Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 04:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe
-
Size
105KB
-
MD5
f0f374ee51e06c88b1bd95674ed640b0
-
SHA1
a5f9becfc10b3bbae313d9fcb638424a66f97b83
-
SHA256
9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652a
-
SHA512
30c5d5dd92f3b5393ecf567fa5f531e536891580afa25bf57f249cdf0b3c7c7971a2d447624631c287d001623cc5f90aff2b284bac4dc76125951b01f972648d
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KVT+buwUGu3P3Cmr:n3C9BRo7MlrWKVT+buBGu3PHr
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/3684-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3684-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2168-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4892-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1776-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3796-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4984-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4984-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1312-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4800-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/672-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/100-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1480-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2260-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/228-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4816-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3752-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2364-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4544-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1700-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1496-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2168 rxfrfxr.exe 4892 9ntthb.exe 1776 jvdpp.exe 3796 xrrfxrl.exe 4984 bthntt.exe 1312 1pjdp.exe 4800 rfxxfrl.exe 672 htnhtn.exe 100 thbthb.exe 1480 pvvjv.exe 2260 3rlfrlr.exe 4420 bbbtbt.exe 2764 thbtnn.exe 228 vpppv.exe 4816 xlfxfxr.exe 3800 1nnbtn.exe 3424 vjvpv.exe 4548 hbbhhh.exe 3752 bhbnbb.exe 1176 1pdvp.exe 2364 frlxlrl.exe 4544 tbbnnh.exe 4504 vpjdv.exe 2508 rflffxx.exe 1700 bntnhh.exe 1496 1jpjd.exe 4536 lxlfxrl.exe 4612 xllrrxf.exe 4664 hnnhtn.exe 3792 pjjvp.exe 3180 frrrxfl.exe 64 bhbthb.exe 4596 vvdvj.exe 692 xllxxrl.exe 1800 9ffxrrl.exe 980 thnhhb.exe 3100 vdddd.exe 3008 ppvpd.exe 4832 9fxrrrl.exe 1208 3hhtnn.exe 4320 httnbb.exe 728 ppvvd.exe 1216 3rrrrrl.exe 1256 7xffxrr.exe 1916 3nbttn.exe 3976 hthnbh.exe 2740 jdjvp.exe 2496 lxxfxff.exe 4956 5lffxxf.exe 896 3btnnb.exe 2172 vpdvd.exe 2168 pdjdj.exe 4752 frfxxxf.exe 1848 ttbnbh.exe 1776 pvpvd.exe 3864 jjjdv.exe 4296 ffxrlff.exe 3452 xflfxrl.exe 408 frrlfrl.exe 4220 nbbthn.exe 3020 dpvpd.exe 1272 ddddv.exe 1652 lfxlxxr.exe 1500 5xlfxxr.exe -
