Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 11:59
Behavioral task
behavioral1
Sample
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
-
Size
3.7MB
-
MD5
a539ca67aff364eb0738de8bbaeaebb0
-
SHA1
3cc0c2947e262bede4b75efbdf38e6e2987c5356
-
SHA256
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4
-
SHA512
1f4e0d506e8248b3982c86dcb57687613de1375b781b0a456fb2b51bf3a1755d2340b13b89bc6c9f1012e35cc2b1fd4d253c6d616d844b4eda495506bc4b04ea
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98P:U6XLq/qPPslzKx/dJg1ErmN8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 55 IoCs
resource yara_rule behavioral1/memory/2332-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/784-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2920-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2708-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2884-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2920-61-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2748-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2748-69-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2140-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2728-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2908-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1108-115-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3032-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1500-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2932-143-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2928-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/812-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2340-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2400-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/856-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1744-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/884-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/884-232-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1260-242-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1532-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1140-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1600-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2288-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2196-326-0x0000000000430000-0x0000000000457000-memory.dmp family_blackmoon behavioral1/memory/484-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2880-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2644-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-386-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2736-388-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1440-449-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/964-505-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2304-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1728-568-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2860-637-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1784-680-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1488-713-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2516-781-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/884-788-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/1556-802-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1184-846-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/496-851-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/812-995-0x0000000000430000-0x0000000000457000-memory.dmp family_blackmoon behavioral1/memory/1944-1069-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/708-1074-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1332-1089-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1372-1101-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2448-1202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2448-1209-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2864-1234-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/772-1293-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 