Analysis
-
max time kernel
120s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 11:59
Behavioral task
behavioral1
Sample
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
-
Size
3.7MB
-
MD5
a539ca67aff364eb0738de8bbaeaebb0
-
SHA1
3cc0c2947e262bede4b75efbdf38e6e2987c5356
-
SHA256
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4
-
SHA512
1f4e0d506e8248b3982c86dcb57687613de1375b781b0a456fb2b51bf3a1755d2340b13b89bc6c9f1012e35cc2b1fd4d253c6d616d844b4eda495506bc4b04ea
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98P:U6XLq/qPPslzKx/dJg1ErmN8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2396-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4040-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4660-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/544-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1544-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4848-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4964-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4964-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1252-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-60-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2828-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5052-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4100-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1480-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1968-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/940-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2252-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4404-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3936-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1476-139-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2456-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2632-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/440-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1600-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/440-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3960-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2608-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1252-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2988-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3544-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4992-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3372-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5052-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1356-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2392-252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1116-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5048-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2056-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3016-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3232-303-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4464-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1548-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2276-345-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4992-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/228-362-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/232-372-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/856-385-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2320-407-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-435-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3164-439-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1192-467-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2160-495-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2456-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2920-608-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3544-618-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4756-628-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4188-647-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5100-657-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1480-664-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3232-701-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3872-723-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1932-736-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2164-983-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 