resource yara_rule behavioral2/memory/3684-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3684-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2168-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4892-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1776-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1312-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4800-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/672-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/100-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/100-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/100-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1480-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2260-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4816-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3752-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4544-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1700-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1496-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htntht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbthbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxflrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3684 wrote to memory of 2168 3684 9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe 82 PID 3684 wrote to memory of 2168 3684 9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe 82 PID 3684 wrote to memory of 2168 3684 9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe 82 PID 2168 wrote to memory of 4892 2168 rxfrfxr.exe 83 PID 2168 wrote to memory of 4892 2168 rxfrfxr.exe 83 PID 2168 wrote to memory of 4892 2168 rxfrfxr.exe 83 PID 4892 wrote to memory of 1776 4892 9ntthb.exe 84 PID 4892 wrote to memory of 1776 4892 9ntthb.exe 84 PID 4892 wrote to memory of 1776 4892 9ntthb.exe 84 PID 1776 wrote to memory of 3796 1776 jvdpp.exe 85 PID 1776 wrote to memory of 3796 1776 jvdpp.exe 85 PID 1776 wrote to memory of 3796 1776 jvdpp.exe 85 PID 3796 wrote to memory of 4984 3796 xrrfxrl.exe 86 PID 3796 wrote to memory of 4984 3796 xrrfxrl.exe 86 PID 3796 wrote to memory of 4984 3796 xrrfxrl.exe 86 PID 4984 wrote to memory of 1312 4984 bthntt.exe 87 PID 4984 wrote to memory of 1312 4984 bthntt.exe 87 PID 4984 wrote to memory of 1312 4984 bthntt.exe 87 PID 1312 wrote to memory of 4800 1312 1pjdp.exe 88 PID 1312 wrote to memory of 4800 1312 1pjdp.exe 88 PID 1312 wrote to memory of 4800 1312 1pjdp.exe 88 PID 4800 wrote to memory of 672 4800 rfxxfrl.exe 89 PID 4800 wrote to memory of 672 4800 rfxxfrl.exe 89 PID 4800 wrote to memory of 672 4800 rfxxfrl.exe 89 PID 672 wrote to memory of 100 672 htnhtn.exe 90 PID 672 wrote to memory of 100 672 htnhtn.exe 90 PID 672 wrote to memory of 100 672 htnhtn.exe 90 PID 100 wrote to memory of 1480 100 thbthb.exe 91 PID 100 wrote to memory of 1480 100 thbthb.exe 91 PID 100 wrote to memory of 1480 100 thbthb.exe 91 PID 1480 wrote to memory of 2260 1480 pvvjv.exe 92 PID 1480 wrote to memory of 2260 1480 pvvjv.exe 92 PID 1480 wrote to memory of 2260 1480 pvvjv.exe 92 PID 2260 wrote to memory of 4420 2260 3rlfrlr.exe 93 