Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 14:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe
-
Size
454KB
-
MD5
2ead9362f78325ac9d76078961857d83
-
SHA1
3519bf3329eab134dcd4a474e56032914af2b2ff
-
SHA256
8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be
-
SHA512
02739b5a699c51a3aef45bb7b1f3aec92b3000700296dc092a33805396c7f5600872ab1cdf696d15e50321c46bd7b5b9131700ecd6c35ac1ce036df544254d23
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeN:q7Tc2NYHUrAwfMp3CDN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/3776-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4072-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4164-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3744-22-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1232-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1184-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1404-40-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/344-53-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2264-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3736-93-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1020-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3776-218-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4800-225-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3772-236-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1104-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/812-244-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/624-260-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/880-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4160-296-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1600-334-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3404-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4408-363-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1688-379-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3416-389-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2780-408-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3824-446-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/692-459-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2164-466-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2952-740-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4400-912-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1484-815-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4432-712-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/912-555-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5000-438-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4580-419-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2496-412-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2500-318-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/808-307-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3812-303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-289-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5064-280-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2760-256-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3904-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4844-232-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4304-211-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4536-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1468-192-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3064-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2148-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1984-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2308-138-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2440-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2356-130-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/684-123-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5084-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4640-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2744-100-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4636-83-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3384-76-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3060-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2868-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1200-1851-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4072 