784 vvjjp.exe 2920 rfllfxx.exe 2192 lrxfrxx.exe 2708 lxxfxfr.exe 2884 5hbtth.exe 2748 rflffrx.exe 2840 tnnnnn.exe 2728 hhhhnh.exe 2140 pjjjj.exe 2908 pjjdd.exe 1108 bnhhtn.exe 3032 pdvvj.exe 1500 rxfrlxr.exe 2932 nnbhtb.exe 2928 ddppj.exe 812 jjppd.exe 1064 hnhntt.exe 2340 bbtnht.exe 2400 jvjdv.exe 1744 lrrflxf.exe 856 bhnnth.exe 848 btnnbb.exe 1248 xfllllx.exe 884 rxfrrrx.exe 1260 jdddj.exe 916 tbbtbb.exe 1140 9xfxrxl.exe 1532 rxxffxf.exe 1600 pvdpp.exe 1844 3vpvd.exe 904 flfrxxx.exe 1540 ntbtnh.exe 496 fxllrrr.exe 3052 nbtttb.exe 2288 lffxlff.exe 2196 jpppj.exe 484 vjjvv.exe 2192 ppdvd.exe 2880 lrrxxll.exe 2756 bnhhbn.exe 2896 jvvdp.exe 2748 nntbnt.exe 2644 thnbbh.exe 2904 pvjdv.exe 2736 3xfllrf.exe 1284 nhhhth.exe 2004 ddjdv.exe 1308 jpppp.exe 3020 btbtth.exe 3032 vvdpj.exe 2716 llfxllf.exe 2792 fffxfrl.exe 3008 xxrrxxx.exe 1588 lxlxlxf.exe 1440 1bhtnb.exe 1404 pjvjj.exe 2324 jvjpj.exe 2340 vjdpd.exe 2380 btbbtn.exe 2404 htbnhh.exe 1676 jjvdv.exe 1180 jjvdv.exe 1268 lfxflrx.exe 848 bhhhtt.exe -
resource yara_rule behavioral1/memory/2332-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000c000000012267-6.dat upx behavioral1/memory/2332-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000015d79-18.dat upx behavioral1/memory/784-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2920-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000015d81-31.dat upx behavioral1/memory/2920-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000015d2a-39.dat upx behavioral1/files/0x0007000000015f71-50.dat upx behavioral1/memory/2708-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2708-46-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0007000000015ff5-57.dat upx behavioral1/memory/2884-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2748-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016101-71.dat upx behavioral1/memory/2748-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016241-79.dat upx behavioral1/memory/2140-90-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d2e-89.dat upx behavioral1/memory/2728-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016d36-98.dat upx behavioral1/memory/1108-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2908-105-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016d3f-108.dat upx behavioral1/files/0x0006000000016d47-116.dat upx behavioral1/memory/1108-115-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016d4f-125.dat upx behavioral1/memory/1500-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3032-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1500-134-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016d63-135.dat upx behavioral1/memory/2932-143-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016d69-144.dat upx behavioral1/files/0x0006000000016d6d-154.dat upx behavioral1/memory/2928-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016d72-162.dat upx behavioral1/memory/812-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016dd9-171.dat upx behavioral1/memory/2340-178-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016de0-177.dat upx behavioral1/memory/2400-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016dea-190.dat upx behavioral1/memory/856-201-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000016eb4-200.dat upx behavioral1/memory/1744-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000600000001743a-208.dat upx behavioral1/files/0x000600000001747d-216.dat upx behavioral1/files/0x0006000000017491-224.dat upx behavioral1/files/0x00060000000175e7-235.dat upx behavioral1/memory/884-233-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1260-242-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018669-243.dat upx behavioral1/files/0x001400000001866f-251.dat upx behavioral1/files/0x0011000000018682-260.dat upx