PID 2260 wrote to memory of 4420 2260 3rlfrlr.exe 93 PID 2260 wrote to memory of 4420 2260 3rlfrlr.exe 93 PID 4420 wrote to memory of 2764 4420 bbbtbt.exe 94 PID 4420 wrote to memory of 2764 4420 bbbtbt.exe 94 PID 4420 wrote to memory of 2764 4420 bbbtbt.exe 94 PID 2764 wrote to memory of 228 2764 thbtnn.exe 95 PID 2764 wrote to memory of 228 2764 thbtnn.exe 95 PID 2764 wrote to memory of 228 2764 thbtnn.exe 95 PID 228 wrote to memory of 4816 228 vpppv.exe 96 PID 228 wrote to memory of 4816 228 vpppv.exe 96 PID 228 wrote to memory of 4816 228 vpppv.exe 96 PID 4816 wrote to memory of 3800 4816 xlfxfxr.exe 97 PID 4816 wrote to memory of 3800 4816 xlfxfxr.exe 97 PID 4816 wrote to memory of 3800 4816 xlfxfxr.exe 97 PID 3800 wrote to memory of 3424 3800 1nnbtn.exe 98 PID 3800 wrote to memory of 3424 3800 1nnbtn.exe 98 PID 3800 wrote to memory of 3424 3800 1nnbtn.exe 98 PID 3424 wrote to memory of 4548 3424 vjvpv.exe 99 PID 3424 wrote to memory of 4548 3424 vjvpv.exe 99 PID 3424 wrote to memory of 4548 3424 vjvpv.exe 99 PID 4548 wrote to memory of 3752 4548 hbbhhh.exe 100 PID 4548 wrote to memory of 3752 4548 hbbhhh.exe 100 PID 4548 wrote to memory of 3752 4548 hbbhhh.exe 100 PID 3752 wrote to memory of 1176 3752 bhbnbb.exe 101 PID 3752 wrote to memory of 1176 3752 bhbnbb.exe 101 PID 3752 wrote to memory of 1176 3752 bhbnbb.exe 101 PID 1176 wrote to memory of 2364 1176 1pdvp.exe 102 PID 1176 wrote to memory of 2364 1176 1pdvp.exe 102 PID 1176 wrote to memory of 2364 1176 1pdvp.exe 102 PID 2364 wrote to memory of 4544 2364 frlxlrl.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe"C:\Users\Admin\AppData\Local\Temp\9f7bb2559f60a39c715fe616b76ce05ec58b23db74609343ec39157b2cad652aN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
\??\c:\rxfrfxr.exec:\rxfrfxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\9ntthb.exec:\9ntthb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\jvdpp.exec:\jvdpp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\xrrfxrl.exec:\xrrfxrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\bthntt.exec:\bthntt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\1pjdp.exec:\1pjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\rfxxfrl.exec:\rfxxfrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\htnhtn.exec:\htnhtn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\thbthb.exec:\thbthb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
\??\c:\pvvjv.exec:\pvvjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
\??\c:\3rlfrlr.exec:\3rlfrlr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\bbbtbt.exec:\bbbtbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
\??\c:\thbtnn.exec:\thbtnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\vpppv.exec:\vpppv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
\??\c:\xlfxfxr.exec:\xlfxfxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
\??\c:\1nnbtn.exec:\1nnbtn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
