Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 23:08
Behavioral task
behavioral1
Sample
d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe
Resource
win7-20240708-en
9 signatures
120 seconds
General
-
Target
d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe
-
Size
3.7MB
-
MD5
e0b2850054fbaa6aabd4d31722815020
-
SHA1
3c1a5268eb58f7d5166b440c118a4759549dc0f2
-
SHA256
d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8
-
SHA512
7bed9117f881358e6fa768470bc00dc41f69ab32bcd6dc7723d94340f48b8278963c81508ca1301c2a8bef955660337cd9b1d8d43bc1cbe0cea1600ccebed8a6
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98J:U6XLq/qPPslzKx/dJg1ErmNk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/556-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2208-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1576-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3212-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1848-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/396-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4008-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4888-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/772-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4508-77-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5052-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1604-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1616-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4776-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2032-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4892-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4716-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2820-130-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3160-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5076-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1620-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2316-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2052-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4852-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3792-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2632-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1308-215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3988-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1660-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4504-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4484-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4796-247-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1148-254-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4052-264-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4344-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/720-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1168-300-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3964-307-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4244-350-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3904-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3032-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2320-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4484-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1840-388-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/624-392-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-402-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3156-421-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4976-458-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/892-483-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2312-613-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4000-626-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3408-684-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4952-766-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1036-773-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2792-907-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4736-996-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-1081-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1160-1085-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2208 