhh.exe 1168 vvdpj.exe 1136 jdjvj.exe 396 rlxlrrf.exe 3488 bnnhbt.exe -
resource yara_rule behavioral2/memory/4744-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4420-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4744-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4844-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2900-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3328-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3856-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1760-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2668-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4772-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3128-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4204-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3896-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2392-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2320-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3620-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/964-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1520-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2244-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4316-59-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7htnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhthbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fxxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrllfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lrlfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fxlffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4420 4744 d52e6a28da8050a2a9aaa7c1df6f5080N.exe 84 PID 4744 wrote to memory of 4420 4744 d52e6a28da8050a2a9aaa7c1df6f5080N.exe 84 PID 4744 wrote to memory of 4420 4744 d52e6a28da8050a2a9aaa7c1df6f5080N.exe 84 PID 4420 wrote to memory of 3856 4420 7bhbbb.exe 85 PID 4420 wrote to memory of 3856 4420 7bhbbb.exe 85 PID 4420 wrote to memory of 3856 4420 7bhbbb.exe 85 PID 3856 wrote to memory of 4844 3856 3pjvj.exe 86 PID 3856 wrote to memory of 4844 3856 3pjvj.exe 86 PID 3856 wrote to memory of 4844 3856 3pjvj.exe 86 PID 4844 wrote to memory of 3328 4844 9lfrfxl.exe 87 PID 4844 wrote to memory of 3328 4844 9lfrfxl.exe 87 PID 4844 wrote to memory of 3328 4844 9lfrfxl.exe 87 PID 3328 wrote to memory of 2900 3328 xxfxlfx.exe 143 PID 3328 wrote to memory of 2900 3328 xxfxlfx.exe 143 PID 3328 wrote to memory of 2900 3328 xxfxlfx.exe 143 PID 2900 wrote to memory of 2668 2900 3djdv.exe 89 PID 2900 wrote to memory of 2668 2900 3djdv.exe 89 PID 2900 wrote to memory of 2668 2900 3djdv.exe 89 PID 2668 wrote to memory of 1760 2668 pjpdd.exe 90 PID 2668 wrote to memory of 1760 2668 pjpdd.exe 90 PID 2668 wrote to memory of 1760 2668 pjpdd.exe 90 PID 1760 wrote to memory of 4316 1760 xlxrfxr.exe 91 PID 1760 wrote to memory of 4316 1760 xlxrfxr.exe 91 PID 1760 wrote to memory of 4316 1760 xlxrfxr.exe 91 PID 4316 wrote to memory of 112 4316 tbthbt.exe 92 PID 4316 wrote to memory of 112 4316 tbthbt.exe 92 PID 4316 wrote to memory of 112 4316 tbthbt.exe 92 PID 112 wrote to memory