\??\c:\vjvpv.exec:\vjvpv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
\??\c:\hbbhhh.exec:\hbbhhh.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\bhbnbb.exec:\bhbnbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
\??\c:\1pdvp.exec:\1pdvp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\frlxlrl.exec:\frlxlrl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\tbbnnh.exec:\tbbnnh.exe23⤵
- Executes dropped EXE
PID:4544 -
\??\c:\vpjdv.exec:\vpjdv.exe24⤵
- Executes dropped EXE
PID:4504 -
\??\c:\rflffxx.exec:\rflffxx.exe25⤵
- Executes dropped EXE
PID:2508 -
\??\c:\bntnhh.exec:\bntnhh.exe26⤵
- Executes dropped EXE
PID:1700 -
\??\c:\1jpjd.exec:\1jpjd.exe27⤵
- Executes dropped EXE
PID:1496 -
\??\c:\lxlfxrl.exec:\lxlfxrl.exe28⤵
- Executes dropped EXE
PID:4536 -
\??\c:\xllrrxf.exec:\xllrrxf.exe29⤵
- Executes dropped EXE
PID:4612 -
\??\c:\hnnhtn.exec:\hnnhtn.exe30⤵
- Executes dropped EXE
PID:4664 -
\??\c:\pjjvp.exec:\pjjvp.exe31⤵
- Executes dropped EXE
PID:3792 -
\??\c:\frrrxfl.exec:\frrrxfl.exe32⤵
- Executes dropped EXE
PID:3180 -
\??\c:\bhbthb.exec:\bhbthb.exe33⤵
- Executes dropped EXE
PID:64 -
\??\c:\vvdvj.exec:\vvdvj.exe34⤵
- Executes dropped EXE
PID:4596 -
\??\c:\xllxxrl.exec:\xllxxrl.exe35⤵
- Executes dropped EXE
PID:692 -
\??\c:\9ffxrrl.exec:\9ffxrrl.exe36⤵
- Executes dropped EXE
PID:1800 -
\??\c:\thnhhb.exec:\thnhhb.exe37⤵
- Executes dropped EXE
PID:980 -
\??\c:\vdddd.exec:\vdddd.exe38⤵
- Executes dropped EXE
PID:3100 -
\??\c:\ppvpd.exec:\ppvpd.exe39⤵
- Executes dropped EXE
PID:3008 -
\??\c:\9fxrrrl.exec:\9fxrrrl.exe40⤵
- Executes dropped EXE
PID:4832 -
\??\c:\3hhtnn.exec:\3hhtnn.exe41⤵
- Executes dropped EXE
PID:1208 -
\??\c:\httnbb.exec:\httnbb.exe42⤵
- Executes dropped EXE
PID:4320 -
\??\c:\ppvvd.exec:\ppvvd.exe43⤵
- Executes dropped EXE
PID:728 -
\??\c:\3rrrrrl.exec:\3rrrrrl.exe44⤵
- Executes dropped EXE
PID:1216 -
\??\c:\7xffxrr.exec:\7xffxrr.exe45⤵
- Executes dropped EXE
PID:1256 -
\??\c:\3nbttn.exec:\3nbttn.exe46⤵
- Executes dropped EXE
PID:1916 -
\??\c:\hthnbh.exec:\hthnbh.exe47⤵
- Executes dropped EXE
PID:3976 -
\??\c:\jdjvp.exec:\jdjvp.exe48⤵
- Executes dropped EXE
PID:2740 -
\??\c:\lxxfxff.exec:\lxxfxff.exe49⤵
- Executes dropped EXE
PID:2496 -
\??\c:\5lffxxf.exec:\5lffxxf.exe50⤵
- Executes dropped EXE
PID:4956 -
\??\c:\3btnnb.exec:\3btnnb.exe51⤵
- Executes dropped EXE
PID:896 -
\??\c:\vpdvd.exec:\vpdvd.exe52⤵
- Executes dropped EXE
PID:2172 -
\??\c:\pdjdj.exec:\pdjdj.exe53⤵
- Executes dropped EXE
PID:2168 -
\??\c:\frfxxxf.exec:\frfxxxf.exe54⤵
- Executes dropped EXE
PID:4752 -
\??\c:\ttbnbh.exec:\ttbnbh.exe55⤵
- Executes dropped EXE
PID:1848 -
\??\c:\pvpvd.exec:\pvpvd.exe56⤵
- Executes dropped EXE
PID:1776 -
\??\c:\jjjdv.exec:\jjjdv.exe57⤵
- Executes dropped EXE
PID:3864 -
\??\c:\ffxrlff.exec:\ffxrlff.exe58⤵
- Executes dropped EXE
PID:4296 -
\??\c:\xflfxrl.exec:\xflfxrl.exe59⤵
- Executes dropped EXE
PID:3452 -
\??\c:\frrlfrl.exec:\frrlfrl.exe60⤵
- Executes dropped EXE
PID:408 -
\??\c:\nbbthn.exec:\nbbthn.exe61⤵
