Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 15:12
Behavioral task
behavioral1
Sample
e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe
Resource
win7-20240903-en
General
-
Target
e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe
-
Size
3.7MB
-
MD5
e43ed5e8cbf3fc1c2be1cfd902a42610
-
SHA1
3c8127f9e677b7a290948b1710d185969959b493
-
SHA256
e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6f
-
SHA512
85196882da91d9904abd981761fe10ab13ad3cb0c15e452dad0fcee6e5b59b693139714dcc4dc8b7caf4583a5959742176c91b1447f5e15258f7f30702baff59
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98g:U6XLq/qPPslzKx/dJg1ErmNj
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 51 IoCs
Processes:
resource yara_rule behavioral1/memory/292-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1056-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3068-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2480-35-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/2480-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2704-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2760-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2764-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2700-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1264-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1468-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/852-115-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/688-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1376-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1376-137-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/1376-141-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/1924-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1836-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2852-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2852-168-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2220-180-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2560-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2152-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2152-206-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2052-240-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/764-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/900-260-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2472-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2092-289-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2300-307-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2300-305-0x00000000771F0000-0x000000007730F000-memory.dmp family_blackmoon behavioral1/memory/1716-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1056-321-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3068-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2196-342-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2200-477-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/908-505-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/956-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1932-540-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1932-559-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2436-573-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3056-599-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2028-661-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2360-672-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1032-684-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2052-794-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2828-898-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/792-1100-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2772-1179-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2852-1290-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