of 2176 112 djpdv.exe 93 PID 112 wrote to memory of 2176 112 djpdv.exe 93 PID 112 wrote to memory of 2176 112 djpdv.exe 93 PID 2176 wrote to memory of 840 2176 lffxllx.exe 94 PID 2176 wrote to memory of 840 2176 lffxllx.exe 94 PID 2176 wrote to memory of 840 2176 lffxllx.exe 94 PID 840 wrote to memory of 1184 840 9bhbhh.exe 95 PID 840 wrote to memory of 1184 840 9bhbhh.exe 95 PID 840 wrote to memory of 1184 840 9bhbhh.exe 95 PID 1184 wrote to memory of 2244 1184 jvjdv.exe 96 PID 1184 wrote to memory of 2244 1184 jvjdv.exe 96 PID 1184 wrote to memory of 2244 1184 jvjdv.exe 96 PID 2244 wrote to memory of 4472 2244 rrfxffl.exe 97 PID 2244 wrote to memory of 4472 2244 rrfxffl.exe 97 PID 2244 wrote to memory of 4472 2244 rrfxffl.exe 97 PID 4472 wrote to memory of 1520 4472 thnhtn.exe 98 PID 4472 wrote to memory of 1520 4472 thnhtn.exe 98 PID 4472 wrote to memory of 1520 4472 thnhtn.exe 98 PID 1520 wrote to memory of 964 1520 vpdvp.exe 99 PID 1520 wrote to memory of 964 1520 vpdvp.exe 99 PID 1520 wrote to memory of 964 1520 vpdvp.exe 99 PID 964 wrote to memory of 2716 964 lxxlxff.exe 100 PID 964 wrote to memory of 2716 964 lxxlxff.exe 100 PID 964 wrote to memory of 2716 964 lxxlxff.exe 100 PID 2716 wrote to memory of 4588 2716 5ttnbb.exe 101 PID 2716 wrote to memory of 4588 2716 5ttnbb.exe 101 PID 2716 wrote to memory of 4588 2716 5ttnbb.exe 101 PID 4588 wrote to memory of 3620 4588 jpddp.exe 102 PID 4588 wrote to memory of 3620 4588 jpddp.exe 102 PID 4588 wrote to memory of 3620 4588 jpddp.exe 102 PID 3620 wrote to memory of 3972 3620 flffxfl.exe 103 PID 3620 wrote to memory of 3972 3620 flffxfl.exe 103 PID 3620 wrote to memory of 3972 3620 flffxfl.exe 103 PID 3972 wrote to memory of 2320 3972 thhtnh.exe 104 PID 3972 wrote to memory of 2320 3972 thhtnh.exe 104 PID 3972 wrote to memory of 2320 3972 thhtnh.exe 104 PID 2320 wrote to memory of 2392 2320 9xrlxrl.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d52e6a28da8050a2a9aaa7c1df6f5080N.exe"C:\Users\Admin\AppData\Local\Temp\d52e6a28da8050a2a9aaa7c1df6f5080N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\7bhbbb.exec:\7bhbbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
\??\c:\3pjvj.exec:\3pjvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\9lfrfxl.exec:\9lfrfxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\xxfxlfx.exec:\xxfxlfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
\??\c:\3djdv.exec:\3djdv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\pjpdd.exec:\pjpdd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\xlxrfxr.exec:\xlxrfxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\tbthbt.exec:\tbthbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\djpdv.exec:\djpdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\lffxllx.exec:\lffxllx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\9bhbhh.exec:\9bhbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\jvjdv.exec:\jvjdv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\rrfxffl.exec:\rrfxffl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\thnhtn.exec:\thnhtn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\vpdvp.exec:\vpdvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\lxxlxff.exec:\lxxlxff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\5ttnbb.exec:\5ttnbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\jpddp.exec:\jpddp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\flffxfl.exec:\flffxfl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