826622.exe 1608 bnnnbb.exe 3212 8804444.exe 1576 nttnnt.exe 1848 lrfrrfr.exe 396 lxlrrrr.exe 4008 44684.exe 4764 tthntb.exe 4888 464662.exe 772 646408.exe 3948 pvdjp.exe 4508 htnhhb.exe 5052 hhhbbb.exe 1604 nbnnnt.exe 1616 flxrrrr.exe 4776 808888.exe 2032 86204.exe 4892 jjjjv.exe 1096 440628.exe 4716 vjjvd.exe 2820 22882.exe 3544 btbhnt.exe 2688 thttbt.exe 4840 hthhhb.exe 1376 682446.exe 3160 vdjpv.exe 5076 804848.exe 1780 s0400.exe 1620 nnhhhn.exe 2316 4020420.exe 2792 xffxxff.exe 2052 jjvvv.exe 4764 224064.exe 3692 jdvpj.exe 4852 082828.exe 3792 2604444.exe 2632 bthbtt.exe 652 626020.exe 1308 20468.exe 4324 rlfrxxl.exe 3988 044264.exe 1660 tbhhhn.exe 1600 06000.exe 3144 djdjd.exe 4504 nhhhbb.exe 3468 0668486.exe 4484 hhbbnb.exe 4796 0466666.exe 1284 7rrrrrr.exe 1148 6806666.exe 4488 84000.exe 2812 ddpdp.exe 4052 600044.exe 1496 64228.exe 1456 fffxxxr.exe 4344 6242266.exe 3212 462820.exe 3224 lflxrxf.exe 4256 rfrrrxx.exe 720 1pjjp.exe 664 266666.exe 3276 86088.exe 3956 g0660.exe 1168 pdjjj.exe -
resource yara_rule behavioral2/memory/556-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/556-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b27-3.dat upx behavioral2/files/0x000a000000023b7c-8.dat upx behavioral2/memory/1608-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2208-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7d-13.dat upx behavioral2/files/0x000a000000023b7e-20.dat upx behavioral2/memory/1576-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3212-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7f-28.dat upx behavioral2/files/0x000a000000023b80-35.dat upx behavioral2/memory/1848-33-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/396-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023a95-39.dat upx behavioral2/memory/4008-42-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b81-46.dat upx behavioral2/memory/4764-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023a79-51.dat upx behavioral2/memory/4888-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4764-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022a9d-60.dat upx behavioral2/memory/4888-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022a9f-64.dat upx behavioral2/memory/772-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000400000001e56e-70.dat upx behavioral2/memory/4508-77-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000f000000023a5b-78.dat upx behavioral2/files/0x0012000000023a94-82.dat upx behavioral2/memory/5052-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b84-88.dat upx behavioral2/memory/1604-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1616-96-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b85-95.dat upx behavioral2/files/0x000a000000023b86-99.dat upx behavioral2/memory/4776-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b87-105.dat upx behavioral2/memory/2032-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b89-111.dat upx behavioral2/memory/4892-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8a-117.dat upx behavioral2/memory/4716-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8b-122.dat upx behavioral2/files/0x000a000000023b8c-128.dat upx behavioral2/memory/2820-130-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8d-133.dat upx behavioral2/files/0x000a000000023b8e-139.dat upx behavioral2/files/0x000b000000023b8f-147.dat upx behavioral2/memory/4840-146-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b9b-150.dat upx behavioral2/memory/3160-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0012000000023ba7-156.dat upx behavioral2/files/0x0008000000023ba9-161.dat upx behavioral2/memory/5076-164-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023baf-167.dat upx behavioral2/files/0x0009000000023bb0-172.dat upx behavioral2/memory/1620-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2316-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bf0-179.dat upx behavioral2/files/0x0008000000023bf1-184.dat upx