Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 16:32
Behavioral task
behavioral1
Sample
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
Resource
win7-20241010-en
General
-
Target
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
-
Size
3.8MB
-
MD5
d0501ac2c9d1e495e9c67666f8aaee40
-
SHA1
3cd59eb00c8473018bd68be0d685c7e6a5639a06
-
SHA256
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712
-
SHA512
8e23012928fb3d4e959a3d5e73fa17e20a37d3c56bc2c3dbe90ce1ff51a9070de1aa32812303d9752b4bc665f451e962f94299498bcddf3566aad11259c2f114
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98g:U6XLq/qPPslzKx/dJg1ErmNn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
Processes:
resource yara_rule behavioral2/memory/4180-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/536-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/744-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1104-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3436-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1008-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2632-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/628-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3624-60-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1924-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1816-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/552-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3952-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4676-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4812-103-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1824-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2828-120-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2012-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1284-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1352-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4628-155-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3016-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3668-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2252-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4808-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3840-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2944-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/812-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1892-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/372-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2536-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3644-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4068-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2756-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1188-272-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2120-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4432-295-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4664-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2908-318-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1776-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/396-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4832-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1128-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1420-365-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1724-369-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1600-373-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3004-389-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4424-399-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1072-406-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1720-410-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3552-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/620-445-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1216-506-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4664-578-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/672-880-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2852-908-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5092-1093-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2252-1356-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/620-1530-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2120-1640-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
hnbtth.exeflxxlrr.exehnbnnn.exerrrfxrx.exelxflrrx.exejdvpp.exedjvdp.exedjvvv.exelrxrrxf.exeddpjj.exehnnntb.exexfxflxx.exehnttbb.exe5xllffx.exetthbhh.exenhnttt.exennbtbt.exepdppd.exexxlllff.exejjjvj.exejpdjj.exe3hbtnt.exexfxfxlr.exepjjpj.exejjdjd.exennbtbb.exexxlxrrl.exeffrlffx.exenbttbb.exeddjjv.exefxlrrxl.exejvjpv.exelxxlrfl.exe5dddp.exedvdvd.exexrlrlxf.exepjppp.exerlrllfr.exerxlflfl.exehtnnth.exehbnbtb.exevvdvv.exebntbnt.exeppvdd.exevpddd.exepppjp.exexffrrfr.exeffrrrxx.exefrxrllf.exehtnntt.exevdjjp.exexlfrrxl.exe5rrlxfr.exeflflfff.exexrlfrrf.exeflflxff.exelxlffff.exelrxrrxx.exefrffllr.exellxfrxf.exe3ntbnb.exehnbntn.exennbtbn.exettnhhh.exepid process 536 hnbtth.exe 1104 flxxlrr.exe 744 hnbnnn.exe 3436 rrrfxrx.exe 1008 lxflrrx.exe 2632 jdvpp.exe 628 djvdp.exe 668 djvvv.exe 1924 lrxrrxf.exe 3624 ddpjj.exe 1816 hnnntb.exe 2700 xfxflxx.exe 552 hnttbb.exe 3952 5xllffx.exe 4676 tthbhh.exe 1824 nhnttt.exe 4812 nnbtbt.exe 4884 pdppd.exe 2828 xxlllff.exe 2012 jjjvj.exe 1284 jpdjj.exe 1352 3hbtnt.exe 1608 xfxfxlr.exe 4520 pjjpj.exe 4628 jjdjd.exe 3668 nnbtbb.exe 3016 xxlxrrl.exe 5052 ffrlffx.exe 1880 nbttbb.exe 4464 ddjjv.exe 2252 fxlrrxl.exe 4808 jvjpv.exe 2196 lxxlrfl.exe 4744 5dddp.exe 3840 dvdvd.exe 4784 xrlrlxf.exe 3256 pjppp.exe 4144 rlrllfr.exe 2944 rxlflfl.exe 2664 htnnth.exe 812 hbnbtb.exe 1892 vvdvv.exe 640 bntbnt.exe 372 ppvdd.exe 2536 vpddd.exe 4336 pppjp.exe 3644 xffrrfr.exe 4508 ffrrrxx.exe 4516 frxrllf.exe 4068 htnntt.exe 4812 vdjjp.exe 2756 xlfrrxl.exe 4472 5rrlxfr.exe 3156 flflfff.exe 536 xrlfrrf.exe 1188 flflxff.exe 3308 lxlffff.exe 4732 lrxrrxx.exe 3668 frffllr.exe 2128 llxfrxf.exe 2120 3ntbnb.exe 3908 hnbntn.exe 4432 nnbtbn.exe 4016 ttnhhh.exe -
Processes:
resource yara_rule behavioral2/memory/4180-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4180-4-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hnbtth.exe upx C:\flxxlrr.exe upx behavioral2/memory/536-10-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hnbnnn.exe upx behavioral2/memory/744-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1104-17-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rrrfxrx.exe upx \??\c:\lxflrrx.exe upx behavioral2/memory/3436-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2632-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1008-35-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jdvpp.exe upx \??\c:\djvdp.exe upx behavioral2/memory/2632-42-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/628-47-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\djvvv.exe upx \??\c:\lrxrrxf.exe upx \??