4040 tbttbb.exe 4660 lxrffrr.exe 544 5fffxxr.exe 1544 nhnntb.exe 4848 vjppj.exe 1056 jddvp.exe 4964 fxffxxx.exe 1252 nhtnhh.exe 1608 tbnnhn.exe 2828 9vvvj.exe 2792 jpvpp.exe 5052 bbhbbb.exe 3712 rlllfff.exe 4100 htbttn.exe 1480 fllllxx.exe 1968 jdvpp.exe 940 jdjjj.exe 856 thnnnh.exe 2252 tntnhn.exe 2400 hhnbtb.exe 4404 pvppd.exe 3936 nntttb.exe 1476 hnbbhn.exe 2456 1lllffx.exe 2184 nhtnnn.exe 2056 pjddv.exe 2632 1lllrxl.exe 1600 xfrlrrr.exe 440 ddppv.exe 4752 vdvvv.exe 3960 1dppj.exe 2608 llxxxrr.exe 4408 3xxxfrr.exe 2476 xrfffll.exe 1248 btbbbh.exe 1252 dpjpp.exe 2988 vdjjp.exe 3596 ffrflxx.exe 3544 vdvvd.exe 4392 pdvvp.exe 4992 ddvjd.exe 1824 bttnhh.exe 4920 pjpjd.exe 3372 vjjjj.exe 5052 vpjjv.exe 4188 jpjdv.exe 1944 lfxffrr.exe 1356 lfllllx.exe 216 rlxffxl.exe 2392 llxrlxr.exe 3780 ffrlxxx.exe 2400 xllrrrr.exe 1116 xfffxfx.exe 5048 lfrlfff.exe 1892 lxlffxx.exe 1516 rlllrll.exe 1828 fxfxxxf.exe 2056 rflflll.exe 4800 rfllffl.exe 3016 xflxrlx.exe 3940 lxfxllf.exe 2292 7xlfxff.exe 3080 fflrxlx.exe 1268 xlxlxlr.exe -
resource yara_rule behavioral2/memory/2396-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2396-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b4d-3.dat upx behavioral2/files/0x0031000000023b5c-9.dat upx behavioral2/memory/4040-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b5d-13.dat upx behavioral2/memory/4660-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b59-21.dat upx behavioral2/memory/544-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1544-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5f-28.dat upx behavioral2/memory/4848-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b60-35.dat upx behavioral2/memory/4964-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b61-40.dat upx behavioral2/files/0x000a000000023b62-45.dat upx behavioral2/memory/1252-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4964-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00110000000239f0-54.dat upx behavioral2/memory/1252-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1608-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000f0000000239f4-58.dat upx behavioral2/files/0x00150000000239f5-66.dat upx behavioral2/memory/2828-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00100000000239f7-70.dat upx behavioral2/memory/5052-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00110000000239f1-77.dat upx behavioral2/files/0x000a000000023b64-81.dat upx behavioral2/files/0x000a000000023b65-89.dat upx behavioral2/memory/4100-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b66-92.dat upx behavioral2/memory/1480-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b67-98.dat upx behavioral2/memory/1968-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/940-106-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b69-105.dat upx behavioral2/files/0x000a000000023b6c-110.dat upx behavioral2/files/0x000a000000023b6d-115.dat upx behavioral2/memory/2252-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6e-121.dat upx behavioral2/memory/4404-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6f-126.dat upx behavioral2/memory/3936-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b70-134.dat upx behavioral2/files/0x000a000000023b71-137.dat upx behavioral2/memory/1476-139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2456-146-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b72-144.dat upx behavioral2/files/0x000a000000023b73-150.dat upx behavioral2/memory/2056-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b74-155.dat upx behavioral2/memory/2632-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b75-160.dat