Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 12:02
Behavioral task
behavioral1
Sample
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
-
Size
3.7MB
-
MD5
a539ca67aff364eb0738de8bbaeaebb0
-
SHA1
3cc0c2947e262bede4b75efbdf38e6e2987c5356
-
SHA256
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4
-
SHA512
1f4e0d506e8248b3982c86dcb57687613de1375b781b0a456fb2b51bf3a1755d2340b13b89bc6c9f1012e35cc2b1fd4d253c6d616d844b4eda495506bc4b04ea
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98P:U6XLq/qPPslzKx/dJg1ErmN8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/4952-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1520-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1740-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3624-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2688-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2868-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1956-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3920-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4712-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2372-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5024-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3500-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/212-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4888-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1020-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1596-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4920-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4192-135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3088-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3692-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4128-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4748-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4044-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4408-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3744-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/320-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4796-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1156-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4524-238-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1616-251-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1280-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2228-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4640-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1740-298-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3156-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3552-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1960-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1680-332-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1872-345-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/224-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/64-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/736-399-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4496-415-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4192-428-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1740-441-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1208-457-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4988-473-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3400-519-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-553-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2316-713-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2800-750-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3172-769-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3832-776-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2436-810-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2720-920-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5020-930-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-1135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3580-1278-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1520 jdppv.exe 1740 dvvdp.exe 3624 bnhhnh.exe 2688 nhhbhn.exe 2868 lfxxxxr.exe 4324 tbbtnb.exe 1956 nhbhbt.exe 3920 fxllllf.exe 4712 xfxrfxf.exe 3572 hhbnhb.exe 2372 bntbbn.exe 5024 vpvjd.exe 3500 pppjj.exe 212 vjpjd.exe 4888 xrxrflf.exe 1020 nnnbbn.exe 1596 hnnhbb.exe 5004 bnnbht.exe 4472 nbnbth.exe 4172 pdvjp.exe 4920 bnnbhn.exe 4192 pvdvd.exe 3088 hbtbhh.exe 1408 pvvdv.exe 4952 rflxxfx.exe 3644 pjjjp.exe 3692 lxlfrxr.exe 4128 vvdvv.exe 4708 hbhtnt.exe 3904 ffxffxx.exe 4748 tttttb.exe 4044 vvppd.exe 4408 1bnhhh.exe 4324 djjdv.exe 864 rxrxffx.exe 3744 btttnb.exe 3888 jdjdv.exe 4268 vdjjj.exe 4392 rlxxflr.exe 320 tbhhbb.exe 4340 pjvpv.exe 4796 rxlrfll.exe 4984 bttnnb.exe 1156 vjpdp.exe 212 lfrlxrl.exe 4524 bnbbbb.exe 4964 hbhbtt.exe 5016 vvvvp.exe 2724 vppdj.exe 1616 xlxlfxx.exe 3424 hnhnbh.exe 2436 vdpjd.exe 4172 fxffffx.exe 2312 xflxxrr.exe 3384 nhhbnh.exe 4968 pvvpv.exe 1280 dvdjv.exe 2864 llflxll.exe 1500 rfllrxf.exe 2228 httnbb.exe 3380 flxrrxr.exe 4640 hthtbh.exe 2260 bhtbnt.exe 1740 vdpvj.exe -
resource yara_rule behavioral2/memory/4952-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0010000000023bd7-3.dat upx behavioral2/memory/4952-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1520-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca6-10.dat upx behavioral2/files/0x0008000000023ca2-13.dat upx behavioral2/memory/3624-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1740-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca7-23.dat upx behavioral2/memory/3624-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00050000000006cf-28.dat upx behavioral2/memory/2688-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2868-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022ae8-35.dat upx behavioral2/memory/4324-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022af2-42.dat upx behavioral2/files/0x000d000000023b69-47.dat upx behavioral2/memory/1956-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000d000000023b71-52.dat upx behavioral2/memory/4712-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3920-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023ca8-59.dat upx behavioral2/memory/4712-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023ca9-65.dat upx behavioral2/memory/3572-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023cac-71.dat upx behavioral2/memory/2372-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023cad-77.dat upx behavioral2/memory/5024-78-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cae-82.dat upx behavioral2/memory/3500-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb0-88.dat upx behavioral2/memory/212-90-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-94.dat upx behavioral2/memory/4888-96-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb2-100.dat upx behavioral2/memory/1020-102-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb3-106.dat upx behavioral2/memory/1596-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb4-111.dat upx behavioral2/files/0x0007000000023cb8-118.dat upx behavioral2/files/0x0007000000023cb9-122.dat upx behavioral2/memory/4920-129-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cba-127.dat upx behavioral2/files/0x0007000000023cbb-133.dat upx behavioral2/memory/4192-135-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbc-139.dat upx behavioral2/memory/3088-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbd-145.dat upx behavioral2/files/0x0007000000023cbe-151.dat upx behavioral2/files/0x0011000000023cbf-155.dat upx behavioral2/memory/3692-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccb-161.dat upx behavioral2/files/0x0007000000023ccc-165.dat upx behavioral2/memory/4128-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccd-171.dat upx behavioral2/files/0x0007000000023cce-176.dat upx behavioral2/files/0x0007000000023ccf-181.dat upx