\??\c:\thhtnh.exec:\thhtnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\9xrlxrl.exec:\9xrlxrl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\3tbnhh.exec:\3tbnhh.exe23⤵
- Executes dropped EXE
PID:2392 -
\??\c:\jdvpj.exec:\jdvpj.exe24⤵
- Executes dropped EXE
PID:2192 -
\??\c:\lxrlffx.exec:\lxrlffx.exe25⤵
- Executes dropped EXE
PID:3896 -
\??\c:\nthbnh.exec:\nthbnh.exe26⤵
- Executes dropped EXE
PID:2960 -
\??\c:\vvddj.exec:\vvddj.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684 -
\??\c:\rllrllf.exec:\rllrllf.exe28⤵
- Executes dropped EXE
PID:4204 -
\??\c:\3nbnhb.exec:\3nbnhb.exe29⤵
- Executes dropped EXE
PID:3128 -
\??\c:\vppjv.exec:\vppjv.exe30⤵
- Executes dropped EXE
PID:4044 -
\??\c:\9jddp.exec:\9jddp.exe31⤵
- Executes dropped EXE
PID:4772 -
\??\c:\xffxxxr.exec:\xffxxxr.exe32⤵
- Executes dropped EXE
PID:3732 -
\??\c:\5nthtt.exec:\5nthtt.exe33⤵
- Executes dropped EXE
PID:5024 -
\??\c:\jdpjp.exec:\jdpjp.exe34⤵
- Executes dropped EXE
PID:1624 -
\??\c:\djpjd.exec:\djpjd.exe35⤵
- Executes dropped EXE
PID:1800 -
\??\c:\5rrfxxl.exec:\5rrfxxl.exe36⤵
- Executes dropped EXE
PID:804 -
\??\c:\7tbtnb.exec:\7tbtnb.exe37⤵
- Executes dropped EXE
PID:1912 -
\??\c:\1vdpv.exec:\1vdpv.exe38⤵
- Executes dropped EXE
PID:1172 -
\??\c:\lxrrlfx.exec:\lxrrlfx.exe39⤵
- Executes dropped EXE
PID:3256 -
\??\c:\1llfrrf.exec:\1llfrrf.exe40⤵
- Executes dropped EXE
PID:2360 -
\??\c:\hntnbt.exec:\hntnbt.exe41⤵
- Executes dropped EXE
PID:1620 -
\??\c:\pppjp.exec:\pppjp.exe42⤵
- Executes dropped EXE
PID:4584 -
\??\c:\xflfxxr.exec:\xflfxxr.exe43⤵
- Executes dropped EXE
PID:2344 -
\??\c:\xfxrlfx.exec:\xfxrlfx.exe44⤵
- Executes dropped EXE
PID:2776 -
\??\c:\1tnhtt.exec:\1tnhtt.exe45⤵
- Executes dropped EXE
PID:920 -
\??\c:\jdvpp.exec:\jdvpp.exe46⤵
- Executes dropped EXE
PID:3304 -
\??\c:\3xfxllx.exec:\3xfxllx.exe47⤵
- Executes dropped EXE
PID:1648 -
\??\c:\7xfrxrr.exec:\7xfrxrr.exe48⤵
- Executes dropped EXE
PID:688 -
\??\c:\3bbthh.exec:\3bbthh.exe49⤵
- Executes dropped EXE
PID:3908 -
\??\c:\vddpj.exec:\vddpj.exe50⤵
- Executes dropped EXE
PID:4712 -
\??\c:\xfrfxrl.exec:\xfrfxrl.exe51⤵
- Executes dropped EXE
PID:4616 -
\??\c:\lffrlfx.exec:\lffrlfx.exe52⤵
- Executes dropped EXE
PID:4684 -
\??\c:\thbnbn.exec:\thbnbn.exe53⤵
- Executes dropped EXE
PID:4376 -
\??\c:\dvdpj.exec:\dvdpj.exe54⤵
- Executes dropped EXE
PID:2388 -
\??\c:\pjpjd.exec:\pjpjd.exe55⤵
- Executes dropped EXE
PID:4620 -
\??\c:\3llxrrl.exec:\3llxrrl.exe56⤵
- Executes dropped EXE
PID:3052 -
\??\c:\nnnnht.exec:\nnnnht.exe57⤵
- Executes dropped EXE
PID:2644 -
\??\c:\7pvjj.exec:\7pvjj.exe58⤵
- Executes dropped EXE
PID:1652 -
\??\c:\jpvpj.exec:\jpvpj.exe59⤵
- Executes dropped EXE
PID:5080 -
\??\c:\fxxrrlr.exec:\fxxrrlr.exe60⤵