\c:\ddpjj.exe upx behavioral2/memory/3624-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1924-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1816-66-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hnnntb.exe upx behavioral2/memory/1816-72-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xfxflxx.exe upx C:\hnttbb.exe upx behavioral2/memory/552-79-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2700-78-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5xllffx.exe upx C:\tthbhh.exe upx behavioral2/memory/3952-89-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nhnttt.exe upx behavioral2/memory/4676-95-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nnbtbt.exe upx behavioral2/memory/4812-103-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1824-102-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4884-108-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pdppd.exe upx \??\c:\xxlllff.exe upx behavioral2/memory/2828-120-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jjjvj.exe upx C:\jpdjj.exe upx behavioral2/memory/2012-126-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1284-132-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\3hbtnt.exe upx \??\c:\xfxfxlr.exe upx behavioral2/memory/1352-136-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pjjpj.exe upx behavioral2/memory/1608-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4628-149-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jjdjd.exe upx C:\nnbtbb.exe upx behavioral2/memory/4628-155-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3016-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3668-161-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxlxrrl.exe upx \??\c:\ffrlffx.exe upx \??\c:\nbttbb.exe upx \??\c:\ddjjv.exe upx \??\c:\fxlrrxl.exe upx behavioral2/memory/2252-188-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jvjpv.exe upx behavioral2/memory/4808-192-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dpvjv.exejvdjj.exexflxxff.exefrrflfl.exexxrrllf.exexfrxlxf.exe5ntbhh.exefrlfffx.exevdjdd.exebntbhn.exe5jjvp.exevvdjp.exefflffff.exe1thntt.exexxfrlfl.exelxlxlxr.exehttnnt.exelffxrlf.exeppjpj.exe1bnbhn.exerlffxrf.exellfflrx.exejjjvj.exepppjp.exeffrrrxx.exefxfllfr.exedvdpj.exethtbhh.exejvdpj.exeppdvp.exenhbhht.exethttnt.exehnbnnn.exetthbhh.exebhthbb.exebnntth.exerrxfrlx.exeddvjj.exevvdjd.exerxfflxl.exexlxxfxl.exe7bttnh.exepvjpd.exerxlrxrx.exehhhnth.exevjppp.exetnbtht.exehtbthn.exevppjj.exexfrrlxx.exethhnnb.exelffffxf.exevdjjd.exe5ddpv.exerxlflfl.exehbnhhh.exehhnttb.exenhnhnn.exebnntbn.exevppvp.exevpdpd.exejjpjj.exeddddv.exeddjvv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrxlxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ntbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1thntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfrlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlxlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bnbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfllfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhthbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfflxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxxfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnntbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exehnbtth.exeflxxlrr.exehnbnnn.exerrrfxrx.exelxflrrx.exejdvpp.exedjvdp.exedjvvv.exelrxrrxf.exeddpjj.exehnnntb.exexfxflxx.exehnttbb.exe5xllffx.exetthbhh.exenhnttt.exennbtbt.exepdppd.exexxlllff.exejjjvj.exejpdjj.exedescription pid process target process PID 4180 wrote to memory of 536 4180 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe hnbtth.exe PID 4180 wrote to memory of 536 4180 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe hnbtth.exe PID 4180 wrote to memory of 536 4180 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe hnbtth.exe PID 536 wrote to memory of 1104 536 hnbtth.exe flxxlrr.exe PID 536 wrote to memory of 1104 536 