7hhtbh.exeflfrlfx.exefxxlfxr.exerllxxfx.exehnttth.exetbhhtn.exedjppv.exeffllrfl.exexxxlxlr.exejvjdd.exelxxxlfx.exepjjvp.exepjjdv.exerxffxfx.exenbnhtt.exe7bnhbt.exehttbhb.exeffrxllx.exelfflrxf.exetnntbt.exebbbbhn.exerfflxxl.exedpdpd.exepjvjd.exedjjpj.exethhbhn.exe3tbttn.exeflffrrr.exelfxlrxf.exexxfrfrl.exedvdvp.exejjjvj.exevdppv.exebntbtb.exe9thttt.exenhnbth.exexfxlxfl.exerrlllfl.exexxlxfxl.exeflfrlrx.exejjdpp.exepvdjv.exe9tntnb.exebnnhhn.exellrxlxf.exelrllffx.exerxrrrll.exedddvv.exe3jjdv.exe7bhbbn.exe7nthhb.exeffflxrr.exe3xrllfx.exe9ppvp.exedjddd.exebbbntb.exetbbnnt.exebntnbb.exethhnbt.exerxrlxrf.exe9xxflrx.exe1vvdv.exeddvvv.exe3dpvv.exepid process 1056 7hhtbh.exe 3068 flfrlfx.exe 2480 fxxlfxr.exe 2704 rllxxfx.exe 2760 hnttth.exe 2764 tbhhtn.exe 2700 djppv.exe 1264 ffllrfl.exe 2664 xxxlxlr.exe 2656 jvjdd.exe 1468 lxxxlfx.exe 852 pjjvp.exe 688 pjjdv.exe 1376 rxffxfx.exe 1924 nbnhtt.exe 1836 7bnhbt.exe 2852 httbhb.exe 2220 ffrxllx.exe 2104 lfflrxf.exe 2560 tnntbt.exe 2152 bbbbhn.exe 1632 rfflxxl.exe 1920 dpdpd.exe 652 pjvjd.exe 2052 djjpj.exe 764 thhbhn.exe 900 3tbttn.exe 2804 flffrrr.exe 2448 lfxlrxf.exe 2472 xxfrfrl.exe 2092 dvdvp.exe 1232 jjjvj.exe 2300 vdppv.exe 2088 bntbtb.exe 1056 9thttt.exe 3068 nhnbth.exe 2196 xfxlxfl.exe 2824 rrlllfl.exe 2820 xxlxfxl.exe 2432 flfrlrx.exe 2972 jjdpp.exe 2668 pvdjv.exe 2632 9tntnb.exe 2252 bnnhhn.exe 2664 llrxlxf.exe 580 lrllffx.exe 352 rxrrrll.exe 1256 dddvv.exe 300 3jjdv.exe 1684 7bhbbn.exe 1252 7nthhb.exe 1376 ffflxrr.exe 1128 3xrllfx.exe 2512 9ppvp.exe 1152 djddd.exe 1248 bbbntb.exe 2944 tbbnnt.exe 2076 bntnbb.exe 2200 thhnbt.exe 1592 rxrlxrf.exe 3032 9xxflrx.exe 3024 1vvdv.exe 908 ddvvv.exe 1920 3dpvv.exe -
Processes:
resource yara_rule behavioral1/memory/292-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7hhtbh.exe upx behavioral1/memory/292-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1056-9-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flfrlfx.exe upx behavioral1/memory/3068-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1056-18-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fxxlfxr.exe upx behavioral1/memory/3068-27-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rllxxfx.exe upx behavioral1/memory/2480-38-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hnttth.exe upx behavioral1/memory/2704-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2760-49-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tbhhtn.exe upx behavioral1/memory/2764-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2764-65-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\djppv.exe upx behavioral1/memory/2700-69-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ffllrfl.exe upx behavioral1/memory/1264-79-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xxxlxlr.exe upx \??