behavioral2/memory/4748-183-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4044-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4408-191-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4324-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/864-199-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3744-203-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxlfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxffxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlfffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxlxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flllrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfflxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxxrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ntnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflxlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrllrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nththb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbthbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bttht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbthbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xrrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrrrfl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1520 4952 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 83 PID 4952 wrote to memory of 1520 4952 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 83 PID 4952 wrote to memory of 1520 4952 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 83 PID 1520 wrote to memory of 1740 1520 jdppv.exe 85 PID 1520 wrote to memory of 1740 1520 jdppv.exe 85 PID 1520 wrote to memory of 1740 1520 jdppv.exe 85 PID 1740 wrote to memory of 3624 1740 dvvdp.exe 86 PID 1740 wrote to memory of 3624 1740 dvvdp.exe 86 PID 1740 wrote to memory of 3624 1740 dvvdp.exe 86 PID 3624 wrote to memory of 2688 3624 bnhhnh.exe 87 PID 3624 wrote to memory of 2688 3624 bnhhnh.exe 87 PID 3624 wrote to memory of 2688 3624 bnhhnh.exe 87 PID 2688 wrote to memory of 2868 2688 nhhbhn.exe 90 PID 2688 wrote to memory of 2868 2688 nhhbhn.exe 90 PID 2688 wrote to memory of 2868 2688 nhhbhn.exe 90 PID 2868 wrote to memory of 4324 2868 lfxxxxr.exe 91 PID 2868 wrote to memory of 4324 2868 lfxxxxr.exe 91 PID 2868 wrote to memory of 4324 2868 lfxxxxr.exe 91 PID 4324 wrote to memory of 1956 4324 tbbtnb.exe 94 PID 4324 wrote to memory of 1956 4324 tbbtnb.exe 94 PID 4324 wrote to memory of 1956 4324 tbbtnb.exe 94 PID 1956 wrote to memory of 3920 1956 nhbhbt.exe 96 PID 1956 wrote to memory of 3920 1956 nhbhbt.exe 96 PID 1956 wrote to memory of 3920 1956 nhbhbt.exe 96 PID 3920 wrote to memory of 4712 3920 fxllllf.exe 98 PID 3920 wrote to memory of 4712 3920 fxllllf.exe 98 PID 3920 wrote to memory of 4712 3920 fxllllf.exe 98 PID 4712 wrote to memory of 3572 4712 xfxrfxf.exe 99 PID 4712 wrote to memory of 3572 4712 xfxrfxf.exe 99 PID 4712 wrote to memory of 3572 4712 xfxrfxf.exe 99 PID 3572 wrote to memory of 2372 3572 hhbnhb.exe 100 PID 3572 wrote to memory of 2372 3572 hhbnhb.exe 100 PID 3572 wrote to memory of 2372 3572 hhbnhb.exe 100 PID 2372 wrote to memory of 5024 2372 bntbbn.exe 101 PID 2372 wrote to memory of 5024 2372 bntbbn.exe 101 PID 2372 wrote to memory of 5024 2372 bntbbn.exe 101 PID 5024 wrote to memory of 3500 5024 vpvjd.exe 102 PID 5024 wrote to memory of 3500 5024 vpvjd.exe 102 PID 5024 wrote to memory of 3500 5024 vpvjd.exe 102 PID 3500 wrote to memory of 212 3500 pppjj.exe 104 PID 3500 wrote to memory of 212 3500 pppjj.exe 104 PID 3500 wrote to memory of 212 3500 pppjj.exe 104 PID 212 wrote to memory of 4888 212 vjpjd.exe 105 PID 212 wrote to memory of 4888 212 vjpjd.exe 105 PID 212 wrote to memory of 4888 212 vjpjd.exe 105 PID 4888 wrote to memory of 1020 4888 xrxrflf.exe 106 PID 4888 wrote to memory of 1020 4888 xrxrflf.exe 106 PID 4888 wrote to memory of 1020 4888 xrxrflf.exe 106 PID 1020 wrote to memory of 1596 1020 nnnbbn.exe 107 PID 1020 wrote to memory of 1596 1020 nnnbbn.exe 107 PID 1020 wrote to memory of 1596 1020 