behavioral1/memory/1532-261-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1140-259-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001868b-269.dat upx behavioral1/files/0x00050000000186f2-277.dat upx behavioral1/memory/1600-276-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186f8-287.dat upx behavioral1/memory/904-286-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018731-293.dat upx behavioral1/memory/2288-314-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrfrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hbtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxlflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxlrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfllfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxfrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrffrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 784 2332 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 2332 wrote to memory of 784 2332 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 2332 wrote to memory of 784 2332 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 2332 wrote to memory of 784 2332 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 784 wrote to memory of 2920 784 vvjjp.exe 31 PID 784 wrote to memory of 2920 784 vvjjp.exe 31 PID 784 wrote to memory of 2920 784 vvjjp.exe 31 PID 784 wrote to memory of 2920 784 vvjjp.exe 31 PID 2920 wrote to memory of 2192 2920 rfllfxx.exe 32 PID 2920 wrote to memory of 2192 2920 rfllfxx.exe 32 PID 2920 wrote to memory of 2192 2920 rfllfxx.exe 32 PID 2920 wrote to memory of 2192 2920 rfllfxx.exe 32 PID 2192 wrote to memory of 2708 2192 lrxfrxx.exe 33 PID 2192 wrote to memory of 2708 2192 lrxfrxx.exe 33 PID 2192 wrote to memory of 2708 2192 lrxfrxx.exe 33 PID 2192 wrote to memory of 2708 2192 lrxfrxx.exe 33 PID 2708 wrote to memory of 2884 2708 lxxfxfr.exe 34 PID 2708 wrote to memory of 2884 2708 lxxfxfr.exe 34 PID 2708 wrote to memory of 2884 2708 lxxfxfr.exe 34 PID 2708 wrote to memory of 2884 2708 lxxfxfr.exe 34 PID 2884 wrote to memory of 2748 2884 5hbtth.exe 35 PID 2884 wrote to memory of 2748 2884 5hbtth.exe 35 PID 2884 wrote to memory of 2748 2884 5hbtth.exe 35 PID 2884 wrote to memory of 2748 2884 5hbtth.exe 35 PID 2748 wrote to memory of 2840 2748 rflffrx.exe 36 PID 2748 wrote to memory of 2840 2748 rflffrx.exe 36 PID 2748 wrote to memory of 2840 2748 rflffrx.exe 36 PID 2748 wrote to memory of 2840 2748 rflffrx.exe 36 PID 2840 wrote to memory of 2728 2840 tnnnnn.exe 37 PID 2840 wrote to memory of 2728 2840 tnnnnn.exe 37 PID 2840 wrote to memory of 2728 2840 tnnnnn.exe 37 PID 2840 wrote to memory of 2728 2840 tnnnnn.exe 37 PID 2728 wrote to memory of 2140 2728 hhhhnh.exe 38 PID 2728 wrote to memory of 2140 2728 hhhhnh.exe 38 PID 2728 wrote to memory of 2140 2728 hhhhnh.exe 38 PID 2728 wrote to memory of 2140 2728 hhhhnh.exe 38 PID 2140 wrote to memory of 2908 2140 pjjjj.exe 39 PID 2140 wrote to memory of 2908 2140 pjjjj.exe 39 PID 2140 wrote to memory of 2908 2140 pjjjj.exe 39 PID 2140 wrote to memory of 2908 2140 pjjjj.exe 39 PID 2908 wrote to memory of 1108 2908 pjjdd.exe 40 PID 2908 wrote to memory of 1108 2908 pjjdd.exe 40 PID 2908 wrote to memory of 1108 2908 pjjdd.exe 40 PID 2908 wrote to memory of 1108 2908 pjjdd.exe 40 PID 1108 wrote to memory of 3032 1108 bnhhtn.exe 41 PID 1108 wrote to memory of 3032 1108 bnhhtn.exe 41 PID 1108 wrote to memory of 3032 1108 bnhhtn.exe 41 PID 1108 wrote to memory of 3032 1108 bnhhtn.exe 41 PID 3032 wrote to memory of 1500 3032 pdvvj.exe 42 PID 3032 wrote to memory of 1500 3032 pdvvj.exe 42 PID 3032 wrote to memory of 1500 3032 pdvvj.exe 42 PID 3032 wrote to memory of 1500 3032 pdvvj.exe 42 PID 1500 wrote to memory of 2932 1500 rxfrlxr.exe 43 PID 1500 wrote to memory of 2932 1500 rxfrlxr.exe 43 PID 1500 wrote to memory of 2932 1500 rxfrlxr.exe 43 PID 1500 wrote to memory of 2932 1500 rxfrlxr.exe 43 PID 2932 wrote to memory of 2928 2932 nnbhtb.exe 44 PID 2932 wrote to memory of 2928 2932 nnbhtb.exe 44 PID 2932 wrote to memory of 2928 2932 nnbhtb.exe 44 PID 2932 wrote to memory of 2928 2932 nnbhtb.exe 44 PID 2928 wrote to memory of 812 2928 ddppj.exe 45 PID 2928 wrote to memory of 812 2928 ddppj.exe 45 PID 2928 wrote to memory of 812 2928 ddppj.exe 45 PID 2928 wrote to memory of 812 2928 ddppj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\vvjjp.exec:\vvjjp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:784 -
