Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 23:08
Behavioral task
behavioral1
Sample
d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe
Resource
win7-20240708-en
windows7-x64
9 signatures
120 seconds
General
-
Target
d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe
-
Size
3.7MB
-
MD5
e0b2850054fbaa6aabd4d31722815020
-
SHA1
3c1a5268eb58f7d5166b440c118a4759549dc0f2
-
SHA256
d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8
-
SHA512
7bed9117f881358e6fa768470bc00dc41f69ab32bcd6dc7723d94340f48b8278963c81508ca1301c2a8bef955660337cd9b1d8d43bc1cbe0cea1600ccebed8a6
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98J:U6XLq/qPPslzKx/dJg1ErmNk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 58 IoCs
resource yara_rule behavioral1/memory/2092-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1720-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1720-18-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1720-17-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/576-24-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/576-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2528-39-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2100-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2796-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2812-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2668-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1712-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3000-103-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/972-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2840-127-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2840-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/532-137-0x0000000001F40000-0x0000000001F67000-memory.dmp family_blackmoon behavioral1/memory/532-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1800-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1284-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1284-165-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1284-169-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2856-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-184-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2856-189-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2420-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2044-217-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2440-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2220-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2256-269-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2256-270-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2448-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1728-292-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2488-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2488-320-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/1688-333-0x00000000003D0000-0x00000000003F7000-memory.dmp family_blackmoon behavioral1/memory/1780-332-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2412-346-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2792-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2740-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1444-402-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1460-485-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/684-492-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1596-512-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/328-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/760-542-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2400-552-0x00000000003B0000-0x00000000003D7000-memory.dmp family_blackmoon behavioral1/memory/3020-553-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2828-651-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2584-664-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2384-688-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2456-711-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/768-741-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/2224-764-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2044-777-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2044-784-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1680-853-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1720 