\c:\jvjdd.exe upx behavioral1/memory/2664-94-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lxxxlfx.exe upx behavioral1/memory/1468-106-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjjvp.exe upx behavioral1/memory/852-115-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjjdv.exe upx behavioral1/memory/688-131-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1376-134-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rxffxfx.exe upx behavioral1/memory/1376-137-0x0000000000250000-0x0000000000277000-memory.dmp upx C:\nbnhtt.exe upx behavioral1/memory/1924-151-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7bnhbt.exe upx C:\httbhb.exe upx behavioral1/memory/1836-160-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ffrxllx.exe upx behavioral1/memory/2220-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2852-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2852-168-0x00000000001B0000-0x00000000001D7000-memory.dmp upx \??\c:\lfflrxf.exe upx C:\tnntbt.exe upx C:\bbbbhn.exe upx behavioral1/memory/2560-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2152-208-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rfflxxl.exe upx C:\dpdpd.exe upx C:\pjvjd.exe upx \??\c:\djjpj.exe upx \??\c:\thhbhn.exe upx \??\c:\3tbttn.exe upx behavioral1/memory/764-250-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flffrrr.exe upx C:\lfxlrxf.exe upx behavioral1/memory/2472-280-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxfrfrl.exe upx \??\c:\dvdvp.exe upx behavioral1/memory/2092-289-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jjjvj.exe upx behavioral1/memory/2300-307-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1716-314-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1056-321-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vdjvp.exenhthth.exebtnthb.exelrlffxx.exe5thtnh.exejpdvd.exejdvvp.exetbnbnt.exennnntt.exelfxxflr.exefxlrrlx.exepvvpj.exettbhtb.exexlfrllx.exerrxfxfx.exe7tnhbt.exelfxfrff.exefxllfll.exevppjp.exepdjpj.exehbbttn.exefxrfxrl.exevpdvd.exehhbtnh.exepdpvd.exexxfrfrl.exebttntn.exerllrlll.exevpjdv.exetnttnt.exevdjdv.exevddpj.exenttbbt.exehhhbhn.exelrxlfrf.exevjjvd.exepjjvp.exexrrfrxr.exehttbnb.exexflfxll.exehtthbb.exebntbtb.exe9jdpd.exelffffrl.exennttnb.exerrrrlfx.exe7tnbtt.exedjpvd.exehtbntn.exebnhhhb.exe9hnttt.exellfrflf.exenbnhht.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5thtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxllfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxlfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrfrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htthbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffffrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnttnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfrflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhht.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe7hhtbh.exeflfrlfx.exefxxlfxr.exerllxxfx.exehnttth.exetbhhtn.exedjppv.exeffllrfl.exexxxlxlr.exejvjdd.exelxxxlfx.exepjjvp.exepjjdv.exerxffxfx.exenbnhtt.exedescription pid process target process PID 292 wrote to memory of 1056 292 e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe 7hhtbh.exe PID 292 wrote to memory of 1056 292 e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe 7hhtbh.exe PID 292 wrote to memory of 1056 292 e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe 7hhtbh.exe PID 292 wrote to memory of 1056 292 e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe 7hhtbh.exe PID 1056 wrote to memory of 3068 1056 7hhtbh.exe flfrlfx.exe PID 1056 wrote to memory of 3068 1056 7hhtbh.exe flfrlfx.exe PID 1056 wrote to memory of 3068 1056 7hhtbh.exe flfrlfx.exe PID 1056 wrote to memory of 3068 1056 7hhtbh.exe flfrlfx.exe PID 3068 wrote to memory of 2480 3068 flfrlfx.exe fxxlfxr.exe PID 3068 wrote to memory of 2480 3068 flfrlfx.exe fxxlfxr.exe PID 3068 wrote to memory of 2480 3068 flfrlfx.exe fxxlfxr.exe PID 3068 wrote to memory of 2480 3068 flfrlfx.exe fxxlfxr.exe PID 2480 