\??\c:\rfllfxx.exec:\rfllfxx.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\lrxfrxx.exec:\lrxfrxx.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\lxxfxfr.exec:\lxxfxfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\5hbtth.exec:\5hbtth.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\rflffrx.exec:\rflffrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\tnnnnn.exec:\tnnnnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\hhhhnh.exec:\hhhhnh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\pjjjj.exec:\pjjjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\pjjdd.exec:\pjjdd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\bnhhtn.exec:\bnhhtn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\pdvvj.exec:\pdvvj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\rxfrlxr.exec:\rxfrlxr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
\??\c:\nnbhtb.exec:\nnbhtb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\ddppj.exec:\ddppj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\jjppd.exec:\jjppd.exe17⤵
- Executes dropped EXE
PID:812 -
\??\c:\hnhntt.exec:\hnhntt.exe18⤵
- Executes dropped EXE
PID:1064 -
\??\c:\bbtnht.exec:\bbtnht.exe19⤵
- Executes dropped EXE
PID:2340 -
\??\c:\jvjdv.exec:\jvjdv.exe20⤵
- Executes dropped EXE
PID:2400 -
\??\c:\lrrflxf.exec:\lrrflxf.exe21⤵
- Executes dropped EXE
PID:1744 -
\??\c:\bhnnth.exec:\bhnnth.exe22⤵
- Executes dropped EXE
PID:856 -
\??\c:\btnnbb.exec:\btnnbb.exe23⤵
- Executes dropped EXE
PID:848 -
\??\c:\xfllllx.exec:\xfllllx.exe24⤵
- Executes dropped EXE
PID:1248 -
\??\c:\rxfrrrx.exec:\rxfrrrx.exe25⤵
- Executes dropped EXE
PID:884 -
\??\c:\jdddj.exec:\jdddj.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1260 -
\??\c:\tbbtbb.exec:\tbbtbb.exe27⤵
- Executes dropped EXE
PID:916 -
\??\c:\9xfxrxl.exec:\9xfxrxl.exe28⤵
- Executes dropped EXE
PID:1140 -
\??\c:\rxxffxf.exec:\rxxffxf.exe29⤵
- Executes dropped EXE
PID:1532 -
\??\c:\pvdpp.exec:\pvdpp.exe30⤵
- Executes dropped EXE
PID:1600 -
\??\c:\3vpvd.exec:\3vpvd.exe31⤵
- Executes dropped EXE
PID:1844 -
\??\c:\flfrxxx.exec:\flfrxxx.exe32⤵
- Executes dropped EXE
PID:904 -
\??\c:\ntbtnh.exec:\ntbtnh.exe33⤵
- Executes dropped EXE
PID:1540 -
\??\c:\fxllrrr.exec:\fxllrrr.exe34⤵
- Executes dropped EXE
PID:496 -
\??\c:\nbtttb.exec:\nbtttb.exe35⤵
- Executes dropped EXE
PID:3052 -
\??\c:\lffxlff.exec:\lffxlff.exe36⤵
- Executes dropped EXE
PID:2288 -
\??\c:\jpppj.exec:\jpppj.exe37⤵
- Executes dropped EXE
PID:2196 -
\??\c:\vjjvv.exec:\vjjvv.exe38⤵
- Executes dropped EXE
PID:484 -
\??\c:\ppdvd.exec:\ppdvd.exe39⤵
- Executes dropped EXE
PID:2192 -
\??\c:\lrrxxll.exec:\lrrxxll.exe40⤵
- Executes dropped EXE
PID:2880 -
\??\c:\bnhhbn.exec:\bnhhbn.exe41⤵
- Executes dropped EXE
PID:2756 -
\??\c:\jvvdp.exec:\jvvdp.exe42⤵
- Executes dropped EXE
PID:2896 -
\??\c:\nntbnt.exec:\nntbnt.exe43⤵
- Executes dropped EXE
PID:2748 -
\??\c:\thnbbh.exec:\thnbbh.exe44⤵
- Executes dropped EXE
PID:2644 -
\??\c:\pvjdv.exec:\pvjdv.exe45⤵
- Executes dropped EXE
PID:2904 -
\??\c:\3xfllrf.exec:\3xfllrf.exe46⤵
- Executes dropped EXE
PID:2736 -
\??\c:\nhhhth.exec:\nhhhth.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
\??\c:\ddjdv.exec:\ddjdv.exe48⤵
- Executes dropped EXE
PID:2004 -
\??\c:\jpppp.exec:\jpppp.exe49⤵
- Executes dropped EXE
PID:1308 -
\??\c:\btbtth.exec:\btbtth.exe50⤵
- Executes dropped EXE
PID:3020 -
\??\c:\vvdpj.exec:\vvdpj.exe51⤵
- Executes dropped EXE
PID:3032 -