upx behavioral2/memory/440-170-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1600-169-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b76-167.dat upx behavioral2/memory/440-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b77-175.dat upx behavioral2/files/0x000a000000023b78-180.dat upx behavioral2/files/0x000a000000023b79-185.dat upx behavioral2/memory/3960-184-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2608-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2476-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1252-203-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lfffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfxffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfllffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrfflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlflff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfllrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fxfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnnbb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4040 2396 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 84 PID 2396 wrote to memory of 4040 2396 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 84 PID 2396 wrote to memory of 4040 2396 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 84 PID 4040 wrote to memory of 4660 4040 tbttbb.exe 86 PID 4040 wrote to memory of 4660 4040 tbttbb.exe 86 PID 4040 wrote to memory of 4660 4040 tbttbb.exe 86 PID 4660 wrote to memory of 544 4660 lxrffrr.exe 89 PID 4660 wrote to memory of 544 4660 lxrffrr.exe 89 PID 4660 wrote to memory of 544 4660 lxrffrr.exe 89 PID 544 wrote to memory of 1544 544 5fffxxr.exe 90 PID 544 wrote to memory of 1544 544 5fffxxr.exe 90 PID 544 wrote to memory of 1544 544 5fffxxr.exe 90 PID 1544 wrote to memory of 4848 1544 nhnntb.exe 91 PID 1544 wrote to memory of 4848 1544 nhnntb.exe 91 PID 1544 wrote to memory of 4848 1544 nhnntb.exe 91 PID 4848 wrote to memory of 1056 4848 vjppj.exe 92 PID 4848 wrote to memory of 1056 4848 vjppj.exe 92 PID 4848 wrote to memory of 1056 4848 vjppj.exe 92 PID 1056 wrote to memory of 4964 1056 jddvp.exe 93 PID 1056 wrote to memory of 4964 1056 jddvp.exe 93 PID 1056 wrote to memory of 4964 1056 jddvp.exe 93 PID 4964 wrote to memory of 1252 4964 fxffxxx.exe 94 PID 4964 wrote to memory of 1252 4964 fxffxxx.exe 94 PID 4964 wrote to memory of 1252 4964 fxffxxx.exe 94 PID 1252 wrote to memory of 1608 1252 nhtnhh.exe 95 PID 1252 wrote to memory of 1608 1252 nhtnhh.exe 95 PID 1252 wrote to memory of 1608 1252 nhtnhh.exe 95 PID 1608 wrote to memory of 2828 1608 tbnnhn.exe 96 PID 1608 wrote to memory of 2828 1608 tbnnhn.exe 96 PID 1608 wrote to memory of 2828 1608 tbnnhn.exe 96 PID 2828 wrote to memory of 2792 2828 9vvvj.exe 97 PID 2828 wrote to memory of 2792 2828 9vvvj.exe 97 PID 2828 wrote to memory of 2792 2828 9vvvj.exe 97 PID 2792 wrote to memory of 5052 2792 jpvpp.exe 98 PID 2792 wrote to memory of 5052 2792 jpvpp.exe 98 PID 2792 wrote to memory of 5052 2792 jpvpp.exe 98 PID 5052 wrote to memory of 3712 5052 bbhbbb.exe 99 PID 5052 wrote to memory of 3712 5052 bbhbbb.exe 99 PID 5052 wrote to memory of 3712 5052 bbhbbb.exe 99 PID 3712 wrote to memory of 4100 3712 rlllfff.exe 100 PID 3712 wrote to memory of 4100 3712 rlllfff.exe 100 PID 3712 wrote to memory of 4100 3712 rlllfff.exe 100 PID 4100 wrote to memory of 1480 4100 htbttn.exe 101 PID 4100 wrote to memory of 1480 4100 htbttn.exe 101 PID 4100 wrote to memory of 1480 4100 htbttn.exe 101 PID 1480 wrote to memory of 1968 1480 fllllxx.exe 104 PID 1480 wrote to memory of 1968 1480 fllllxx.exe 104 PID 1480 wrote to memory of 1968 1480 fllllxx.exe 104 PID 1968 wrote to memory of 940 1968 jdvpp.exe 105 PID 1968 wrote to memory of 940 1968 jdvpp.exe 105 PID 1968 wrote to memory of 940 1968 jdvpp.exe 105 PID 940 wrote to memory of 856 940 jdjjj.exe 106 PID 940 wrote to memory of 856 940 jdjjj.exe 106 PID 940 wrote to memory of 856 940 jdjjj.exe 106 PID 856 wrote to memory