vvvpp.exe 4164 thhtbb.exe 3744 jpjjd.exe 1232 xffllfr.exe 1184 djjjp.exe 1404 thttnn.exe 2868 ffffxxx.exe 344 xfllrrx.exe 2264 9hnhbb.exe 5028 pvvpp.exe 3060 9hnbtb.exe 3384 htnbtt.exe 4636 jjpjp.exe 3860 xxrfxrl.exe 3736 tnnhbb.exe 2744 jdvpj.exe 4640 fflffff.exe 5084 tttttt.exe 4832 5pppj.exe 684 ffxfxxr.exe 2356 bthbtt.exe 2440 3htnbb.exe 2308 7pddv.exe 2972 xlxlxxl.exe 1984 pjpjj.exe 1556 fflfxxx.exe 3556 djvvd.exe 2148 xxffllr.exe 1824 7bbnht.exe 3064 jdjdj.exe 1132 xxlffll.exe 1468 nnhhhh.exe 1020 3pdvv.exe 4536 7xllflf.exe 1672 hbbbtn.exe 4372 nntbbb.exe 4304 jdjpj.exe 4448 xxxxrxx.exe 3776 nnnbtn.exe 4208 fxfxrll.exe 4800 llxxffx.exe 1412 jddpp.exe 4844 jpddd.exe 3772 rrlfxfr.exe 1104 bnhbtn.exe 812 jddpj.exe 3388 fllxrlx.exe 3904 tnhthh.exe 2760 djdpd.exe 624 bnnntn.exe 3384 vjdjv.exe 880 9vpdd.exe 2056 lfxrlrf.exe 1832 pjpdj.exe 4616 5fxlffl.exe 5064 xfffllr.exe 8 bhhhhh.exe 1460 ddppp.exe 4496 llxxxxx.exe 2616 xlrllff.exe 4160 nbnhbb.exe 4236 dvdpj.exe 3812 xrffllx.exe 808 bhhbbn.exe -
resource yara_rule behavioral2/memory/3776-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4072-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4164-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3744-22-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1232-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1184-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1404-40-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/344-53-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2264-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3736-93-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3064-175-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1020-196-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3776-218-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-236-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1104-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/812-244-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/624-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/880-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4160-296-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1600-334-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3404-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4408-363-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1688-379-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3416-389-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2780-408-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3824-446-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/692-459-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2164-466-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-740-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4400-912-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1484-815-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4432-712-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/912-555-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3472-444-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-438-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4580-419-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2496-412-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2500-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2500-314-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/808-307-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3812-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4496-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5064-280-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2760-256-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3904-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2760-252-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4844-232-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4304-211-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4536-