\??\c:\llfxllf.exec:\llfxllf.exe52⤵
- Executes dropped EXE
PID:2716 -
\??\c:\fffxfrl.exec:\fffxfrl.exe53⤵
- Executes dropped EXE
PID:2792 -
\??\c:\xxrrxxx.exec:\xxrrxxx.exe54⤵
- Executes dropped EXE
PID:3008 -
\??\c:\lxlxlxf.exec:\lxlxlxf.exe55⤵
- Executes dropped EXE
PID:1588 -
\??\c:\1bhtnb.exec:\1bhtnb.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1440 -
\??\c:\pjvjj.exec:\pjvjj.exe57⤵
- Executes dropped EXE
PID:1404 -
\??\c:\jvjpj.exec:\jvjpj.exe58⤵
- Executes dropped EXE
PID:2324 -
\??\c:\vjdpd.exec:\vjdpd.exe59⤵
- Executes dropped EXE
PID:2340 -
\??\c:\btbbtn.exec:\btbbtn.exe60⤵
- Executes dropped EXE
PID:2380 -
\??\c:\htbnhh.exec:\htbnhh.exe61⤵
- Executes dropped EXE
PID:2404 -
\??\c:\jjvdv.exec:\jjvdv.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676 -
\??\c:\jjvdv.exec:\jjvdv.exe63⤵
- Executes dropped EXE
PID:1180 -
\??\c:\lfxflrx.exec:\lfxflrx.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1268 -
\??\c:\bhhhtt.exec:\bhhhtt.exe65⤵
- Executes dropped EXE
PID:848 -
\??\c:\thnhbb.exec:\thnhbb.exe66⤵PID:1628
-
\??\c:\lrrrlxf.exec:\lrrrlxf.exe67⤵PID:964
-
\??\c:\bntnhn.exec:\bntnhn.exe68⤵PID:2104
-
\??\c:\htnnnb.exec:\htnnnb.exe69⤵PID:960
-
\??\c:\tnhtth.exec:\tnhtth.exe70⤵PID:892
-
\??\c:\vjjjd.exec:\vjjjd.exe71⤵PID:2304
-
\??\c:\vjpjj.exec:\vjpjj.exe72⤵PID:2800
-
\??\c:\jdvvj.exec:\jdvvj.exe73⤵
- System Location Discovery: System Language Discovery
PID:1356 -
\??\c:\pddjd.exec:\pddjd.exe74⤵PID:2492
-
\??\c:\rxfllrf.exec:\rxfllrf.exe75⤵PID:1396
-
\??\c:\ffflrlf.exec:\ffflrlf.exe76⤵PID:1184
-
\??\c:\lrlxxxx.exec:\lrlxxxx.exe77⤵PID:1728
-
\??\c:\9fxxrrr.exec:\9fxxrrr.exe78⤵PID:2376
-
\??\c:\nnttnb.exec:\nnttnb.exe79⤵PID:2412
-
\??\c:\bhnbnb.exec:\bhnbnb.exe80⤵PID:2296
-
\??\c:\bttnbb.exec:\bttnbb.exe81⤵PID:2344
-
\??\c:\pjvvd.exec:\pjvvd.exe82⤵PID:3048
-
\??\c:\jdjvp.exec:\jdjvp.exe83⤵PID:2264
-
\??\c:\xrrffrl.exec:\xrrffrl.exe84⤵PID:2828
-
\??\c:\rfxffll.exec:\rfxffll.exe85⤵PID:2744
-
\??\c:\flrflxr.exec:\flrflxr.exe86⤵PID:2740
-
\??\c:\rxfllrr.exec:\rxfllrr.exe87⤵PID:2760
-
\??\c:\nhtbhn.exec:\nhtbhn.exe88⤵PID:2860
-
\??\c:\tnbhnb.exec:\tnbhnb.exe89⤵PID:2672
-
\??\c:\jvppj.exec:\jvppj.exe90⤵PID:2668
-
\??\c:\dppjj.exec:\dppjj.exe91⤵PID:2784
-
\??\c:\dvvjj.exec:\dvvjj.exe92⤵PID:2164
-
\??\c:\pvppd.exec:\pvppd.exe93⤵
- System Location Discovery: System Language Discovery
PID:2512 -
\??\c:\5llflff.exec:\5llflff.exe94⤵PID:2852
-
\??\c:\dvjpp.exec:\dvjpp.exe95⤵PID:1784
-
\??\c:\rxxlfrl.exec:\rxxlfrl.exe96⤵PID:1492
-
\??\c:\nbhbhh.exec:\nbhbhh.exe97⤵PID:1488
-
\??\c:\9vppp.exec:\9vppp.exe98⤵
- System Location Discovery: System Language Discovery
PID:2716 -
\??\c:\1dppp.exec:\1dppp.exe99⤵PID:3036
-
\??\c:\fxxrrlf.exec:\fxxrrlf.exe100⤵PID:3028
-
\??\c:\xxxxxlr.exec:\xxxxxlr.exe101⤵PID:2464
-
\??\c:\fxxrflx.exec:\fxxrflx.exe102⤵PID:2656
-
\??\c:\lffxrrl.exec:\lffxrrl.exe103⤵
- System Location Discovery: System Language Discovery
PID:2372 -
\??\c:\hhnnnt.exec:\hhnnnt.exe104⤵PID:1344
-
\??\c:\ntbbnh.exec:\ntbbnh.exe105⤵PID:2408
-
\??\c:\hbtnbb.exec:\hbtnbb.exe106⤵
- System Location Discovery: System Language Discovery
PID:2348 -
\??\c:\3dddp.exec:\3dddp.exe107⤵PID:1348
-
\??\c:\rfxfffl.exec:\rfxfffl.exe108⤵PID:680
-
\??\c:\xxlfffx.exec:\xxlfffx.exe109⤵PID:1004
-
\??\c:\bhtnnb.exec:\bhtnnb.exe110⤵PID:2516
-
\??\c:\vddjv.exec:\vddjv.exe111⤵
- System Location Discovery: System Language Discovery
PID:884 -
\??\c:\rxxxllr.exec:\rxxxllr.exe112⤵PID:964
-
\??\c:\rflrrll.exec:\rflrrll.exe113⤵PID:1556
-
\??\c:\rxrxrrx.exec:\rxrxrrx.exe114⤵PID:1708
-
\??\c:\lrrfffr.exec:\lrrfffr.exe115⤵PID:2496
-
\??\c:\xrffxxx.exec:\xrffxxx.exe116⤵PID:2304
-
\??\c:\nbnhbt.exec:\nbnhbt.exe117⤵PID:2800
-
\??\c:\nnhnht.exec:\nnhnht.exe118⤵PID:1956
-
\??\c:\tnnnbn.exec:\tnnnbn.exe119⤵PID:3068
-
\??\c:\bhhnnn.exec:\bhhnnn.exe120⤵PID:2056
-
\??\c:\thbbhh.exec:\thbbhh.exe121⤵PID:1184
-
\??\c:\htnhnn.exec:\htnhnn.exe122⤵PID:496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-