nnnbbn.exe 107 PID 1596 wrote to memory of 5004 1596 hnnhbb.exe 108 PID 1596 wrote to memory of 5004 1596 hnnhbb.exe 108 PID 1596 wrote to memory of 5004 1596 hnnhbb.exe 108 PID 5004 wrote to memory of 4472 5004 bnnbht.exe 109 PID 5004 wrote to memory of 4472 5004 bnnbht.exe 109 PID 5004 wrote to memory of 4472 5004 bnnbht.exe 109 PID 4472 wrote to memory of 4172 4472 nbnbth.exe 112 PID 4472 wrote to memory of 4172 4472 nbnbth.exe 112 PID 4472 wrote to memory of 4172 4472 nbnbth.exe 112 PID 4172 wrote to memory of 4920 4172 pdvjp.exe 113 PID 4172 wrote to memory of 4920 4172 pdvjp.exe 113 PID 4172 wrote to memory of 4920 4172 pdvjp.exe 113 PID 4920 wrote to memory of 4192 4920 bnnbhn.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\jdppv.exec:\jdppv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\dvvdp.exec:\dvvdp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\bnhhnh.exec:\bnhhnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\nhhbhn.exec:\nhhbhn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\lfxxxxr.exec:\lfxxxxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\tbbtnb.exec:\tbbtnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\nhbhbt.exec:\nhbhbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\fxllllf.exec:\fxllllf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
\??\c:\xfxrfxf.exec:\xfxrfxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
\??\c:\hhbnhb.exec:\hhbnhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\bntbbn.exec:\bntbbn.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\vpvjd.exec:\vpvjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\pppjj.exec:\pppjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
\??\c:\vjpjd.exec:\vjpjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\xrxrflf.exec:\xrxrflf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\nnnbbn.exec:\nnnbbn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\hnnhbb.exec:\hnnhbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\bnnbht.exec:\bnnbht.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\nbnbth.exec:\nbnbth.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\pdvjp.exec:\pdvjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\bnnbhn.exec:\bnnbhn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\pvdvd.exec:\pvdvd.exe23⤵
- Executes dropped EXE
PID:4192 -
\??\c:\hbtbhh.exec:\hbtbhh.exe24⤵
- Executes dropped EXE
PID:3088 -
\??\c:\pvvdv.exec:\pvvdv.exe25⤵
- Executes dropped EXE
PID:1408 -
\??\c:\rflxxfx.exec:\rflxxfx.exe26⤵
- Executes dropped EXE
PID:4952 -
\??\c:\pjjjp.exec:\pjjjp.exe27⤵
- Executes dropped EXE
PID:3644 -
\??\c:\lxlfrxr.exec:\lxlfrxr.exe28⤵
- Executes dropped EXE
PID:3692 -
\??\c:\vvdvv.exec:\vvdvv.exe29⤵
- Executes dropped EXE
PID:4128 -
\??\c:\hbhtnt.exec:\hbhtnt.exe30⤵
- Executes dropped EXE
PID:4708 -
\??\c:\ffxffxx.exec:\ffxffxx.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3904 -
\??\c:\tttttb.exec:\tttttb.exe32⤵
- Executes dropped EXE
PID:4748 -
\??\c:\vvppd.exec:\vvppd.exe33⤵
- Executes dropped EXE
PID:4044 -
\??\c:\1bnhhh.exec:\1bnhhh.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408 -
\??\c:\djjdv.exec:\djjdv.exe35⤵
- Executes dropped EXE
PID:4324 -
\??\c:\rxrxffx.exec:\rxrxffx.exe36⤵
- Executes dropped EXE
PID:864 -
\??\c:\btttnb.exec:\btttnb.exe37⤵
- Executes dropped EXE
PID:3744 -
\??\c:\jdjdv.exec:\jdjdv.exe38⤵
- Executes dropped EXE
PID:3888 -
\??\c:\vdjjj.exec:\vdjjj.exe39⤵
- Executes dropped EXE
PID:4268 -
\??\c:\rlxxflr.exec:\rlxxflr.exe40⤵
- Executes dropped EXE
PID:4392 -
\??\c:\tbhhbb.exec:\tbhhbb.exe41⤵
- Executes dropped EXE
PID:320 -
\??\c:\pjvpv.exec:\pjvpv.exe42⤵
- Executes dropped EXE
PID:4340 -
\??\c:\rxlrfll.exec:\rxlrfll.exe43⤵
- Executes dropped EXE
PID:4796 -
\??\c:\bttnnb.exec:\bttnnb.exe44⤵
- Executes dropped EXE
PID:4984 -
\??\c:\vjpdp.exec:\vjpdp.exe45⤵
- Executes dropped EXE
PID:1156 -
\??\c:\lfrlxrl.exec:\lfrlxrl.exe46⤵
- Executes dropped EXE
PID:212 -
\??\c:\bnbbbb.exec:\bnbbbb.exe47⤵