hnbtth.exe flxxlrr.exe PID 536 wrote to memory of 1104 536 hnbtth.exe flxxlrr.exe PID 1104 wrote to memory of 744 1104 flxxlrr.exe hnbnnn.exe PID 1104 wrote to memory of 744 1104 flxxlrr.exe hnbnnn.exe PID 1104 wrote to memory of 744 1104 flxxlrr.exe hnbnnn.exe PID 744 wrote to memory of 3436 744 hnbnnn.exe rrrfxrx.exe PID 744 wrote to memory of 3436 744 hnbnnn.exe rrrfxrx.exe PID 744 wrote to memory of 3436 744 hnbnnn.exe rrrfxrx.exe PID 3436 wrote to memory of 1008 3436 rrrfxrx.exe lxflrrx.exe PID 3436 wrote to memory of 1008 3436 rrrfxrx.exe lxflrrx.exe PID 3436 wrote to memory of 1008 3436 rrrfxrx.exe lxflrrx.exe PID 1008 wrote to memory of 2632 1008 lxflrrx.exe jdvpp.exe PID 1008 wrote to memory of 2632 1008 lxflrrx.exe jdvpp.exe PID 1008 wrote to memory of 2632 1008 lxflrrx.exe jdvpp.exe PID 2632 wrote to memory of 628 2632 jdvpp.exe djvdp.exe PID 2632 wrote to memory of 628 2632 jdvpp.exe djvdp.exe PID 2632 wrote to memory of 628 2632 jdvpp.exe djvdp.exe PID 628 wrote to memory of 668 628 djvdp.exe djvvv.exe PID 628 wrote to memory of 668 628 djvdp.exe djvvv.exe PID 628 wrote to memory of 668 628 djvdp.exe djvvv.exe PID 668 wrote to memory of 1924 668 djvvv.exe lrxrrxf.exe PID 668 wrote to memory of 1924 668 djvvv.exe lrxrrxf.exe PID 668 wrote to memory of 1924 668 djvvv.exe lrxrrxf.exe PID 1924 wrote to memory of 3624 1924 lrxrrxf.exe ddpjj.exe PID 1924 wrote to memory of 3624 1924 lrxrrxf.exe ddpjj.exe PID 1924 wrote to memory of 3624 1924 lrxrrxf.exe ddpjj.exe PID 3624 wrote to memory of 1816 3624 ddpjj.exe hnnntb.exe PID 3624 wrote to memory of 1816 3624 ddpjj.exe hnnntb.exe PID 3624 wrote to memory of 1816 3624 ddpjj.exe hnnntb.exe PID 1816 wrote to memory of 2700 1816 hnnntb.exe xfxflxx.exe PID 1816 wrote to memory of 2700 1816 hnnntb.exe xfxflxx.exe PID 1816 wrote to memory of 2700 1816 hnnntb.exe xfxflxx.exe PID 2700 wrote to memory of 552 2700 xfxflxx.exe hnttbb.exe PID 2700 wrote to memory of 552 2700 xfxflxx.exe hnttbb.exe PID 2700 wrote to memory of 552 2700 xfxflxx.exe hnttbb.exe PID 552 wrote to memory of 3952 552 hnttbb.exe 5xllffx.exe PID 552 wrote to memory of 3952 552 hnttbb.exe 5xllffx.exe PID 552 wrote to memory of 3952 552 hnttbb.exe 5xllffx.exe PID 3952 wrote to memory of 4676 3952 5xllffx.exe tthbhh.exe PID 3952 wrote to memory of 4676 3952 5xllffx.exe tthbhh.exe PID 3952 wrote to memory of 4676 3952 5xllffx.exe tthbhh.exe PID 4676 wrote to memory of 1824 4676 tthbhh.exe nhnttt.exe PID 4676 wrote to memory of 1824 4676 tthbhh.exe nhnttt.exe PID 4676 wrote to memory of 1824 4676 tthbhh.exe nhnttt.exe PID 1824 wrote to memory of 4812 1824 nhnttt.exe vdjjp.exe PID 1824 wrote to memory of 4812 1824 nhnttt.exe vdjjp.exe PID 1824 wrote to memory of 4812 1824 nhnttt.exe vdjjp.exe PID 4812 wrote to memory of 4884 4812 nnbtbt.exe pdppd.exe PID 4812 wrote to memory of 4884 4812 nnbtbt.exe pdppd.exe PID 4812 wrote to memory of 4884 4812 nnbtbt.exe pdppd.exe PID 4884 wrote to memory of 2828 4884 pdppd.exe xxlllff.exe PID 4884 wrote to memory of 2828 4884 pdppd.exe xxlllff.exe PID 4884 wrote to memory of 2828 4884 pdppd.exe xxlllff.exe PID 2828 wrote to memory of 2012 2828 xxlllff.exe jjjvj.exe PID 2828 wrote to memory of 2012 2828 xxlllff.exe jjjvj.exe PID 2828 wrote to memory of 2012 2828 xxlllff.exe jjjvj.exe PID 2012 wrote to memory of 1284 2012 jjjvj.exe jpdjj.exe PID 2012 wrote to memory of 1284 2012 jjjvj.exe jpdjj.exe PID 2012 wrote to memory of 1284 2012 jjjvj.exe jpdjj.exe PID 1284 wrote to memory of 1352 1284 jpdjj.exe 3hbtnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\hnbtth.exec:\hnbtth.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\flxxlrr.exec:\flxxlrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\hnbnnn.exec:\hnbnnn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