- Executes dropped EXE
PID:4220 -
\??\c:\dpvpd.exec:\dpvpd.exe62⤵
- Executes dropped EXE
PID:3020 -
\??\c:\ddddv.exec:\ddddv.exe63⤵
- Executes dropped EXE
PID:1272 -
\??\c:\lfxlxxr.exec:\lfxlxxr.exe64⤵
- Executes dropped EXE
PID:1652 -
\??\c:\5xlfxxr.exec:\5xlfxxr.exe65⤵
- Executes dropped EXE
PID:1500 -
\??\c:\nbbhtb.exec:\nbbhtb.exe66⤵PID:2596
-
\??\c:\pddjj.exec:\pddjj.exe67⤵PID:4136
-
\??\c:\jvvpj.exec:\jvvpj.exe68⤵PID:3060
-
\??\c:\jvpjd.exec:\jvpjd.exe69⤵PID:3108
-
\??\c:\fxlfrrr.exec:\fxlfrrr.exe70⤵PID:2216
-
\??\c:\nbtnhh.exec:\nbtnhh.exe71⤵PID:560
-
\??\c:\hthttt.exec:\hthttt.exe72⤵PID:4016
-
\??\c:\jvdvp.exec:\jvdvp.exe73⤵PID:5044
-
\??\c:\7dddp.exec:\7dddp.exe74⤵PID:2140
-
\??\c:\fxfrfrx.exec:\fxfrfrx.exe75⤵PID:1180
-
\??\c:\vjjjd.exec:\vjjjd.exe76⤵PID:1376
-
\??\c:\flrlxfr.exec:\flrlxfr.exe77⤵PID:3824
-
\??\c:\flllllf.exec:\flllllf.exe78⤵PID:4916
-
\??\c:\3nhhtt.exec:\3nhhtt.exe79⤵PID:1984
-
\??\c:\nnnhbn.exec:\nnnhbn.exe80⤵PID:4512
-
\??\c:\5vpjd.exec:\5vpjd.exe81⤵PID:1576
-
\??\c:\dpjdp.exec:\dpjdp.exe82⤵PID:3956
-
\??\c:\lrrxxff.exec:\lrrxxff.exe83⤵PID:4856
-
\??\c:\xfxllrf.exec:\xfxllrf.exe84⤵PID:4872
-
\??\c:\hbtnhh.exec:\hbtnhh.exe85⤵PID:4520
-
\??\c:\pjpvd.exec:\pjpvd.exe86⤵PID:2200
-
\??\c:\dddvp.exec:\dddvp.exe87⤵PID:4572
-
\??\c:\xrflfff.exec:\xrflfff.exe88⤵PID:4928
-
\??\c:\frlrllf.exec:\frlrllf.exe89⤵PID:400
-
\??\c:\thntnn.exec:\thntnn.exe90⤵PID:4612
-
\??\c:\ppvpj.exec:\ppvpj.exe91⤵PID:3436
-
\??\c:\lffxxxx.exec:\lffxxxx.exe92⤵PID:4360
-
\??\c:\9rxrxxf.exec:\9rxrxxf.exe93⤵PID:3792
-
\??\c:\frxxfff.exec:\frxxfff.exe94⤵PID:536
-
\??\c:\nhbbbb.exec:\nhbbbb.exe95⤵PID:828
-
\??\c:\htbtbn.exec:\htbtbn.exe96⤵PID:1016
-
\??\c:\3pdvj.exec:\3pdvj.exe97⤵PID:1064
-
\??\c:\vpvjj.exec:\vpvjj.exe98⤵PID:1912
-
\??\c:\llfrffx.exec:\llfrffx.exe99⤵PID:872
-
\??\c:\ffxrrlx.exec:\ffxrrlx.exe100⤵PID:5052
-
\??\c:\tbnnhh.exec:\tbnnhh.exe101⤵PID:2560
-
\??\c:\httbtt.exec:\httbtt.exe102⤵PID:4656
-
\??\c:\pdvjp.exec:\pdvjp.exe103⤵PID:2156
-
\??\c:\jvdvp.exec:\jvdvp.exe104⤵PID:5056
-
\??\c:\lfxfxxr.exec:\lfxfxxr.exe105⤵PID:2996
-
\??\c:\bhtbtt.exec:\bhtbtt.exe106⤵PID:3524
-
\??\c:\ntbthh.exec:\ntbthh.exe107⤵PID:4356
-
\??\c:\htntht.exec:\htntht.exe108⤵
- System Location Discovery: System Language Discovery
PID:2460 -
\??\c:\pppjd.exec:\pppjd.exe109⤵PID:4468
-
\??\c:\lfxrllf.exec:\lfxrllf.exe110⤵PID:4796
-
\??\c:\lrrxrrl.exec:\lrrxrrl.exe111⤵PID:4448
-
\??\c:\3hbbbb.exec:\3hbbbb.exe112⤵PID:924
-
\??\c:\hbbbtt.exec:\hbbbtt.exe113⤵PID:2264
-
\??\c:\5dvpd.exec:\5dvpd.exe114⤵PID:2948
-
\??\c:\dvdvv.exec:\dvdvv.exe115⤵PID:2660
-
\??\c:\3fxrllf.exec:\3fxrllf.exe116⤵PID:3588
-
\??\c:\xllfxfl.exec:\xllfxfl.exe117⤵PID:3700
-
\??\c:\tbbbtt.exec:\tbbbtt.exe118⤵PID:3532
-
\??\c:\bnhbtt.exec:\bnhbtt.exe119⤵PID:2904
-
\??\c:\jddjd.exec:\jddjd.exe120⤵PID:1528
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe121⤵PID:4984
-
\??\c:\rlrllfl.exec:\rlrllfl.exe122⤵PID:4960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-