of 2252 856 thnnnh.exe 108 PID 856 wrote to memory of 2252 856 thnnnh.exe 108 PID 856 wrote to memory of 2252 856 thnnnh.exe 108 PID 2252 wrote to memory of 2400 2252 tntnhn.exe 110 PID 2252 wrote to memory of 2400 2252 tntnhn.exe 110 PID 2252 wrote to memory of 2400 2252 tntnhn.exe 110 PID 2400 wrote to memory of 4404 2400 hhnbtb.exe 111 PID 2400 wrote to memory of 4404 2400 hhnbtb.exe 111 PID 2400 wrote to memory of 4404 2400 hhnbtb.exe 111 PID 4404 wrote to memory of 3936 4404 pvppd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\tbttbb.exec:\tbttbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
\??\c:\lxrffrr.exec:\lxrffrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\5fffxxr.exec:\5fffxxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\nhnntb.exec:\nhnntb.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\vjppj.exec:\vjppj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\jddvp.exec:\jddvp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\fxffxxx.exec:\fxffxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
\??\c:\nhtnhh.exec:\nhtnhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\tbnnhn.exec:\tbnnhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
\??\c:\9vvvj.exec:\9vvvj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\jpvpp.exec:\jpvpp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\bbhbbb.exec:\bbhbbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\rlllfff.exec:\rlllfff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\htbttn.exec:\htbttn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
\??\c:\fllllxx.exec:\fllllxx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
\??\c:\jdvpp.exec:\jdvpp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\jdjjj.exec:\jdjjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\thnnnh.exec:\thnnnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\tntnhn.exec:\tntnhn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\hhnbtb.exec:\hhnbtb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\pvppd.exec:\pvppd.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\nntttb.exec:\nntttb.exe23⤵
- Executes dropped EXE
PID:3936 -
\??\c:\hnbbhn.exec:\hnbbhn.exe24⤵
- Executes dropped EXE
PID:1476 -
\??\c:\1lllffx.exec:\1lllffx.exe25⤵
- Executes dropped EXE
PID:2456 -
\??\c:\nhtnnn.exec:\nhtnnn.exe26⤵
- Executes dropped EXE
PID:2184 -
\??\c:\pjddv.exec:\pjddv.exe27⤵
- Executes dropped EXE
PID:2056 -
\??\c:\1lllrxl.exec:\1lllrxl.exe28⤵
- Executes dropped EXE
PID:2632 -
\??\c:\xfrlrrr.exec:\xfrlrrr.exe29⤵
- Executes dropped EXE
PID:1600 -
\??\c:\ddppv.exec:\ddppv.exe30⤵
- Executes dropped EXE
PID:440 -
\??\c:\vdvvv.exec:\vdvvv.exe31⤵
- Executes dropped EXE
PID:4752 -
\??\c:\1dppj.exec:\1dppj.exe32⤵
- Executes dropped EXE
PID:3960 -
\??\c:\llxxxrr.exec:\llxxxrr.exe33⤵
- Executes dropped EXE
PID:2608 -
\??\c:\3xxxfrr.exec:\3xxxfrr.exe34⤵
- Executes dropped EXE
PID:4408 -
\??\c:\xrfffll.exec:\xrfffll.exe35⤵
- Executes dropped EXE
PID:2476 -
\??\c:\btbbbh.exec:\btbbbh.exe36⤵
- Executes dropped EXE
PID:1248 -
\??\c:\dpjpp.exec:\dpjpp.exe37⤵
- Executes dropped EXE
PID:1252 -
\??\c:\vdjjp.exec:\vdjjp.exe38⤵
- Executes dropped EXE
PID:2988 -
\??\c:\ffrflxx.exec:\ffrflxx.exe39⤵
- Executes dropped EXE
PID:3596 -
\??\c:\vdvvd.exec:\vdvvd.exe40⤵
- Executes dropped EXE
PID:3544 -
\??\c:\pdvvp.exec:\pdvvp.exe41⤵
- Executes dropped EXE
PID:4392 -
\??\c:\ddvjd.exec:\ddvjd.exe42⤵
- Executes dropped EXE
PID:4992 -
\??\c:\bttnhh.exec:\bttnhh.exe43⤵
- Executes dropped EXE
PID:1824 -
\??\c:\pjpjd.exec:\pjpjd.exe44⤵
- Executes dropped EXE
PID:4920 -
\??\c:\vjjjj.exec:\vjjjj.exe45⤵
- Executes dropped EXE
PID:3372 -
\??\c:\vpjjv.exec:\vpjjv.exe46⤵
- Executes dropped EXE
PID:5052 -
\??\c:\jpjdv.exec:\jpjdv.exe47⤵
- Executes dropped EXE
PID:4188 -
\??\c:\lfxffrr.exec:\lfxffrr.exe48⤵
- Executes dropped EXE
PID:1944 -
\??\c:\lfllllx.exec:\lfllllx.exe49⤵
- Executes dropped EXE
PID:1356 -
\??\c:\rlxffxl.exec:\rlxffxl.exe50⤵
- Executes dropped EXE
PID:216 -