rxlrfrf.exe 576 djpjp.exe 2528 jjjdv.exe 2128 vvvjd.exe 2100 1pjvj.exe 2796 ttnhht.exe 2812 rrfxxfl.exe 2668 fxrlxrf.exe 2664 rrxrxxf.exe 3000 nnbnhb.exe 1712 ddpvp.exe 972 bbtbth.exe 2840 xrlxrxx.exe 532 rrlrlrr.exe 1800 flrlrfr.exe 984 hhbbtb.exe 1284 jjpdp.exe 3028 pvdpp.exe 2856 jjjjj.exe 1984 tbtbhh.exe 2420 dvpvd.exe 2044 jdjjp.exe 2188 htbtnb.exe 1356 hbtbnt.exe 2220 hnbbnt.exe 2440 thntnt.exe 1648 xllrxrl.exe 2256 7dvjp.exe 2892 thbbnn.exe 2448 ttbhtt.exe 1728 ppjvj.exe 2272 djpdv.exe 1688 rfxrflf.exe 2460 hhthnt.exe 2488 bhhntn.exe 1780 jjdpj.exe 1028 fxrfflr.exe 2412 lfxlfxl.exe 2128 dvjpd.exe 2704 pppvp.exe 2792 ddjvp.exe 1980 nthnhn.exe 2740 3lxfffl.exe 2564 llfxrfr.exe 2596 llxffrl.exe 3000 vdpvd.exe 1444 ppppp.exe 1092 tbbnnb.exe 1140 rfrfxll.exe 316 lffxrlx.exe 532 jjjvv.exe 1792 vvvpv.exe 944 nnhnbn.exe 1768 3nnbhn.exe 1280 xxxlrfx.exe 2800 rxrllfx.exe 1972 jppvj.exe 2192 7bbhnt.exe 1460 llxfflr.exe 2980 fxfxfxr.exe 684 fxxxfff.exe 900 lllxlxl.exe 1596 xxrfrxr.exe 3012 ffrlfxr.exe -
resource yara_rule behavioral1/memory/2092-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00080000000120fb-6.dat upx behavioral1/memory/2092-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d49-20.dat upx behavioral1/memory/1720-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d71-28.dat upx behavioral1/memory/576-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016f45-38.dat upx behavioral1/memory/2528-39-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016ce8-46.dat upx behavioral1/memory/2100-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000017342-55.dat upx behavioral1/files/0x0007000000017349-67.dat upx behavioral1/memory/2796-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000017355-76.dat upx behavioral1/memory/2812-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000018741-84.dat upx behavioral1/memory/2664-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2668-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3000-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001919c-94.dat upx behavioral1/memory/1712-106-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191ad-105.dat upx behavioral1/memory/3000-103-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191cf-113.dat upx behavioral1/files/0x00050000000191d1-124.dat upx behavioral1/memory/972-122-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191df-133.dat upx behavioral1/memory/2840-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191f8-143.dat upx behavioral1/memory/532-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019214-152.dat upx behavioral1/memory/1800-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019219-160.dat upx behavioral1/memory/1284-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001921d-170.dat upx behavioral1/memory/2856-181-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019232-180.dat upx behavioral1/files/0x0005000000019329-190.dat upx behavioral1/memory/2856-189-0x00000000002C0000-0x00000000002E7000-memory.dmp upx behavioral1/files/0x0005000000019345-198.dat upx behavioral1/memory/2420-199-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2044-209-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019369-210.dat upx behavioral1/memory/2420-207-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2188-220-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019371-219.dat upx behavioral1/memory/2044-217-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001937b-227.dat upx behavioral1/files/0x0005000000019382-235.dat upx behavioral1/memory/2440-246-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001938e-245.dat upx behavioral1/memory/2220-243-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000193a8-253.dat upx