wrote to memory of 2704 2480 fxxlfxr.exe rllxxfx.exe PID 2480 wrote to memory of 2704 2480 fxxlfxr.exe rllxxfx.exe PID 2480 wrote to memory of 2704 2480 fxxlfxr.exe rllxxfx.exe PID 2480 wrote to memory of 2704 2480 fxxlfxr.exe rllxxfx.exe PID 2704 wrote to memory of 2760 2704 rllxxfx.exe hnttth.exe PID 2704 wrote to memory of 2760 2704 rllxxfx.exe hnttth.exe PID 2704 wrote to memory of 2760 2704 rllxxfx.exe hnttth.exe PID 2704 wrote to memory of 2760 2704 rllxxfx.exe hnttth.exe PID 2760 wrote to memory of 2764 2760 hnttth.exe tbhhtn.exe PID 2760 wrote to memory of 2764 2760 hnttth.exe tbhhtn.exe PID 2760 wrote to memory of 2764 2760 hnttth.exe tbhhtn.exe PID 2760 wrote to memory of 2764 2760 hnttth.exe tbhhtn.exe PID 2764 wrote to memory of 2700 2764 tbhhtn.exe djppv.exe PID 2764 wrote to memory of 2700 2764 tbhhtn.exe djppv.exe PID 2764 wrote to memory of 2700 2764 tbhhtn.exe djppv.exe PID 2764 wrote to memory of 2700 2764 tbhhtn.exe djppv.exe PID 2700 wrote to memory of 1264 2700 djppv.exe ffllrfl.exe PID 2700 wrote to memory of 1264 2700 djppv.exe ffllrfl.exe PID 2700 wrote to memory of 1264 2700 djppv.exe ffllrfl.exe PID 2700 wrote to memory of 1264 2700 djppv.exe ffllrfl.exe PID 1264 wrote to memory of 2664 1264 ffllrfl.exe xxxlxlr.exe PID 1264 wrote to memory of 2664 1264 ffllrfl.exe xxxlxlr.exe PID 1264 wrote to memory of 2664 1264 ffllrfl.exe xxxlxlr.exe PID 1264 wrote to memory of 2664 1264 ffllrfl.exe xxxlxlr.exe PID 2664 wrote to memory of 2656 2664 xxxlxlr.exe jvjdd.exe PID 2664 wrote to memory of 2656 2664 xxxlxlr.exe jvjdd.exe PID 2664 wrote to memory of 2656 2664 xxxlxlr.exe jvjdd.exe PID 2664 wrote to memory of 2656 2664 xxxlxlr.exe jvjdd.exe PID 2656 wrote to memory of 1468 2656 jvjdd.exe lxxxlfx.exe PID 2656 wrote to memory of 1468 2656 jvjdd.exe lxxxlfx.exe PID 2656 wrote to memory of 1468 2656 jvjdd.exe lxxxlfx.exe PID 2656 wrote to memory of 1468 2656 jvjdd.exe lxxxlfx.exe PID 1468 wrote to memory of 852 1468 lxxxlfx.exe pjjvp.exe PID 1468 wrote to memory of 852 1468 lxxxlfx.exe pjjvp.exe PID 1468 wrote to memory of 852 1468 lxxxlfx.exe pjjvp.exe PID 1468 wrote to memory of 852 1468 lxxxlfx.exe pjjvp.exe PID 852 wrote to memory of 688 852 pjjvp.exe pjjdv.exe PID 852 wrote to memory of 688 852 pjjvp.exe pjjdv.exe PID 852 wrote to memory of 688 852 pjjvp.exe pjjdv.exe PID 852 wrote to memory of 688 852 pjjvp.exe pjjdv.exe PID 688 wrote to memory of 1376 688 pjjdv.exe rxffxfx.exe PID 688 wrote to memory of 1376 688 pjjdv.exe rxffxfx.exe PID 688 wrote to memory of 1376 688 pjjdv.exe rxffxfx.exe PID 688 wrote to memory of 1376 688 pjjdv.exe rxffxfx.exe PID 1376 wrote to memory of 1924 1376 rxffxfx.exe nbnhtt.exe PID 1376 wrote to memory of 1924 1376 rxffxfx.exe nbnhtt.exe PID 1376 wrote to memory of 1924 1376 rxffxfx.exe nbnhtt.exe PID 1376 wrote to memory of 1924 1376 rxffxfx.exe nbnhtt.exe PID 1924 wrote to memory of 1836 1924 nbnhtt.exe 7bnhbt.exe PID 1924 wrote to memory of 1836 1924 nbnhtt.exe 7bnhbt.exe PID 1924 wrote to memory of 1836 1924 nbnhtt.exe 7bnhbt.exe PID 1924 wrote to memory of 1836 1924 nbnhtt.exe 7bnhbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe"C:\Users\Admin\AppData\Local\Temp\e5625c489c1e0bf709ed0520213100249eae350169b291faf8d1554b0f0e2a6fN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:292 -