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1468-192-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1468-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3064-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2148-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1984-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2308-138-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2440-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2440-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-130-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/684-123-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5084-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4640-101-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5httbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnthht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxlrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lfffxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lllllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntntnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lxffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlrxx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4072 3776 8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe 84 PID 3776 wrote to memory of 4072 3776 8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe 84 PID 3776 wrote to memory of 4072 3776 8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe 84 PID 4072 wrote to memory of 4164 4072 vvvpp.exe 85 PID 4072 wrote to memory of 4164 4072 vvvpp.exe 85 PID 4072 wrote to memory of 4164 4072 vvvpp.exe 85 PID 4164 wrote to memory of 3744 4164 thhtbb.exe 86 PID 4164 wrote to memory of 3744 4164 thhtbb.exe 86 PID 4164 wrote to memory of 3744 4164 thhtbb.exe 86 PID 3744 wrote to memory of 1232 3744 jpjjd.exe 87 PID 3744 wrote to memory of 1232 3744 jpjjd.exe 87 PID 3744 wrote to memory of 1232 3744 jpjjd.exe 87 PID 1232 wrote to memory of 1184 1232 xffllfr.exe 88 PID 1232 wrote to memory of 1184 1232 xffllfr.exe 88 PID 1232 wrote to memory of 1184 1232 xffllfr.exe 88 PID 1184 wrote to memory of 1404 1184 djjjp.exe 89 PID 1184 wrote to memory of 1404 1184 djjjp.exe 89 PID 1184 wrote to memory of 1404 1184 djjjp.exe 89 PID 1404 wrote to memory of 2868 1404 thttnn.exe 90 PID 1404 wrote to memory of 2868 1404 thttnn.exe 90 PID 1404 wrote to memory of 2868 1404 thttnn.exe 90 PID 2868 wrote to memory of 344 2868 ffffxxx.exe 446 PID 2868 wrote to memory of 344 2868 ffffxxx.exe 446 PID 2868 wrote to memory of 344 2868 ffffxxx.exe 446 PID 344 wrote to memory of 2264 344 xfllrrx.exe 93 PID 344 wrote to memory of 2264 344 xfllrrx.exe 93 PID 344 wrote to memory of 2264 344 xfllrrx.exe 93 PID 2264 wrote to memory of 5028 2264 9hnhbb.exe 94 PID 2264 wrote to memory of 5028 2264 9hnhbb.exe 94 PID 2264 wrote to memory of 5028 2264 9hnhbb.exe 94 PID 5028 wrote to memory of 3060 5028 pvvpp.exe 95 PID 5028 wrote to memory of 3060 5028 pvvpp.exe 95 PID 5028 wrote to memory of 3060 5028 pvvpp.exe 95 PID 3060 wrote to memory of 3384 3060 9hnbtb.exe 96 PID 3060 wrote to memory of 3384 3060 9hnbtb.exe 96 PID 3060 wrote to memory of 3384 3060 9hnbtb.exe 96 PID 3384 wrote to memory of 4636 3384 htnbtt.exe 98 PID 3384 wrote to memory of 4636 3384 htnbtt.exe 98 PID 3384 wrote to memory of 4636 3384 htnbtt.exe 98 PID 4636 wrote to memory of 3860 4636 jjpjp.exe 99 PID 4636 wrote to memory of 3860 4636 jjpjp.exe 99 PID 4636 wrote to memory of 3860 4636 jjpjp.exe 99 PID 3860 wrote to memory of 3736 3860 xxrfxrl.exe 363 PID 3860 wrote to memory of 3736 3860 xxrfxrl.exe 363 PID 3860 wrote to memory of 3736 3860 xxrfxrl.exe 363 PID 3736 wrote to memory of 2744 3736 tnnhbb.exe 101 PID 3736 wrote to memory of 2744 3736 tnnhbb.exe 101 PID 3736 wrote to memory of 2744 3736 tnnhbb.exe 101 PID 2744 wrote to memory of 4640 2744 jdvpj.exe 103 PID 2744 wrote to memory of 4640 2744 jdvpj.exe 103 PID 2744 wrote to memory of 4640 2744 jdvpj.exe 103 PID 4640 wrote to memory of 5084 4640 fflffff.exe 104 PID 4640 wrote to memory of 5084 4640 fflffff.exe 104 PID 4640 wrote to memory of 5084 4640 fflffff.exe 104 PID 5084 wrote to memory of 4832 5084 tttttt.exe 105 PID 5084 wrote to memory of 4832 5084 tttttt.exe 105 PID 5084 wrote to memory of 4832 5084 tttttt.exe 105 PID 4832 wrote to memory of 684 4832 5pppj.exe 106 PID 4832 wrote to memory of 684 4832 5pppj.exe 106 PID 4832 wrote to memory of 684 4832 5pppj.exe 106 PID 684 wrote to memory of 2356 684 ffxfxxr.exe 107 PID 684 wrote to memory of 2356 684 ffxfxxr.exe 107 PID 684 wrote to memory of 2356 684 ffxfxxr.exe 107 PID 2356 wrote to memory of 2440 2356 bthbtt.