behavioral1/memory/2256-262-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000193d1-261.dat upx behavioral1/files/0x00050000000193e6-271.dat upx behavioral1/memory/2256-269-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000193f0-280.dat upx behavioral1/files/0x000500000001945c-288.dat upx behavioral1/memory/2448-287-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001948d-297.dat upx behavioral1/memory/1728-292-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/2488-317-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrxlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxflllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xlfrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llflrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrllrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllfxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrxflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lrxfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lxfflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlxlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrffrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrfffx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1720 2092 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 30 PID 2092 wrote to memory of 1720 2092 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 30 PID 2092 wrote to memory of 1720 2092 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 30 PID 2092 wrote to memory of 1720 2092 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 30 PID 1720 wrote to memory of 576 1720 rxlrfrf.exe 31 PID 1720 wrote to memory of 576 1720 rxlrfrf.exe 31 PID 1720 wrote to memory of 576 1720 rxlrfrf.exe 31 PID 1720 wrote to memory of 576 1720 rxlrfrf.exe 31 PID 576 wrote to memory of 2528 576 djpjp.exe 32 PID 576 wrote to memory of 2528 576 djpjp.exe 32 PID 576 wrote to memory of 2528 576 djpjp.exe 32 PID 576 wrote to memory of 2528 576 djpjp.exe 32 PID 2528 wrote to memory of 2128 2528 jjjdv.exe 33 PID 2528 wrote to memory of 2128 2528 jjjdv.exe 33 PID 2528 wrote to memory of 2128 2528 jjjdv.exe 33 PID 2528 wrote to memory of 2128 2528 jjjdv.exe 33 PID 2128 wrote to memory of 2100 2128 vvvjd.exe 34 PID 2128 wrote to memory of 2100 2128 vvvjd.exe 34 PID 2128 wrote to memory of 2100 2128 vvvjd.exe 34 PID 2128 wrote to memory of 2100 2128 vvvjd.exe 34 PID 2100 wrote to memory of 2796 2100 1pjvj.exe 35 PID 2100 wrote to memory of 2796 2100 1pjvj.exe 35 PID 2100 wrote to memory of 2796 2100 1pjvj.exe 35 PID 2100 wrote to memory of 2796 2100 1pjvj.exe 35 PID 2796 wrote to memory of 2812 2796 ttnhht.exe 36 PID 2796 wrote to memory of 2812 2796 ttnhht.exe 36 PID 2796 wrote to memory of 2812 2796 ttnhht.exe 36 PID 2796 wrote to memory of 2812 2796 ttnhht.exe 36 PID 2812 wrote to memory of 2668 2812 rrfxxfl.exe 37 PID 2812 wrote to memory of 2668 2812 rrfxxfl.exe 37 PID 2812 wrote to memory of 2668 2812 rrfxxfl.exe 37 PID 2812 wrote to memory of 2668 2812 rrfxxfl.exe 37 PID 2668 wrote to memory of 2664 2668 fxrlxrf.exe 38 PID 2668 wrote to memory of 2664 2668 fxrlxrf.exe 38 PID 2668 wrote to memory of 2664 2668 fxrlxrf.exe 38 PID 2668 wrote to memory of 2664 2668 fxrlxrf.exe 38 PID 2664 wrote to memory of 3000 2664 rrxrxxf.exe 39 PID 2664 wrote to memory of 3000 2664 rrxrxxf.exe 39 PID 2664 wrote to memory of 3000 2664 rrxrxxf.exe 39 PID 2664 wrote to memory of 3000 2664 rrxrxxf.exe 39 PID 3000 wrote to memory of 1712 3000 nnbnhb.exe 40 PID 3000 wrote to memory of 1712 3000 nnbnhb.exe 40 PID 3000 wrote to memory of 1712 3000 nnbnhb.exe 40 PID 3000 wrote to memory of 1712 3000 nnbnhb.exe 40 PID 1712 wrote to memory of 972 1712 ddpvp.exe 41 PID 1712 wrote to memory of 972 1712 ddpvp.exe 41 PID 1712 wrote to memory of 972 1712 ddpvp.exe 41 PID 1712 wrote to memory of 972 1712 ddpvp.exe 41 PID 972 wrote to memory of 2840 972 bbtbth.exe 42 PID 972 wrote to memory of 2840 972 bbtbth.exe 42 PID 972 wrote to memory of 2840 972 bbtbth.exe 42 PID 972 wrote to memory of 2840 972 bbtbth.exe 42 PID 2840 wrote to memory of 532 2840 xrlxrxx.exe 