\??\c:\7hhtbh.exec:\7hhtbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\flfrlfx.exec:\flfrlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\fxxlfxr.exec:\fxxlfxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\rllxxfx.exec:\rllxxfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\hnttth.exec:\hnttth.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\tbhhtn.exec:\tbhhtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\djppv.exec:\djppv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\ffllrfl.exec:\ffllrfl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\xxxlxlr.exec:\xxxlxlr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\jvjdd.exec:\jvjdd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\lxxxlfx.exec:\lxxxlfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
\??\c:\pjjvp.exec:\pjjvp.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
\??\c:\pjjdv.exec:\pjjdv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\rxffxfx.exec:\rxffxfx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\nbnhtt.exec:\nbnhtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\7bnhbt.exec:\7bnhbt.exe17⤵
- Executes dropped EXE
PID:1836 -
\??\c:\httbhb.exec:\httbhb.exe18⤵
- Executes dropped EXE
PID:2852 -
\??\c:\ffrxllx.exec:\ffrxllx.exe19⤵
- Executes dropped EXE
PID:2220 -
\??\c:\lfflrxf.exec:\lfflrxf.exe20⤵
- Executes dropped EXE
PID:2104 -
\??\c:\tnntbt.exec:\tnntbt.exe21⤵
- Executes dropped EXE
PID:2560 -
\??\c:\bbbbhn.exec:\bbbbhn.exe22⤵
- Executes dropped EXE
PID:2152 -
\??\c:\rfflxxl.exec:\rfflxxl.exe23⤵
- Executes dropped EXE
PID:1632 -
\??\c:\dpdpd.exec:\dpdpd.exe24⤵
- Executes dropped EXE
PID:1920 -
\??\c:\pjvjd.exec:\pjvjd.exe25⤵
- Executes dropped EXE
PID:652 -
\??\c:\djjpj.exec:\djjpj.exe26⤵
- Executes dropped EXE
PID:2052 -
\??\c:\thhbhn.exec:\thhbhn.exe27⤵
- Executes dropped EXE
PID:764 -
\??\c:\3tbttn.exec:\3tbttn.exe28⤵
- Executes dropped EXE
PID:900 -
\??\c:\flffrrr.exec:\flffrrr.exe29⤵
- Executes dropped EXE
PID:2804 -
\??\c:\lfxlrxf.exec:\lfxlrxf.exe30⤵
- Executes dropped EXE
PID:2448 -
\??\c:\xxfrfrl.exec:\xxfrfrl.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472 -
\??\c:\dvdvp.exec:\dvdvp.exe32⤵
- Executes dropped EXE
PID:2092 -
\??\c:\jjjvj.exec:\jjjvj.exe33⤵
- Executes dropped EXE
PID:1232 -
\??\c:\vdppv.exec:\vdppv.exe34⤵
- Executes dropped EXE
PID:2300 -
\??\c:\rrxrlxr.exec:\rrxrlxr.exe35⤵PID:1716
-
\??\c:\bntbtb.exec:\bntbtb.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2088 -
\??\c:\9thttt.exec:\9thttt.exe37⤵
- Executes dropped EXE
PID:1056 -
\??\c:\nhnbth.exec:\nhnbth.exe38⤵
- Executes dropped EXE
PID:3068 -
\??\c:\xfxlxfl.exec:\xfxlxfl.exe39⤵
- Executes dropped EXE
PID:2196 -
\??\c:\rrlllfl.exec:\rrlllfl.exe40⤵
- Executes dropped EXE
PID:2824 -
\??\c:\xxlxfxl.exec:\xxlxfxl.exe41⤵
- Executes dropped EXE
PID:2820 -
\??\c:\flfrlrx.exec:\flfrlrx.exe42⤵
- Executes dropped EXE
PID:2432 -
\??\c:\jjdpp.exec:\jjdpp.exe43⤵
- Executes dropped EXE
PID:2972 -
\??\c:\pvdjv.exec:\pvdjv.exe44⤵
- Executes dropped EXE
PID:2668 -
\??\c:\9tntnb.exec:\9tntnb.exe45⤵
- Executes dropped EXE
PID:2632 -
\??\c:\bnnhhn.exec:\bnnhhn.exe46⤵
- Executes dropped EXE
PID:2252 -
\??\c:\llrxlxf.exec:\llrxlxf.exe47⤵
- Executes dropped EXE
PID:2664 -
\??\c:\lrllffx.exec:\lrllffx.exe48⤵
- Executes dropped EXE
PID:580 -
\??\c:\rxrrrll.exec:\rxrrrll.exe49⤵
- Executes dropped EXE
PID:352 -
\??\c:\dddvv.exec:\dddvv.exe50⤵
- Executes dropped EXE
PID:1256 -
\??\c:\3jjdv.exec:\3jjdv.exe51⤵
- Executes dropped EXE
PID:300 -
\??\c:\7bhbbn.exec:\7bhbbn.exe52⤵
- Executes dropped EXE
PID:1684 -
\??\c:\7nthhb.exec:\7nthhb.exe53⤵
- Executes dropped EXE
PID:1252 -
\??\c:\ffflxrr.exec:\ffflxrr.exe54⤵
- Executes dropped EXE
PID:1376 -
\??\c:\3xrllfx.exec:\3xrllfx.exe55⤵
- Executes dropped EXE