behavioral2/memory/2052-187-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4764-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4852-201-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3792-205-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 488200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0464882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxllfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2688444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 808406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0244684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c240406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8004826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k06600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 068482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4066622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4024262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 068888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1llxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8004204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 480600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 642842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 604200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c282602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxrrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 2208 556 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 84 PID 556 wrote to memory of 2208 556 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 84 PID 556 wrote to memory of 2208 556 d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe 84 PID 2208 wrote to memory of 1608 2208 826622.exe 85 PID 2208 wrote to memory of 1608 2208 826622.exe 85 PID 2208 wrote to memory of 1608 2208 826622.exe 85 PID 1608 wrote to memory of 3212 1608 bnnnbb.exe 87 PID 1608 wrote to memory of 3212 1608 bnnnbb.exe 87 PID 1608 wrote to memory of 3212 1608 bnnnbb.exe 87 PID 3212 wrote to memory of 1576 3212 8804444.exe 88 PID 3212 wrote to memory of 1576 3212 8804444.exe 88 PID 3212 wrote to memory of 1576 3212 8804444.exe 88 PID 1576 wrote to memory of 1848 1576 nttnnt.exe 89 PID 1576 wrote to memory of 1848 1576 nttnnt.exe 89 PID 1576 wrote to memory of 1848 1576 nttnnt.exe 89 PID 1848 wrote to memory of 396 1848 lrfrrfr.exe 92 PID 1848 wrote to memory of 396 1848 lrfrrfr.exe 92 PID 1848 wrote to memory of 396 1848 lrfrrfr.exe 92 PID 396 wrote to memory of 4008 396 lxlrrrr.exe 93 PID 396 wrote to memory of 4008 396 lxlrrrr.exe 93 PID 396 wrote to memory of 4008 396 lxlrrrr.exe 93 PID 4008 wrote to memory of 4764 4008 44684.exe 94 PID 4008 wrote to memory of 4764 4008 44684.exe 94 PID 4008 wrote to memory of 4764 4008 44684.exe 94 PID 4764 wrote to memory of 4888 4764 tthntb.exe 95 PID 4764 wrote to memory of 4888 4764 tthntb.exe 95 PID 4764 wrote to memory of 4888 4764 tthntb.exe 95 PID 4888 wrote to memory of 772 4888 464662.exe 98 PID 4888 wrote to memory of 772 4888 464662.exe 98 PID 4888 wrote to memory of 772 4888 464662.exe 98 PID 772 wrote to memory of 3948 772 646408.exe 99 PID 772 wrote to memory of 3948 772 646408.exe 99 PID 772 wrote to memory of 3948 772 646408.exe 99 PID 3948 wrote to memory of 4508 3948 pvdjp.exe 101 PID 3948 wrote to memory of 4508 3948 pvdjp.exe 101 PID 3948 wrote to memory of 4508 3948 pvdjp.exe 101 PID 4508 wrote to memory of 5052 4508 htnhhb.exe 102 PID 4508 wrote to memory of 5052 4508 htnhhb.exe 102 PID 4508 wrote to memory of 5052 4508 htnhhb.exe 102 PID 5052 wrote to memory of 1604 5052 hhhbbb.exe 104 PID 5052 wrote to memory of 1604 5052 hhhbbb.exe 104 PID 5052 wrote to memory of 1604 5052 hhhbbb.exe 104 PID 1604 wrote to memory of 1616 1604 nbnnnt.exe 105 PID 1604 wrote to memory of 1616 1604 nbnnnt.exe 105 PID 1604 wrote to memory of 1616 1604 nbnnnt.exe 105 PID 1616 wrote to memory of 4776 1616 flxrrrr.exe 106 PID 1616 wrote to memory of 4776 1616 flxrrrr.exe 106 PID 1616 wrote to memory of 4776 1616 flxrrrr.exe 106 PID 4776 wrote to memory of 2032 4776 808888.exe 107 PID 4776 wrote