\??\c:\llxrlxr.exec:\llxrlxr.exe51⤵
- Executes dropped EXE
PID:2392 -
\??\c:\ffrlxxx.exec:\ffrlxxx.exe52⤵
- Executes dropped EXE
PID:3780 -
\??\c:\xllrrrr.exec:\xllrrrr.exe53⤵
- Executes dropped EXE
PID:2400 -
\??\c:\xfffxfx.exec:\xfffxfx.exe54⤵
- Executes dropped EXE
PID:1116 -
\??\c:\lfrlfff.exec:\lfrlfff.exe55⤵
- Executes dropped EXE
PID:5048 -
\??\c:\lxlffxx.exec:\lxlffxx.exe56⤵
- Executes dropped EXE
PID:1892 -
\??\c:\rlllrll.exec:\rlllrll.exe57⤵
- Executes dropped EXE
PID:1516 -
\??\c:\fxfxxxf.exec:\fxfxxxf.exe58⤵
- Executes dropped EXE
PID:1828 -
\??\c:\rflflll.exec:\rflflll.exe59⤵
- Executes dropped EXE
PID:2056 -
\??\c:\rfllffl.exec:\rfllffl.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800 -
\??\c:\xflxrlx.exec:\xflxrlx.exe61⤵
- Executes dropped EXE
PID:3016 -
\??\c:\lxfxllf.exec:\lxfxllf.exe62⤵
- Executes dropped EXE
PID:3940 -
\??\c:\7xlfxff.exec:\7xlfxff.exe63⤵
- Executes dropped EXE
PID:2292 -
\??\c:\fflrxlx.exec:\fflrxlx.exe64⤵
- Executes dropped EXE
PID:3080 -
\??\c:\xlxlxlr.exec:\xlxlxlr.exe65⤵
- Executes dropped EXE
PID:1268 -
\??\c:\fxrrxxf.exec:\fxrrxxf.exe66⤵PID:3232
-
\??\c:\1lfffll.exec:\1lfffll.exe67⤵
- System Location Discovery: System Language Discovery
PID:4760 -
\??\c:\bbhtnh.exec:\bbhtnh.exe68⤵PID:692
-
\??\c:\rxxflxf.exec:\rxxflxf.exe69⤵PID:2224
-
\??\c:\9ffxrxr.exec:\9ffxrxr.exe70⤵PID:1676
-
\??\c:\llxrrlx.exec:\llxrrlx.exe71⤵PID:5076
-
\??\c:\rxxflxx.exec:\rxxflxx.exe72⤵PID:1932
-
\??\c:\tthbht.exec:\tthbht.exe73⤵PID:4464
-
\??\c:\bbbnbt.exec:\bbbnbt.exe74⤵PID:2368
-
\??\c:\5tbtth.exec:\5tbtth.exe75⤵PID:1548
-
\??\c:\bbnhbb.exec:\bbnhbb.exe76⤵PID:752
-
\??\c:\1ttnhh.exec:\1ttnhh.exe77⤵PID:2988
-
\??\c:\thtnhh.exec:\thtnhh.exe78⤵PID:1404
-
\??\c:\bbthhh.exec:\bbthhh.exe79⤵PID:4300
-
\??\c:\tbtttn.exec:\tbtttn.exe80⤵PID:2276
-
\??\c:\rrxxfxf.exec:\rrxxfxf.exe81⤵PID:4992
-
\??\c:\llrrlll.exec:\llrrlll.exe82⤵PID:1824
-
\??\c:\xlxxxrr.exec:\xlxxxrr.exe83⤵PID:860
-
\??\c:\rrrxrll.exec:\rrrxrll.exe84⤵PID:228
-
\??\c:\lrfrlxr.exec:\lrfrlxr.exe85⤵PID:3540
-
\??\c:\rflllfl.exec:\rflllfl.exe86⤵PID:4188
-
\??\c:\nnnntt.exec:\nnnntt.exe87⤵PID:1764
-
\??\c:\tbtbth.exec:\tbtbth.exe88⤵
- System Location Discovery: System Language Discovery
PID:232 -
\??\c:\nnttbb.exec:\nnttbb.exe89⤵PID:4684
-
\??\c:\bhbbbt.exec:\bhbbbt.exe90⤵PID:2564
-
\??\c:\thnhbn.exec:\thnhbn.exe91⤵
- System Location Discovery: System Language Discovery
PID:856 -
\??\c:\vjpvp.exec:\vjpvp.exe92⤵PID:2932
-
\??\c:\pdjjj.exec:\pdjjj.exe93⤵PID:3632
-
\??\c:\dvpjv.exec:\dvpjv.exe94⤵PID:1476
-
\??\c:\vjpjd.exec:\vjpjd.exe95⤵PID:4316
-
\??\c:\3rrxxfx.exec:\3rrxxfx.exe96⤵PID:456
-
\??\c:\jjjpj.exec:\jjjpj.exe97⤵PID:1588
-
\??\c:\ddjdd.exec:\ddjdd.exe98⤵PID:2320
-
\??\c:\xxxfrlr.exec:\xxxfrlr.exe99⤵PID:920
-
\??\c:\xfllrlx.exec:\xfllrlx.exe100⤵PID:3088
-
\??\c:\rllxllx.exec:\rllxllx.exe101⤵PID:2864
-
\??\c:\httnhb.exec:\httnhb.exe102⤵PID:736
-
\??\c:\nntbhb.exec:\nntbhb.exe103⤵PID:3264
-
\??\c:\vvjvp.exec:\vvjvp.exe104⤵PID:2768
-
\??\c:\dvjjj.exec:\dvjjj.exe105⤵PID:3804
-
\??\c:\jpdpd.exec:\jpdpd.exe106⤵PID:788
-
\??\c:\lxfllrf.exec:\lxfllrf.exe107⤵
- System Location Discovery: System Language Discovery
PID:3224 -
\??\c:\djvvv.exec:\djvvv.exe108⤵PID:3164
-
\??\c:\dvvjv.exec:\dvvjv.exe109⤵PID:1964
-
\??\c:\xlflxlf.exec:\xlflxlf.exe110⤵PID:3876
-
\??\c:\llrlffx.exec:\llrlffx.exe111⤵PID:804
-
\??\c:\xlrlxrf.exec:\xlrlxrf.exe112⤵PID:1916
-
\??\c:\xrllrrf.exec:\xrllrrf.exe113⤵PID:4056
-
\??\c:\1frrllf.exec:\1frrllf.exe114⤵PID:2476
-
\??\c:\djpjj.exec:\djpjj.exe115⤵PID:4900
-
\??\c:\xrrllrl.exec:\xrrllrl.exe116⤵
- System Location Discovery: System Language Discovery
PID:3496 -
\??\c:\vdppv.exec:\vdppv.exe117⤵PID:1192
-
\??\c:\lllflfl.exec:\lllflfl.exe118⤵PID:220
-
\??\c:\rfffffr.exec:\rfffffr.exe119⤵PID:544
-
\??\c:\tnbnht.exec:\tnbnht.exe120⤵PID:3028
-
\??\c:\7htnhh.exec:\7htnhh.exe121⤵PID:1084
-
\??\c:\ntbbhh.exec:\ntbbhh.exe122⤵
- System Location Discovery: System Language Discovery
PID:4020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-