PID:1128 -
\??\c:\9ppvp.exec:\9ppvp.exe56⤵
- Executes dropped EXE
PID:2512 -
\??\c:\djddd.exec:\djddd.exe57⤵
- Executes dropped EXE
PID:1152 -
\??\c:\bbbntb.exec:\bbbntb.exe58⤵
- Executes dropped EXE
PID:1248 -
\??\c:\tbbnnt.exec:\tbbnnt.exe59⤵
- Executes dropped EXE
PID:2944 -
\??\c:\bntnbb.exec:\bntnbb.exe60⤵
- Executes dropped EXE
PID:2076 -
\??\c:\thhnbt.exec:\thhnbt.exe61⤵
- Executes dropped EXE
PID:2200 -
\??\c:\rxrlxrf.exec:\rxrlxrf.exe62⤵
- Executes dropped EXE
PID:1592 -
\??\c:\9xxflrx.exec:\9xxflrx.exe63⤵
- Executes dropped EXE
PID:3032 -
\??\c:\1vvdv.exec:\1vvdv.exe64⤵
- Executes dropped EXE
PID:3024 -
\??\c:\ddvvv.exec:\ddvvv.exe65⤵
- Executes dropped EXE
PID:908 -
\??\c:\3dpvv.exec:\3dpvv.exe66⤵
- Executes dropped EXE
PID:1920 -
\??\c:\hnhhbh.exec:\hnhhbh.exe67⤵PID:316
-
\??\c:\nhbtht.exec:\nhbtht.exe68⤵PID:2376
-
\??\c:\nbnntn.exec:\nbnntn.exe69⤵PID:956
-
\??\c:\hnhbbn.exec:\hnhbbn.exe70⤵PID:1932
-
\??\c:\nnbhth.exec:\nnbhth.exe71⤵PID:2156
-
\??\c:\rrxfxfx.exec:\rrxfxfx.exe72⤵
- System Location Discovery: System Language Discovery
PID:2164 -
\??\c:\lffffff.exec:\lffffff.exe73⤵PID:2408
-
\??\c:\vdjdv.exec:\vdjdv.exe74⤵
- System Location Discovery: System Language Discovery
PID:1028 -
\??\c:\ddvjv.exec:\ddvjv.exe75⤵PID:1788
-
\??\c:\3hhthn.exec:\3hhthn.exe76⤵PID:2436
-
\??\c:\ntttth.exec:\ntttth.exe77⤵PID:1704
-
\??\c:\rxlflxr.exec:\rxlflxr.exe78⤵PID:1988
-
\??\c:\ffffflx.exec:\ffffflx.exe79⤵PID:2696
-
\??\c:\frrlllr.exec:\frrlllr.exe80⤵PID:3056
-
\??\c:\rfxrfrl.exec:\rfxrfrl.exe81⤵PID:3004
-
\??\c:\5ppvd.exec:\5ppvd.exe82⤵PID:2932
-
\??\c:\1pvjv.exec:\1pvjv.exe83⤵PID:2484
-
\??\c:\9tthtn.exec:\9tthtn.exe84⤵PID:2812
-
\??\c:\frrlllf.exec:\frrlllf.exe85⤵PID:1916
-
\??\c:\7xrxrxl.exec:\7xrxrxl.exe86⤵PID:2212
-
\??\c:\xxrfrlx.exec:\xxrfrlx.exe87⤵PID:2780
-
\??\c:\rxxflfx.exec:\rxxflfx.exe88⤵PID:2608
-
\??\c:\vpjpd.exec:\vpjpd.exe89⤵PID:2028
-
\??\c:\vvddv.exec:\vvddv.exe90⤵PID:2676
-
\??\c:\3jvjv.exec:\3jvjv.exe91⤵PID:2360
-
\??\c:\tnhbnh.exec:\tnhbnh.exe92⤵PID:1032
-
\??\c:\3tnbth.exec:\3tnbth.exe93⤵PID:1316
-
\??\c:\rxxfxlr.exec:\rxxfxlr.exe94⤵PID:2792
-
\??\c:\lxfxxrl.exec:\lxfxxrl.exe95⤵PID:1304
-
\??\c:\fxflllf.exec:\fxflllf.exe96⤵PID:332
-
\??\c:\xrrfrxr.exec:\xrrfrxr.exe97⤵
- System Location Discovery: System Language Discovery
PID:2864 -
\??\c:\7lllrrr.exec:\7lllrrr.exe98⤵PID:1644
-
\??\c:\pdjdp.exec:\pdjdp.exe99⤵PID:1148
-
\??\c:\dvvjd.exec:\dvvjd.exe100⤵PID:1756
-
\??\c:\7djjj.exec:\7djjj.exe101⤵PID:2996
-
\??\c:\hbhthb.exec:\hbhthb.exe102⤵PID:2220
-
\??\c:\7tnbtt.exec:\7tnbtt.exe103⤵
- System Location Discovery: System Language Discovery
PID:2316 -
\??\c:\nbhbnh.exec:\nbhbnh.exe104⤵PID:2324
-
\??\c:\nhntbt.exec:\nhntbt.exe105⤵PID:344
-
\??\c:\rlflxlx.exec:\rlflxlx.exe106⤵PID:2152
-
\??\c:\flffxfx.exec:\flffxfx.exe107⤵PID:960
-
\??\c:\ffrfxrl.exec:\ffrfxrl.exe108⤵PID:708
-
\??\c:\jdpjv.exec:\jdpjv.exe109⤵PID:2592
-
\??\c:\hhthbt.exec:\hhthbt.exe110⤵PID:1036
-
\??\c:\9nhbhh.exec:\9nhbhh.exe111⤵PID:2052
-
\??\c:\xxffflx.exec:\xxffflx.exe112⤵PID:840
-
\??\c:\9fxffxf.exec:\9fxffxf.exe113⤵PID:1796
-
\??\c:\vdvpp.exec:\vdvpp.exe114⤵PID:1944
-
\??\c:\3ttthn.exec:\3ttthn.exe115⤵PID:288
-
\??\c:\bthhnn.exec:\bthhnn.exe116⤵PID:2156
-
\??\c:\fxfrxrr.exec:\fxfrxrr.exe117⤵PID:2500
-
\??\c:\xxxfxlx.exec:\xxxfxlx.exe118⤵PID:2524
-
\??\c:\xrxfrrx.exec:\xrxfrrx.exe119⤵PID:912
-
\??\c:\rxrrffr.exec:\rxrrffr.exe120⤵PID:1788
-
\??\c:\lrlrlxf.exec:\lrlrlxf.exe121⤵PID:2436
-
\??\c:\vdvjv.exec:\vdvjv.exe122⤵PID:1708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-