to memory of 2032 4776 808888.exe 107 PID 4776 wrote to memory of 2032 4776 808888.exe 107 PID 2032 wrote to memory of 4892 2032 86204.exe 108 PID 2032 wrote to memory of 4892 2032 86204.exe 108 PID 2032 wrote to memory of 4892 2032 86204.exe 108 PID 4892 wrote to memory of 1096 4892 jjjjv.exe 110 PID 4892 wrote to memory of 1096 4892 jjjjv.exe 110 PID 4892 wrote to memory of 1096 4892 jjjjv.exe 110 PID 1096 wrote to memory of 4716 1096 440628.exe 111 PID 1096 wrote to memory of 4716 1096 440628.exe 111 PID 1096 wrote to memory of 4716 1096 440628.exe 111 PID 4716 wrote to memory of 2820 4716 vjjvd.exe 112 PID 4716 wrote to memory of 2820 4716 vjjvd.exe 112 PID 4716 wrote to memory of 2820 4716 vjjvd.exe 112 PID 2820 wrote to memory of 3544 2820 22882.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe"C:\Users\Admin\AppData\Local\Temp\d9da6dd3e0afb5607695c7203372ae6a5441d25e6dc451831c93e09a52daf5f8N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\826622.exec:\826622.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\bnnnbb.exec:\bnnnbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
\??\c:\8804444.exec:\8804444.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
\??\c:\nttnnt.exec:\nttnnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\lrfrrfr.exec:\lrfrrfr.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
\??\c:\lxlrrrr.exec:\lxlrrrr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\44684.exec:\44684.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\tthntb.exec:\tthntb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\464662.exec:\464662.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\646408.exec:\646408.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\pvdjp.exec:\pvdjp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\htnhhb.exec:\htnhhb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\hhhbbb.exec:\hhhbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\nbnnnt.exec:\nbnnnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\flxrrrr.exec:\flxrrrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\808888.exec:\808888.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
\??\c:\86204.exec:\86204.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\jjjjv.exec:\jjjjv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\440628.exec:\440628.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\vjjvd.exec:\vjjvd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\22882.exec:\22882.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\btbhnt.exec:\btbhnt.exe23⤵
- Executes dropped EXE
PID:3544 -
\??\c:\thttbt.exec:\thttbt.exe24⤵
- Executes dropped EXE
PID:2688 -
\??\c:\hthhhb.exec:\hthhhb.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840 -
\??\c:\682446.exec:\682446.exe26⤵
- Executes dropped EXE
PID:1376 -
\??\c:\vdjpv.exec:\vdjpv.exe27⤵
- Executes dropped EXE
PID:3160 -
\??\c:\804848.exec:\804848.exe28⤵
- Executes dropped EXE
PID:5076 -
\??\c:\s0400.exec:\s0400.exe29⤵
- Executes dropped EXE
PID:1780 -
\??\c:\nnhhhn.exec:\nnhhhn.exe30⤵
- Executes dropped EXE
PID:1620 -
\??\c:\4020420.exec:\4020420.exe31⤵
- Executes dropped EXE
PID:2316 -
\??\c:\xffxxff.exec:\xffxxff.exe32⤵
- Executes dropped EXE
PID:2792 -
\??\c:\jjvvv.exec:\jjvvv.exe33⤵
- Executes dropped EXE
PID:2052 -
\??\c:\224064.exec:\224064.exe34⤵
- Executes dropped EXE
PID:4764 -
\??\c:\jdvpj.exec:\jdvpj.exe35⤵
- Executes dropped EXE
PID:3692 -
\??\c:\082828.exec:\082828.exe36⤵
- Executes dropped EXE
PID:4852 -
\??\c:\2604444.exec:\2604444.exe37⤵
- Executes dropped EXE
PID:3792 -
\??\c:\bthbtt.exec:\bthbtt.exe38⤵
- Executes dropped EXE
PID:2632 -
\??\c:\626020.exec:\626020.exe39⤵
- Executes dropped EXE
PID:652 -
\??\c:\20468.exec:\20468.exe40⤵
- Executes dropped EXE
PID:1308 -
\??\c:\rlfrxxl.exec:\rlfrxxl.exe41⤵
- Executes dropped EXE
PID:4324 -
\??\c:\044264.exec:\044264.exe42⤵
- Executes dropped EXE
PID:3988 -
\??\c:\tbhhhn.exec:\tbhhhn.exe43⤵
- Executes dropped EXE
PID:1660 -
\??\c:\06000.exec:\06000.exe44⤵
- Executes dropped EXE
PID:1600 -
\??\c:\djdjd.exec:\djdjd.exe45⤵
- Executes dropped EXE