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe"C:\Users\Admin\AppData\Local\Temp\8e024154f71481cf7e674012754362178903ac682f3ca721dad1998a267725be.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
\??\c:\vvvpp.exec:\vvvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
\??\c:\thhtbb.exec:\thhtbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\jpjjd.exec:\jpjjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
\??\c:\xffllfr.exec:\xffllfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\djjjp.exec:\djjjp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\thttnn.exec:\thttnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\ffffxxx.exec:\ffffxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\xfllrrx.exec:\xfllrrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:344 -
\??\c:\9hnhbb.exec:\9hnhbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\pvvpp.exec:\pvvpp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\9hnbtb.exec:\9hnbtb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\htnbtt.exec:\htnbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\jjpjp.exec:\jjpjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\xxrfxrl.exec:\xxrfxrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\tnnhbb.exec:\tnnhbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\jdvpj.exec:\jdvpj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\fflffff.exec:\fflffff.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\tttttt.exec:\tttttt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\5pppj.exec:\5pppj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\ffxfxxr.exec:\ffxfxxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\bthbtt.exec:\bthbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\3htnbb.exec:\3htnbb.exe23⤵
- Executes dropped EXE
PID:2440 -
\??\c:\7pddv.exec:\7pddv.exe24⤵
- Executes dropped EXE
PID:2308 -
\??\c:\xlxlxxl.exec:\xlxlxxl.exe25⤵
- Executes dropped EXE
PID:2972 -
\??\c:\pjpjj.exec:\pjpjj.exe26⤵
- Executes dropped EXE
PID:1984 -
\??\c:\fflfxxx.exec:\fflfxxx.exe27⤵
- Executes dropped EXE
PID:1556 -
\??\c:\djvvd.exec:\djvvd.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556 -
\??\c:\xxffllr.exec:\xxffllr.exe29⤵
- Executes dropped EXE
PID:2148 -
\??\c:\7bbnht.exec:\7bbnht.exe30⤵
- Executes dropped EXE
PID:1824 -
\??\c:\jdjdj.exec:\jdjdj.exe31⤵
- Executes dropped EXE
PID:3064 -
\??\c:\xxlffll.exec:\xxlffll.exe32⤵
- Executes dropped EXE
PID:1132 -
\??\c:\nnhhhh.exec:\nnhhhh.exe33⤵
- Executes dropped EXE
PID:1468 -
\??\c:\3pdvv.exec:\3pdvv.exe34⤵
- Executes dropped EXE
PID:1020 -
\??\c:\7xllflf.exec:\7xllflf.exe35⤵
- Executes dropped EXE
PID:4536 -
\??\c:\hbbbtn.exec:\hbbbtn.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672 -
\??\c:\nntbbb.exec:\nntbbb.exe37⤵
- Executes dropped EXE
PID:4372 -
\??\c:\jdjpj.exec:\jdjpj.exe38⤵
- Executes dropped EXE
PID:4304 -
\??\c:\xxxxrxx.exec:\xxxxrxx.exe39⤵
- Executes dropped EXE
PID:4448 -
\??\c:\nnnbtn.exec:\nnnbtn.exe40⤵
- Executes dropped EXE
PID:3776 -
\??\c:\fxfxrll.exec:\fxfxrll.exe41⤵
- Executes dropped EXE
PID:4208 -
\??\c:\llxxffx.exec:\llxxffx.exe42⤵
- Executes dropped EXE
PID:4800 -
\??\c:\jddpp.exec:\jddpp.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1412 -
\??\c:\jpddd.exec:\jpddd.exe44⤵
- Executes dropped EXE
PID:4844 -
\??\c:\rrlfxfr.exec:\rrlfxfr.exe45⤵
- Executes dropped EXE
PID:3772 -
\??\c:\bnhbtn.exec:\bnhbtn.exe46⤵
- Executes dropped EXE
PID:1104 -
\??\c:\jddpj.exec:\jddpj.exe47⤵
- Executes dropped EXE
PID:812 -
\??\c:\fllxrlx.exec:\fllxrlx.exe48⤵
- Executes dropped EXE
PID:3388 -
\??\c:\tnhthh.exec:\tnhthh.exe49⤵
- Executes dropped EXE