\??\c:\rrrfxrx.exec:\rrrfxrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\lxflrrx.exec:\lxflrrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\jdvpp.exec:\jdvpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\djvdp.exec:\djvdp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
\??\c:\djvvv.exec:\djvvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\lrxrrxf.exec:\lrxrrxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\ddpjj.exec:\ddpjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\hnnntb.exec:\hnnntb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\xfxflxx.exec:\xfxflxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\hnttbb.exec:\hnttbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\5xllffx.exec:\5xllffx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
\??\c:\tthbhh.exec:\tthbhh.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\nhnttt.exec:\nhnttt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\nnbtbt.exec:\nnbtbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\pdppd.exec:\pdppd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\xxlllff.exec:\xxlllff.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\jjjvj.exec:\jjjvj.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\jpdjj.exec:\jpdjj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\3hbtnt.exec:\3hbtnt.exe23⤵
- Executes dropped EXE
PID:1352 -
\??\c:\xfxfxlr.exec:\xfxfxlr.exe24⤵
- Executes dropped EXE
PID:1608 -
\??\c:\pjjpj.exec:\pjjpj.exe25⤵
- Executes dropped EXE
PID:4520 -
\??\c:\jjdjd.exec:\jjdjd.exe26⤵
- Executes dropped EXE
PID:4628 -
\??\c:\nnbtbb.exec:\nnbtbb.exe27⤵
- Executes dropped EXE
PID:3668 -
\??\c:\xxlxrrl.exec:\xxlxrrl.exe28⤵
- Executes dropped EXE
PID:3016 -
\??\c:\ffrlffx.exec:\ffrlffx.exe29⤵
- Executes dropped EXE
PID:5052 -
\??\c:\nbttbb.exec:\nbttbb.exe30⤵
- Executes dropped EXE
PID:1880 -
\??\c:\ddjjv.exec:\ddjjv.exe31⤵
- Executes dropped EXE
PID:4464 -
\??\c:\fxlrrxl.exec:\fxlrrxl.exe32⤵
- Executes dropped EXE
PID:2252 -
\??\c:\jvjpv.exec:\jvjpv.exe33⤵
- Executes dropped EXE
PID:4808 -
\??\c:\lxxlrfl.exec:\lxxlrfl.exe34⤵
- Executes dropped EXE
PID:2196 -
\??\c:\5dddp.exec:\5dddp.exe35⤵
- Executes dropped EXE
PID:4744 -
\??\c:\dvdvd.exec:\dvdvd.exe36⤵
- Executes dropped EXE
PID:3840 -
\??\c:\xrlrlxf.exec:\xrlrlxf.exe37⤵
- Executes dropped EXE
PID:4784 -
\??\c:\pjppp.exec:\pjppp.exe38⤵
- Executes dropped EXE
PID:3256 -
\??\c:\rlrllfr.exec:\rlrllfr.exe39⤵
- Executes dropped EXE
PID:4144 -
\??\c:\rxlflfl.exec:\rxlflfl.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944 -
\??\c:\htnnth.exec:\htnnth.exe41⤵
- Executes dropped EXE
PID:2664 -
\??\c:\hbnbtb.exec:\hbnbtb.exe42⤵
- Executes dropped EXE
PID:812 -
\??\c:\vvdvv.exec:\vvdvv.exe43⤵
- Executes dropped EXE
PID:1892 -
\??\c:\bntbnt.exec:\bntbnt.exe44⤵
- Executes dropped EXE
PID:640 -
\??\c:\ppvdd.exec:\ppvdd.exe45⤵
- Executes dropped EXE
PID:372 -
\??\c:\vpddd.exec:\vpddd.exe46⤵
- Executes dropped EXE
PID:2536 -
\??\c:\pppjp.exec:\pppjp.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336 -
\??\c:\xffrrfr.exec:\xffrrfr.exe48⤵
- Executes dropped EXE
PID:3644 -
\??\c:\ffrrrxx.exec:\ffrrrxx.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4508 -
\??\c:\frxrllf.exec:\frxrllf.exe50⤵
- Executes dropped EXE
PID:4516 -
\??\c:\htnntt.exec:\htnntt.exe51⤵
- Executes dropped EXE
PID:4068 -
\??\c:\vdjjp.exec:\vdjjp.exe52⤵
- Executes dropped EXE
PID:4812 -
\??\c:\xlfrrxl.exec:\xlfrrxl.exe53⤵