43 PID 2840 wrote to memory of 532 2840 xrlxrxx.exe 43 PID 2840 wrote to memory of 532 2840 xrlxrxx.exe 43 PID 2840 wrote to memory of 532 2840 xrlxrxx.exe 43 PID 532 wrote to memory of 1800 532 rrlrlrr.exe 44 PID 532 wrote to memory of 1800 532 rrlrlrr.exe 44 PID 532 wrote to memory of 1800 532 rrlrlrr.exe 44 PID 532 wrote to memory of 1800 532 rrlrlrr.exe 44 PID 1800 wrote to memory of 984 1800 flrlrfr.exe 45 PID 1800 wrote to memory of 984 1800 flrlrfr.exe 45 PID 1800 wrote to memory of 984 1800 flrlrfr.exe 45 PID 1800 wrote to memory of 984 1800 flrlrfr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe"C:\Users\Admin\AppData\Local\Temp\d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\rxlrfrf.exec:\rxlrfrf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\djpjp.exec:\djpjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
\??\c:\jjjdv.exec:\jjjdv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\vvvjd.exec:\vvvjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\1pjvj.exec:\1pjvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\ttnhht.exec:\ttnhht.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\rrfxxfl.exec:\rrfxxfl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\fxrlxrf.exec:\fxrlxrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\rrxrxxf.exec:\rrxrxxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\nnbnhb.exec:\nnbnhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\ddpvp.exec:\ddpvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\bbtbth.exec:\bbtbth.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
\??\c:\xrlxrxx.exec:\xrlxrxx.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\rrlrlrr.exec:\rrlrlrr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\flrlrfr.exec:\flrlrfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\hhbbtb.exec:\hhbbtb.exe17⤵
- Executes dropped EXE
PID:984 -
\??\c:\jjpdp.exec:\jjpdp.exe18⤵
- Executes dropped EXE
PID:1284 -
\??\c:\pvdpp.exec:\pvdpp.exe19⤵
- Executes dropped EXE
PID:3028 -
\??\c:\jjjjj.exec:\jjjjj.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
\??\c:\tbtbhh.exec:\tbtbhh.exe21⤵
- Executes dropped EXE
PID:1984 -
\??\c:\dvpvd.exec:\dvpvd.exe22⤵
- Executes dropped EXE
PID:2420 -
\??\c:\jdjjp.exec:\jdjjp.exe23⤵
- Executes dropped EXE
PID:2044 -
\??\c:\htbtnb.exec:\htbtnb.exe24⤵
- Executes dropped EXE
PID:2188 -
\??\c:\hbtbnt.exec:\hbtbnt.exe25⤵
- Executes dropped EXE
PID:1356 -
\??\c:\hnbbnt.exec:\hnbbnt.exe26⤵
- Executes dropped EXE
PID:2220 -
\??\c:\thntnt.exec:\thntnt.exe27⤵
- Executes dropped EXE
PID:2440 -
\??\c:\xllrxrl.exec:\xllrxrl.exe28⤵
- Executes dropped EXE
PID:1648 -
\??\c:\7dvjp.exec:\7dvjp.exe29⤵
- Executes dropped EXE
PID:2256 -
\??\c:\thbbnn.exec:\thbbnn.exe30⤵
- Executes dropped EXE
PID:2892 -
\??\c:\ttbhtt.exec:\ttbhtt.exe31⤵
- Executes dropped EXE
PID:2448 -
\??\c:\ppjvj.exec:\ppjvj.exe32⤵
- Executes dropped EXE
PID:1728 -
\??\c:\djpdv.exec:\djpdv.exe33⤵
- Executes dropped EXE
PID:2272 -
\??\c:\rfxrflf.exec:\rfxrflf.exe34⤵
- Executes dropped EXE
PID:1688 -
\??\c:\hhthnt.exec:\hhthnt.exe35⤵
- Executes dropped EXE
PID:2460 -
\??\c:\bhhntn.exec:\bhhntn.exe36⤵
- Executes dropped EXE
PID:2488 -
\??\c:\jjdpj.exec:\jjdpj.exe37⤵
- Executes dropped EXE
PID:1780 -
\??\c:\fxrfflr.exec:\fxrfflr.exe38⤵
- Executes dropped EXE
PID:1028 -
\??\c:\lfxlfxl.exec:\lfxlfxl.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
\??\c:\dvjpd.exec:\dvjpd.exe40⤵
- Executes dropped EXE
PID:2128 -
\??\c:\pppvp.exec:\pppvp.exe41⤵
- Executes dropped EXE
PID:2704 -
\??\c:\ddjvp.exec:\ddjvp.exe42⤵
- Executes dropped EXE
PID:2792 -
\??\c:\nthnhn.exec:\nthnhn.exe43⤵
- Executes dropped EXE
PID:1980 -
\??\c:\3lxfffl.exec:\3lxfffl.exe44⤵
- Executes dropped EXE
PID:2740 -
\??\c:\llfxrfr.exec:\llfxrfr.exe45⤵
- Executes dropped EXE
PID:2564 -
\??\c:\llxffrl.exec:\llxffrl.exe46⤵
- Executes dropped EXE
PID:2596 -
\??\c:\vdpvd.exec:\vdpvd.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
\??\c:\ppppp.exec:\ppppp.exe48⤵
- Executes dropped EXE
PID:1444 -
\??\c:\tbbnnb.exec:\tbbnnb.exe49⤵