- Executes dropped EXE
PID:4524 -
\??\c:\hbhbtt.exec:\hbhbtt.exe48⤵
- Executes dropped EXE
PID:4964 -
\??\c:\vvvvp.exec:\vvvvp.exe49⤵
- Executes dropped EXE
PID:5016 -
\??\c:\vppdj.exec:\vppdj.exe50⤵
- Executes dropped EXE
PID:2724 -
\??\c:\xlxlfxx.exec:\xlxlfxx.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1616 -
\??\c:\hnhnbh.exec:\hnhnbh.exe52⤵
- Executes dropped EXE
PID:3424 -
\??\c:\vdpjd.exec:\vdpjd.exe53⤵
- Executes dropped EXE
PID:2436 -
\??\c:\fxffffx.exec:\fxffffx.exe54⤵
- Executes dropped EXE
PID:4172 -
\??\c:\xflxxrr.exec:\xflxxrr.exe55⤵
- Executes dropped EXE
PID:2312 -
\??\c:\nhhbnh.exec:\nhhbnh.exe56⤵
- Executes dropped EXE
PID:3384 -
\??\c:\pvvpv.exec:\pvvpv.exe57⤵
- Executes dropped EXE
PID:4968 -
\??\c:\dvdjv.exec:\dvdjv.exe58⤵
- Executes dropped EXE
PID:1280 -
\??\c:\llflxll.exec:\llflxll.exe59⤵
- Executes dropped EXE
PID:2864 -
\??\c:\rfllrxf.exec:\rfllrxf.exe60⤵
- Executes dropped EXE
PID:1500 -
\??\c:\httnbb.exec:\httnbb.exe61⤵
- Executes dropped EXE
PID:2228 -
\??\c:\thtntt.exec:\thtntt.exe62⤵PID:4292
-
\??\c:\flxrrxr.exec:\flxrrxr.exe63⤵
- Executes dropped EXE
PID:3380 -
\??\c:\hthtbh.exec:\hthtbh.exe64⤵
- Executes dropped EXE
PID:4640 -
\??\c:\bhtbnt.exec:\bhtbnt.exe65⤵
- Executes dropped EXE
PID:2260 -
\??\c:\vdpvj.exec:\vdpvj.exe66⤵
- Executes dropped EXE
PID:1740 -
\??\c:\lxfrrlf.exec:\lxfrrlf.exe67⤵PID:3156
-
\??\c:\hntntt.exec:\hntntt.exe68⤵PID:3932
-
\??\c:\ppdvd.exec:\ppdvd.exe69⤵PID:5100
-
\??\c:\jppjj.exec:\jppjj.exe70⤵PID:3552
-
\??\c:\xfxrlfx.exec:\xfxrlfx.exe71⤵PID:1960
-
\??\c:\fllfrlx.exec:\fllfrlx.exe72⤵PID:4128
-
\??\c:\hbbtnb.exec:\hbbtnb.exe73⤵PID:4536
-
\??\c:\vpvjv.exec:\vpvjv.exe74⤵PID:4656
-
\??\c:\jdjjd.exec:\jdjjd.exe75⤵PID:2688
-
\??\c:\xxfxlrl.exec:\xxfxlrl.exe76⤵PID:1680
-
\??\c:\xfrlrrx.exec:\xfrlrrx.exe77⤵PID:940
-
\??\c:\hbnbht.exec:\hbnbht.exe78⤵PID:4988
-
\??\c:\hntnnn.exec:\hntnnn.exe79⤵PID:4108
-
\??\c:\djddj.exec:\djddj.exe80⤵PID:1872
-
\??\c:\rxlrfrr.exec:\rxlrfrr.exe81⤵PID:4448
-
\??\c:\rrrlfxx.exec:\rrrlfxx.exe82⤵PID:3772
-
\??\c:\nbnhbb.exec:\nbnhbb.exe83⤵PID:1036
-
\??\c:\dpvdv.exec:\dpvdv.exe84⤵
- System Location Discovery: System Language Discovery
PID:4476 -
\??\c:\pddjd.exec:\pddjd.exe85⤵PID:224
-
\??\c:\rllxrxf.exec:\rllxrxf.exe86⤵PID:3684
-
\??\c:\llxlffx.exec:\llxlffx.exe87⤵PID:3172
-
\??\c:\xllrfff.exec:\xllrfff.exe88⤵PID:64
-
\??\c:\lrxfrff.exec:\lrxfrff.exe89⤵PID:1820
-
\??\c:\tbhtnt.exec:\tbhtnt.exe90⤵PID:2972
-
\??\c:\thhhtt.exec:\thhhtt.exe91⤵PID:4252
-
\??\c:\vdpdp.exec:\vdpdp.exe92⤵PID:4888
-
\??\c:\lxlxfxf.exec:\lxlxfxf.exe93⤵PID:3740
-
\??\c:\rfrfrll.exec:\rfrfrll.exe94⤵PID:4528
-
\??\c:\ttthht.exec:\ttthht.exe95⤵PID:4804
-
\??\c:\nbhnbb.exec:\nbhnbb.exe96⤵
- System Location Discovery: System Language Discovery
PID:1340 -
\??\c:\ntbbhh.exec:\ntbbhh.exe97⤵PID:736
-
\??\c:\jvvvv.exec:\jvvvv.exe98⤵PID:3424
-
\??\c:\fffxxxr.exec:\fffxxxr.exe99⤵PID:2436
-
\??\c:\xffxrrl.exec:\xffxrrl.exe100⤵PID:4172
-
\??\c:\nhnnth.exec:\nhnnth.exe101⤵PID:2748
-
\??\c:\djdvj.exec:\djdvj.exe102⤵PID:4496
-
\??\c:\fxxlxfr.exec:\fxxlxfr.exe103⤵PID:2672
-
\??\c:\tbbtnn.exec:\tbbtnn.exe104⤵PID:3876
-
\??\c:\dvdvd.exec:\dvdvd.exe105⤵PID:2864
-
\??\c:\rlxllfx.exec:\rlxllfx.exe106⤵PID:4192
-
\??\c:\flxlxxl.exec:\flxlxxl.exe107⤵PID:2924
-
\??\c:\nbthbt.exec:\nbthbt.exe108⤵PID:3940
-
\??\c:\jdpdj.exec:\jdpdj.exe109⤵PID:1632
-
\??\c:\jdjvv.exec:\jdjvv.exe110⤵PID:1740
-
\??\c:\xlxffxl.exec:\xlxffxl.exe111⤵PID:3468
-
\??\c:\lrxlrxx.exec:\lrxlrxx.exe112⤵PID:4060
-
\??\c:\ttnbhb.exec:\ttnbhb.exe113⤵PID:3128
-
\??\c:\jjdjp.exec:\jjdjp.exe114⤵PID:3552
-
\??\c:\xfrxrxr.exec:\xfrxrxr.exe115⤵PID:1208
-
\??\c:\nnbbbh.exec:\nnbbbh.exe116⤵PID:3068
-
\??\c:\lxrlllf.exec:\lxrlllf.exe117⤵PID:228
-
\??\c:\nnbbnn.exec:\nnbbnn.exe118⤵PID:5048
-
\??\c:\nthbnn.exec:\nthbnn.exe119⤵PID:940
-
\??\c:\rxfxrrl.exec:\rxfxrrl.exe120⤵PID:4988
-
\??\c:\lxxlxrf.exec:\lxxlxrf.exe121⤵PID:4108
-
\??\c:\tntttt.exec:\tntttt.exe122⤵PID:4232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-