- Executes dropped EXE
PID:2756 -
\??\c:\5rrlxfr.exec:\5rrlxfr.exe54⤵
- Executes dropped EXE
PID:4472 -
\??\c:\flflfff.exec:\flflfff.exe55⤵
- Executes dropped EXE
PID:3156 -
\??\c:\xrlfrrf.exec:\xrlfrrf.exe56⤵
- Executes dropped EXE
PID:536 -
\??\c:\flflxff.exec:\flflxff.exe57⤵
- Executes dropped EXE
PID:1188 -
\??\c:\lxlffff.exec:\lxlffff.exe58⤵
- Executes dropped EXE
PID:3308 -
\??\c:\lrxrrxx.exec:\lrxrrxx.exe59⤵
- Executes dropped EXE
PID:4732 -
\??\c:\frffllr.exec:\frffllr.exe60⤵
- Executes dropped EXE
PID:3668 -
\??\c:\llxfrxf.exec:\llxfrxf.exe61⤵
- Executes dropped EXE
PID:2128 -
\??\c:\3ntbnb.exec:\3ntbnb.exe62⤵
- Executes dropped EXE
PID:2120 -
\??\c:\hnbntn.exec:\hnbntn.exe63⤵
- Executes dropped EXE
PID:3908 -
\??\c:\nnbtbn.exec:\nnbtbn.exe64⤵
- Executes dropped EXE
PID:4432 -
\??\c:\ttnhhh.exec:\ttnhhh.exe65⤵
- Executes dropped EXE
PID:4016 -
\??\c:\ntbbhn.exec:\ntbbhn.exe66⤵PID:3088
-
\??\c:\bthbhh.exec:\bthbhh.exe67⤵PID:1400
-
\??\c:\hbnhhh.exec:\hbnhhh.exe68⤵
- System Location Discovery: System Language Discovery
PID:2432 -
\??\c:\xxlxxrl.exec:\xxlxxrl.exe69⤵PID:4664
-
\??\c:\bnnbnb.exec:\bnnbnb.exe70⤵PID:2820
-
\??\c:\7nbbtt.exec:\7nbbtt.exe71⤵PID:2908
-
\??\c:\bnnhnn.exec:\bnnhnn.exe72⤵PID:4972
-
\??\c:\1ntttt.exec:\1ntttt.exe73⤵PID:1776
-
\??\c:\nthbbb.exec:\nthbbb.exe74⤵PID:2876
-
\??\c:\dddpj.exec:\dddpj.exe75⤵PID:2428
-
\??\c:\dpjjj.exec:\dpjjj.exe76⤵PID:4048
-
\??\c:\xfrllxl.exec:\xfrllxl.exe77⤵PID:2192
-
\??\c:\bbnnbb.exec:\bbnnbb.exe78⤵PID:5048
-
\??\c:\hhtbbb.exec:\hhtbbb.exe79⤵PID:396
-
\??\c:\hhnhbb.exec:\hhnhbb.exe80⤵PID:1368
-
\??\c:\hbnttt.exec:\hbnttt.exe81⤵PID:3296
-
\??\c:\hhbtbn.exec:\hhbtbn.exe82⤵PID:4832
-
\??\c:\1thnnn.exec:\1thnnn.exe83⤵PID:1128
-
\??\c:\nnbbnn.exec:\nnbbnn.exe84⤵PID:4100
-
\??\c:\rrrffxf.exec:\rrrffxf.exe85⤵PID:1420
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe86⤵PID:1724
-
\??\c:\xxlllff.exec:\xxlllff.exe87⤵PID:1600
-
\??\c:\lxxlflr.exec:\lxxlflr.exe88⤵PID:4740
-
\??\c:\hbbhtb.exec:\hbbhtb.exe89⤵PID:3132
-
\??\c:\ttnnth.exec:\ttnnth.exe90⤵PID:1440
-
\??\c:\xrxxfrf.exec:\xrxxfrf.exe91⤵PID:2460
-
\??\c:\ffxflll.exec:\ffxflll.exe92⤵PID:3004
-
\??\c:\hhhbbn.exec:\hhhbbn.exe93⤵PID:4376
-
\??\c:\djpjv.exec:\djpjv.exe94⤵PID:3012
-
\??\c:\flxrffx.exec:\flxrffx.exe95⤵PID:4424
-
\??\c:\rfrrxfx.exec:\rfrrxfx.exe96⤵PID:3240
-
\??\c:\hnhhth.exec:\hnhhth.exe97⤵PID:1072
-
\??\c:\hbntbh.exec:\hbntbh.exe98⤵PID:1720
-
\??\c:\nbttbt.exec:\nbttbt.exe99⤵PID:4732
-
\??\c:\5jppd.exec:\5jppd.exe100⤵PID:1160
-
\??\c:\jdpvd.exec:\jdpvd.exe101⤵PID:5052
-
\??\c:\xfrrrlf.exec:\xfrrrlf.exe102⤵PID:2120
-
\??\c:\ffxxxxx.exec:\ffxxxxx.exe103⤵PID:3808
-
\??\c:\3rxfxxl.exec:\3rxfxxl.exe104⤵PID:1488
-
\??\c:\xxrflxl.exec:\xxrflxl.exe105⤵PID:3552
-
\??\c:\tnnnhn.exec:\tnnnhn.exe106⤵PID:4576
-
\??\c:\btbbnt.exec:\btbbnt.exe107⤵PID:3424
-
\??\c:\tbnnhn.exec:\tbnnhn.exe108⤵PID:2336
-
\??\c:\ddvjj.exec:\ddvjj.exe109⤵
- System Location Discovery: System Language Discovery
PID:620 -
\??\c:\llffflx.exec:\llffflx.exe110⤵PID:1204
-
\??\c:\3flfrrl.exec:\3flfrrl.exe111⤵PID:4744
-
\??\c:\xllrlxr.exec:\xllrlxr.exe112⤵PID:4020
-
\??\c:\bhnbbh.exec:\bhnbbh.exe113⤵PID:2540
-
\??\c:\thntbb.exec:\thntbb.exe114⤵PID:1844
-
\??\c:\vvddv.exec:\vvddv.exe115⤵PID:216
-
\??\c:\ppdvj.exec:\ppdvj.exe116⤵PID:4212
-
\??\c:\fxrxfff.exec:\fxrxfff.exe117⤵PID:2056
-
\??\c:\1llfrrf.exec:\1llfrrf.exe118⤵PID:624
-
\??\c:\lxfxrrf.exec:\lxfxrrf.exe119⤵PID:3208
-
\??\c:\bbhnnb.exec:\bbhnnb.exe120⤵PID:4948
-
\??\c:\nbtbtn.exec:\nbtbtn.exe121⤵PID:1968
-
\??\c:\nhbnnt.exec:\nhbnnt.exe122⤵PID:4636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-