PID:3904 -
\??\c:\djdpd.exec:\djdpd.exe50⤵
- Executes dropped EXE
PID:2760 -
\??\c:\bnnntn.exec:\bnnntn.exe51⤵
- Executes dropped EXE
PID:624 -
\??\c:\vjdjv.exec:\vjdjv.exe52⤵
- Executes dropped EXE
PID:3384 -
\??\c:\9vpdd.exec:\9vpdd.exe53⤵
- Executes dropped EXE
PID:880 -
\??\c:\lfxrlrf.exec:\lfxrlrf.exe54⤵
- Executes dropped EXE
PID:2056 -
\??\c:\pjpdj.exec:\pjpdj.exe55⤵
- Executes dropped EXE
PID:1832 -
\??\c:\5fxlffl.exec:\5fxlffl.exe56⤵
- Executes dropped EXE
PID:4616 -
\??\c:\xfffllr.exec:\xfffllr.exe57⤵
- Executes dropped EXE
PID:5064 -
\??\c:\bhhhhh.exec:\bhhhhh.exe58⤵
- Executes dropped EXE
PID:8 -
\??\c:\ddppp.exec:\ddppp.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1460 -
\??\c:\llxxxxx.exec:\llxxxxx.exe60⤵
- Executes dropped EXE
PID:4496 -
\??\c:\xlrllff.exec:\xlrllff.exe61⤵
- Executes dropped EXE
PID:2616 -
\??\c:\nbnhbb.exec:\nbnhbb.exe62⤵
- Executes dropped EXE
PID:4160 -
\??\c:\dvdpj.exec:\dvdpj.exe63⤵
- Executes dropped EXE
PID:4236 -
\??\c:\xrffllx.exec:\xrffllx.exe64⤵
- Executes dropped EXE
PID:3812 -
\??\c:\bhhbbn.exec:\bhhbbn.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:808 -
\??\c:\bhbtbh.exec:\bhbtbh.exe66⤵PID:3152
-
\??\c:\dvdjv.exec:\dvdjv.exe67⤵
- System Location Discovery: System Language Discovery
PID:3332 -
\??\c:\xxrlfff.exec:\xxrlfff.exe68⤵PID:2500
-
\??\c:\bbnhnn.exec:\bbnhnn.exe69⤵
- System Location Discovery: System Language Discovery
PID:4384 -
\??\c:\thhhbh.exec:\thhhbh.exe70⤵PID:1516
-
\??\c:\ddpjd.exec:\ddpjd.exe71⤵PID:2952
-
\??\c:\7lfffxl.exec:\7lfffxl.exe72⤵
- System Location Discovery: System Language Discovery
PID:1132 -
\??\c:\bnthbb.exec:\bnthbb.exe73⤵PID:1600
-
\??\c:\jjjdd.exec:\jjjdd.exe74⤵PID:4976
-
\??\c:\jjjjj.exec:\jjjjj.exe75⤵PID:2224
-
\??\c:\xrxrllf.exec:\xrxrllf.exe76⤵PID:432
-
\??\c:\5tbtnn.exec:\5tbtnn.exe77⤵PID:1856
-
\??\c:\thbnhb.exec:\thbnhb.exe78⤵PID:1496
-
\??\c:\dpjdp.exec:\dpjdp.exe79⤵PID:2892
-
\??\c:\rfrfrfr.exec:\rfrfrfr.exe80⤵PID:3404
-
\??\c:\3tbbhh.exec:\3tbbhh.exe81⤵PID:2768
-
\??\c:\nnnnhb.exec:\nnnnhb.exe82⤵PID:4408
-
\??\c:\jdpdp.exec:\jdpdp.exe83⤵PID:2820
-
\??\c:\vpjvp.exec:\vpjvp.exe84⤵
- System Location Discovery: System Language Discovery
PID:1852 -
\??\c:\xfrlrxx.exec:\xfrlrxx.exe85⤵
- System Location Discovery: System Language Discovery
PID:1120 -
\??\c:\hbtntt.exec:\hbtntt.exe86⤵PID:940
-
\??\c:\jvvjd.exec:\jvvjd.exe87⤵PID:1688
-
\??\c:\9lrflrl.exec:\9lrflrl.exe88⤵PID:2344
-
\??\c:\3rlfrlx.exec:\3rlfrlx.exe89⤵PID:1404
-
\??\c:\bttnhh.exec:\bttnhh.exe90⤵PID:3416
-
\??\c:\pdvjd.exec:\pdvjd.exe91⤵PID:3568
-
\??\c:\nttntn.exec:\nttntn.exe92⤵PID:1492
-
\??\c:\vjvpp.exec:\vjvpp.exe93⤵PID:2116
-
\??\c:\vpjdv.exec:\vpjdv.exe94⤵
- System Location Discovery: System Language Discovery
PID:1912 -
\??\c:\frxfxff.exec:\frxfxff.exe95⤵PID:1268
-
\??\c:\nbhbtt.exec:\nbhbtt.exe96⤵PID:2780
-
\??\c:\vjppj.exec:\vjppj.exe97⤵PID:2496
-
\??\c:\dppjj.exec:\dppjj.exe98⤵PID:3472
-
\??\c:\rlxxrll.exec:\rlxxrll.exe99⤵PID:4580
-
\??\c:\nntttb.exec:\nntttb.exe100⤵PID:4896
-
\??\c:\pdppd.exec:\pdppd.exe101⤵PID:4832
-
\??\c:\pvddj.exec:\pvddj.exe102⤵PID:4868
-
\??\c:\3xxfrxf.exec:\3xxfrxf.exe103⤵PID:2356
-
\??\c:\nbthnb.exec:\nbthnb.exe104⤵PID:3460
-
\??\c:\vvjpp.exec:\vvjpp.exe105⤵PID:5000
-
\??\c:\dvdpv.exec:\dvdpv.exe106⤵PID:4856
-
\??\c:\xxlllll.exec:\xxlllll.exe107⤵PID:3824
-
\??\c:\htbbtt.exec:\htbbtt.exe108⤵PID:3812
-
\??\c:\ttbtnh.exec:\ttbtnh.exe109⤵PID:3672
-
\??\c:\jdddd.exec:\jdddd.exe110⤵PID:1752
-
\??\c:\rlrflfl.exec:\rlrflfl.exe111⤵
- System Location Discovery: System Language Discovery
PID:692 -
\??\c:\bbtbhn.exec:\bbtbhn.exe112⤵PID:3652
-
\??\c:\9jjdd.exec:\9jjdd.exe113⤵PID:2164
-
\??\c:\dvjjj.exec:\dvjjj.exe114⤵PID:1312
-
\??\c:\flxxxlx.exec:\flxxxlx.exe115⤵PID:4028
-
\??\c:\thhbnn.exec:\thhbnn.exe116⤵PID:2952
-
\??\c:\ddjpv.exec:\ddjpv.exe117⤵
- System Location Discovery: System Language Discovery
PID:3876 -
\??\c:\dpppj.exec:\dpppj.exe118⤵PID:384
-
\??\c:\frrflfr.exec:\frrflfr.exe119⤵PID:4976
-
\??\c:\tbbttt.exec:\tbbttt.exe120⤵PID:5004
-
\??\c:\vdppd.exec:\vdppd.exe121⤵PID:2380
-
\??\c:\dvjjj.exec:\dvjjj.exe122⤵PID:3020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-