- Executes dropped EXE
PID:4988 -
\??\c:\hbbnhh.exec:\hbbnhh.exe61⤵
- Executes dropped EXE
PID:2900 -
\??\c:\vvdpj.exec:\vvdpj.exe62⤵
- Executes dropped EXE
PID:1168 -
\??\c:\jdjvj.exec:\jdjvj.exe63⤵
- Executes dropped EXE
PID:1136 -
\??\c:\rlxlrrf.exec:\rlxlrrf.exe64⤵
- Executes dropped EXE
PID:396 -
\??\c:\bnnhbt.exec:\bnnhbt.exe65⤵
- Executes dropped EXE
PID:3488 -
\??\c:\djpdv.exec:\djpdv.exe66⤵PID:1680
-
\??\c:\pjjjv.exec:\pjjjv.exe67⤵PID:2432
-
\??\c:\xllfxrx.exec:\xllfxrx.exe68⤵PID:2972
-
\??\c:\tnhbnh.exec:\tnhbnh.exe69⤵PID:220
-
\??\c:\5rlfxxl.exec:\5rlfxxl.exe70⤵PID:1876
-
\??\c:\bbbbbh.exec:\bbbbbh.exe71⤵PID:1376
-
\??\c:\9jjdv.exec:\9jjdv.exe72⤵PID:2620
-
\??\c:\ffxrlfx.exec:\ffxrlfx.exe73⤵PID:828
-
\??\c:\bthbhb.exec:\bthbhb.exe74⤵PID:2896
-
\??\c:\9jdvp.exec:\9jdvp.exe75⤵PID:1672
-
\??\c:\lrrlfff.exec:\lrrlfff.exe76⤵PID:2520
-
\??\c:\bhthbn.exec:\bhthbn.exe77⤵PID:444
-
\??\c:\vdjdd.exec:\vdjdd.exe78⤵PID:4100
-
\??\c:\frrfrlf.exec:\frrfrlf.exe79⤵PID:5068
-
\??\c:\hthbnn.exec:\hthbnn.exe80⤵PID:1352
-
\??\c:\7vpjv.exec:\7vpjv.exe81⤵PID:2688
-
\??\c:\3ffxfxl.exec:\3ffxfxl.exe82⤵PID:2932
-
\??\c:\9xxrlll.exec:\9xxrlll.exe83⤵PID:5024
-
\??\c:\thhbnn.exec:\thhbnn.exe84⤵PID:4624
-
\??\c:\pvddp.exec:\pvddp.exe85⤵PID:2748
-
\??\c:\lxrlffx.exec:\lxrlffx.exe86⤵PID:1172
-
\??\c:\rfxlffr.exec:\rfxlffr.exe87⤵PID:3256
-
\??\c:\thhbnh.exec:\thhbnh.exe88⤵PID:912
-
\??\c:\jvjvj.exec:\jvjvj.exe89⤵PID:4628
-
\??\c:\lrxrlfx.exec:\lrxrlfx.exe90⤵PID:448
-
\??\c:\5lflxxx.exec:\5lflxxx.exe91⤵PID:4828
-
\??\c:\7tthhh.exec:\7tthhh.exe92⤵PID:1720
-
\??\c:\jppjv.exec:\jppjv.exe93⤵PID:1824
-
\??\c:\xlrffxl.exec:\xlrffxl.exe94⤵PID:3304
-
\??\c:\thtnhb.exec:\thtnhb.exe95⤵PID:688
-
\??\c:\ddjpp.exec:\ddjpp.exe96⤵PID:4532
-
\??\c:\hbbthb.exec:\hbbthb.exe97⤵PID:5032
-
\??\c:\vpjpd.exec:\vpjpd.exe98⤵PID:452
-
\??\c:\lllxrlx.exec:\lllxrlx.exe99⤵PID:4364
-
\??\c:\nbhbtn.exec:\nbhbtn.exe100⤵PID:3536
-
\??\c:\pvdpj.exec:\pvdpj.exe101⤵PID:2388
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe102⤵PID:548
-
\??\c:\ttthbt.exec:\ttthbt.exe103⤵PID:620
-
\??\c:\nnnhbt.exec:\nnnhbt.exe104⤵PID:4444
-
\??\c:\vdjvp.exec:\vdjvp.exe105⤵PID:3892
-
\??\c:\9xxlfxr.exec:\9xxlfxr.exe106⤵PID:4744
-
\??\c:\bnnhtn.exec:\bnnhtn.exe107⤵PID:1200
-
\??\c:\1hbthb.exec:\1hbthb.exe108⤵PID:3796
-
\??\c:\pddvd.exec:\pddvd.exe109⤵PID:4988
-
\??\c:\fxrfrrf.exec:\fxrfrrf.exe110⤵PID:2832
-
\??\c:\btnhhb.exec:\btnhhb.exe111⤵PID:992
-
\??\c:\vvdpj.exec:\vvdpj.exe112⤵
- System Location Discovery: System Language Discovery
PID:1708 -
\??\c:\dvjdp.exec:\dvjdp.exe113⤵PID:4452
-
\??\c:\xllxfxr.exec:\xllxfxr.exe114⤵PID:3208
-
\??\c:\thhhbt.exec:\thhhbt.exe115⤵PID:4544
-
\??\c:\vjdpj.exec:\vjdpj.exe116⤵
- System Location Discovery: System Language Discovery
PID:2380 -
\??\c:\pjdvv.exec:\pjdvv.exe117⤵PID:1444
-
\??\c:\rxllfll.exec:\rxllfll.exe118⤵PID:4392
-
\??\c:\httnbb.exec:\httnbb.exe119⤵PID:3660
-
\??\c:\5pvpv.exec:\5pvpv.exe120⤵PID:1184
-
\??\c:\lflfrlr.exec:\lflfrlr.exe121⤵PID:1520
-
\??\c:\3rfxrll.exec:\3rfxrll.exe122⤵PID:1876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-