PID:3144 -
\??\c:\nhhhbb.exec:\nhhhbb.exe46⤵
- Executes dropped EXE
PID:4504 -
\??\c:\0668486.exec:\0668486.exe47⤵
- Executes dropped EXE
PID:3468 -
\??\c:\hhbbnb.exec:\hhbbnb.exe48⤵
- Executes dropped EXE
PID:4484 -
\??\c:\0466666.exec:\0466666.exe49⤵
- Executes dropped EXE
PID:4796 -
\??\c:\7rrrrrr.exec:\7rrrrrr.exe50⤵
- Executes dropped EXE
PID:1284 -
\??\c:\6806666.exec:\6806666.exe51⤵
- Executes dropped EXE
PID:1148 -
\??\c:\84000.exec:\84000.exe52⤵
- Executes dropped EXE
PID:4488 -
\??\c:\ddpdp.exec:\ddpdp.exe53⤵
- Executes dropped EXE
PID:2812 -
\??\c:\600044.exec:\600044.exe54⤵
- Executes dropped EXE
PID:4052 -
\??\c:\64228.exec:\64228.exe55⤵
- Executes dropped EXE
PID:1496 -
\??\c:\fffxxxr.exec:\fffxxxr.exe56⤵
- Executes dropped EXE
PID:1456 -
\??\c:\6242266.exec:\6242266.exe57⤵
- Executes dropped EXE
PID:4344 -
\??\c:\462820.exec:\462820.exe58⤵
- Executes dropped EXE
PID:3212 -
\??\c:\lflxrxf.exec:\lflxrxf.exe59⤵
- Executes dropped EXE
PID:3224 -
\??\c:\rfrrrxx.exec:\rfrrrxx.exe60⤵
- Executes dropped EXE
PID:4256 -
\??\c:\1pjjp.exec:\1pjjp.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:720 -
\??\c:\266666.exec:\266666.exe62⤵
- Executes dropped EXE
PID:664 -
\??\c:\86088.exec:\86088.exe63⤵
- Executes dropped EXE
PID:3276 -
\??\c:\g0660.exec:\g0660.exe64⤵
- Executes dropped EXE
PID:3956 -
\??\c:\pdjjj.exec:\pdjjj.exe65⤵
- Executes dropped EXE
PID:1168 -
\??\c:\8644622.exec:\8644622.exe66⤵PID:3388
-
\??\c:\6040622.exec:\6040622.exe67⤵PID:3964
-
\??\c:\vdvjj.exec:\vdvjj.exe68⤵PID:4784
-
\??\c:\vvpdp.exec:\vvpdp.exe69⤵PID:5084
-
\??\c:\22628.exec:\22628.exe70⤵PID:2832
-
\??\c:\vdvpv.exec:\vdvpv.exe71⤵PID:2792
-
\??\c:\pjpjj.exec:\pjpjj.exe72⤵PID:2044
-
\??\c:\24666.exec:\24666.exe73⤵PID:1124
-
\??\c:\288482.exec:\288482.exe74⤵PID:4076
-
\??\c:\608266.exec:\608266.exe75⤵PID:3464
-
\??\c:\82040.exec:\82040.exe76⤵PID:840
-
\??\c:\64888.exec:\64888.exe77⤵PID:4884
-
\??\c:\0686420.exec:\0686420.exe78⤵PID:2040
-
\??\c:\806802.exec:\806802.exe79⤵PID:1464
-
\??\c:\hnbhbh.exec:\hnbhbh.exe80⤵PID:1624
-
\??\c:\bbhhhn.exec:\bbhhhn.exe81⤵PID:4244
-
\??\c:\xlrrlll.exec:\xlrrlll.exe82⤵PID:3904
-
\??\c:\vjppp.exec:\vjppp.exe83⤵PID:3032
-
\??\c:\0068602.exec:\0068602.exe84⤵PID:3616
-
\??\c:\xfxxrxr.exec:\xfxxrxr.exe85⤵PID:2696
-
\??\c:\7jjjj.exec:\7jjjj.exe86⤵PID:1988
-
\??\c:\04400.exec:\04400.exe87⤵PID:2320
-
\??\c:\5nbbbn.exec:\5nbbbn.exe88⤵PID:5032
-
\??\c:\frfxlrl.exec:\frfxlrl.exe89⤵PID:4484
-
\??\c:\hhhhtb.exec:\hhhhtb.exe90⤵PID:4796
-
\??\c:\22628.exec:\22628.exe91⤵PID:1284
-
\??\c:\vjvvj.exec:\vjvvj.exe92⤵PID:1840
-
\??\c:\thhbhh.exec:\thhbhh.exe93⤵PID:624
-
\??\c:\xrfxxrr.exec:\xrfxxrr.exe94⤵PID:3544
-
\??\c:\2088488.exec:\2088488.exe95⤵PID:4372
-
\??\c:\pdvvv.exec:\pdvvv.exe96⤵PID:1608
-
\??\c:\nhnnhh.exec:\nhnnhh.exe97⤵PID:4604
-
\??\c:\vjppp.exec:\vjppp.exe98⤵PID:2332
-
\??\c:\rlrxxrx.exec:\rlrxxrx.exe99⤵PID:2312
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe100⤵
- System Location Discovery: System Language Discovery
PID:3644 -
\??\c:\86424.exec:\86424.exe101⤵PID:1780
-
\??\c:\5jjdv.exec:\5jjdv.exe102⤵PID:3156
-
\??\c:\fxxfllf.exec:\fxxfllf.exe103⤵PID:1036
-
\??\c:\nbbttn.exec:\nbbttn.exe104⤵PID:216
-
\??\c:\lxxllff.exec:\lxxllff.exe105⤵PID:1436
-
\??\c:\40468.exec:\40468.exe106⤵PID:2476
-
\??\c:\2422226.exec:\2422226.exe107⤵PID:1548
-
\??\c:\026002.exec:\026002.exe108⤵PID:1488
-
\??\c:\800222.exec:\800222.exe109⤵PID:4844
-
\??\c:\200488.exec:\200488.exe110⤵
- System Location Discovery: System Language Discovery
PID:3440 -
\??\c:\pjjpv.exec:\pjjpv.exe111⤵PID:396
-
\??\c:\pjjjj.exec:\pjjjj.exe112⤵PID:3524
-
\??\c:\llrlllx.exec:\llrlllx.exe113⤵PID:2052
-
\??\c:\fflllrr.exec:\fflllrr.exe114⤵PID:4976
-
\??\c:\7tbttt.exec:\7tbttt.exe115⤵PID:2836
-
\??\c:\9ppjd.exec:\9ppjd.exe116⤵PID:4852
-
\??\c:\888884.exec:\888884.exe117⤵PID:4264
-
\??\c:\468822.exec:\468822.exe118⤵PID:4516
-
\??\c:\48660.exec:\48660.exe119⤵PID:4536
-
\??\c:\2400444.exec:\2400444.exe120⤵PID:3352
-
\??\c:\60882.exec:\60882.exe121⤵PID:2436
-
\??\c:\2682004.exec:\2682004.exe122⤵PID:892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-