- Executes dropped EXE
PID:1092 -
\??\c:\rfrfxll.exec:\rfrfxll.exe50⤵
- Executes dropped EXE
PID:1140 -
\??\c:\lffxrlx.exec:\lffxrlx.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:316 -
\??\c:\jjjvv.exec:\jjjvv.exe52⤵
- Executes dropped EXE
PID:532 -
\??\c:\vvvpv.exec:\vvvpv.exe53⤵
- Executes dropped EXE
PID:1792 -
\??\c:\nnhnbn.exec:\nnhnbn.exe54⤵
- Executes dropped EXE
PID:944 -
\??\c:\3nnbhn.exec:\3nnbhn.exe55⤵
- Executes dropped EXE
PID:1768 -
\??\c:\xxxlrfx.exec:\xxxlrfx.exe56⤵
- Executes dropped EXE
PID:1280 -
\??\c:\rxrllfx.exec:\rxrllfx.exe57⤵
- Executes dropped EXE
PID:2800 -
\??\c:\jppvj.exec:\jppvj.exe58⤵
- Executes dropped EXE
PID:1972 -
\??\c:\7bbhnt.exec:\7bbhnt.exe59⤵
- Executes dropped EXE
PID:2192 -
\??\c:\llxfflr.exec:\llxfflr.exe60⤵
- Executes dropped EXE
PID:1460 -
\??\c:\fxfxfxr.exec:\fxfxfxr.exe61⤵
- Executes dropped EXE
PID:2980 -
\??\c:\fxxxfff.exec:\fxxxfff.exe62⤵
- Executes dropped EXE
PID:684 -
\??\c:\lllxlxl.exec:\lllxlxl.exe63⤵
- Executes dropped EXE
PID:900 -
\??\c:\xxrfrxr.exec:\xxrfrxr.exe64⤵
- Executes dropped EXE
PID:1596 -
\??\c:\ffrlfxr.exec:\ffrlfxr.exe65⤵
- Executes dropped EXE
PID:3012 -
\??\c:\vdddp.exec:\vdddp.exe66⤵PID:1520
-
\??\c:\ppdjj.exec:\ppdjj.exe67⤵PID:328
-
\??\c:\bbbtnt.exec:\bbbtnt.exe68⤵PID:1920
-
\??\c:\ttbtnh.exec:\ttbtnh.exe69⤵PID:760
-
\??\c:\llfxxlx.exec:\llfxxlx.exe70⤵PID:2400
-
\??\c:\rrfrllx.exec:\rrfrllx.exe71⤵PID:3020
-
\??\c:\ffxrflf.exec:\ffxrflf.exe72⤵PID:1144
-
\??\c:\pdvpp.exec:\pdvpp.exe73⤵PID:1732
-
\??\c:\vpjjp.exec:\vpjjp.exe74⤵PID:2268
-
\??\c:\nhntnt.exec:\nhntnt.exe75⤵
- System Location Discovery: System Language Discovery
PID:2140 -
\??\c:\lrrrfrf.exec:\lrrrfrf.exe76⤵PID:1300
-
\??\c:\5ffrrfl.exec:\5ffrrfl.exe77⤵PID:2940
-
\??\c:\djpjv.exec:\djpjv.exe78⤵PID:2348
-
\??\c:\1dvjv.exec:\1dvjv.exe79⤵PID:2376
-
\??\c:\nnntht.exec:\nnntht.exe80⤵PID:2148
-
\??\c:\5tnnth.exec:\5tnnth.exe81⤵PID:2880
-
\??\c:\lllxxlr.exec:\lllxxlr.exe82⤵PID:2828
-
\??\c:\lrlxlff.exec:\lrlxlff.exe83⤵PID:2912
-
\??\c:\djvvp.exec:\djvvp.exe84⤵PID:2900
-
\??\c:\ddpvj.exec:\ddpvj.exe85⤵
- System Location Discovery: System Language Discovery
PID:2744 -
\??\c:\ntbhnt.exec:\ntbhnt.exe86⤵PID:2812
-
\??\c:\tnbbth.exec:\tnbbth.exe87⤵PID:2600
-
\??\c:\lfxrrxr.exec:\lfxrrxr.exe88⤵
- System Location Discovery: System Language Discovery
PID:2584 -
\??\c:\pjdpj.exec:\pjdpj.exe89⤵PID:2008
-
\??\c:\nnntbh.exec:\nnntbh.exe90⤵PID:624
-
\??\c:\tthtbh.exec:\tthtbh.exe91⤵PID:2384
-
\??\c:\fffllrl.exec:\fffllrl.exe92⤵PID:2296
-
\??\c:\rrflxlf.exec:\rrflxlf.exe93⤵PID:544
-
\??\c:\flllfxr.exec:\flllfxr.exe94⤵PID:2456
-
\??\c:\jdjvp.exec:\jdjvp.exe95⤵PID:2860
-
\??\c:\pvdpj.exec:\pvdpj.exe96⤵PID:1948
-
\??\c:\tbbttn.exec:\tbbttn.exe97⤵PID:3024
-
\??\c:\tbnbnt.exec:\tbnbnt.exe98⤵PID:1284
-
\??\c:\rlxrlrx.exec:\rlxrlrx.exe99⤵PID:768
-
\??\c:\rrrxlxl.exec:\rrrxlxl.exe100⤵
- System Location Discovery: System Language Discovery
PID:1972 -
\??\c:\1ppdj.exec:\1ppdj.exe101⤵PID:2192
-
\??\c:\pvjpj.exec:\pvjpj.exe102⤵PID:920
-
\??\c:\nbnnht.exec:\nbnnht.exe103⤵PID:2224
-
\??\c:\nhhbbn.exec:\nhhbbn.exe104⤵PID:1804
-
\??\c:\btthbh.exec:\btthbh.exe105⤵PID:2044
-
\??\c:\llflrlf.exec:\llflrlf.exe106⤵
- System Location Discovery: System Language Discovery
PID:1316 -
\??\c:\rrrfxlr.exec:\rrrfxlr.exe107⤵PID:2244
-
\??\c:\ttbhbn.exec:\ttbhbn.exe108⤵PID:1396
-
\??\c:\bthtnh.exec:\bthtnh.exe109⤵PID:1532
-
\??\c:\tnbhnb.exec:\tnbhnb.exe110⤵PID:820
-
\??\c:\5xlfrfl.exec:\5xlfrfl.exe111⤵
- System Location Discovery: System Language Discovery
PID:1340 -
\??\c:\jpdjj.exec:\jpdjj.exe112⤵PID:2948
-
\??\c:\5djpd.exec:\5djpd.exe113⤵PID:2892
-
\??\c:\hbbnhn.exec:\hbbnhn.exe114⤵PID:2448
-
\??\c:\hhhbht.exec:\hhhbht.exe115⤵PID:2468
-
\??\c:\lxflxxx.exec:\lxflxxx.exe116⤵PID:1620
-
\??\c:\rrxlflr.exec:\rrxlflr.exe117⤵PID:1680
-
\??\c:\fllllxx.exec:\fllllxx.exe118⤵PID:1688
-
\??\c:\jjpjv.exec:\jjpjv.exe119⤵PID:1908
-
\??\c:\pvddp.exec:\pvddp.exe120⤵PID:556
-
\??\c:\vpjpv.exec:\vpjpv.exe121⤵PID:2348
-
\??\c:\tthnbt.exec:\tthnbt.exe122⤵PID:2376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-