Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 16:35
Behavioral task
behavioral1
Sample
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
Resource
win7-20240903-en
General
-
Target
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
-
Size
3.8MB
-
MD5
d0501ac2c9d1e495e9c67666f8aaee40
-
SHA1
3cd59eb00c8473018bd68be0d685c7e6a5639a06
-
SHA256
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712
-
SHA512
8e23012928fb3d4e959a3d5e73fa17e20a37d3c56bc2c3dbe90ce1ff51a9070de1aa32812303d9752b4bc665f451e962f94299498bcddf3566aad11259c2f114
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98g:U6XLq/qPPslzKx/dJg1ErmNn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3148-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3256-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2748-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3852-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3024-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3772-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1416-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1300-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1784-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2944-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/772-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4504-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2564-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4580-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/232-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4968-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3744-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4464-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3916-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4548-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1500-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1932-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3504-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-228-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1904-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4692-242-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4204-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3228-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2260-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2052-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4944-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4804-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2128-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/812-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2384-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/396-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1096-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4788-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1652-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1232-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-419-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-423-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1124-490-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2268-497-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4500-501-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1076-514-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4748-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3324-603-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3588-613-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/640-647-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-669-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2120-673-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2664-731-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4428-741-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4076-781-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1076-791-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3740-1029-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3316-1147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
xrllfxl.exelrlxxff.exe9jdjj.exepvvjj.exelrffflr.exetthhnh.exepjjvd.exevvppv.exefxfllrf.exebtbhbt.exe3fffxff.exerxrrxlr.exejvdvp.exepvjjp.exeppvdd.exexffffff.exepjdjp.exepvdpv.exehtntbh.exepjjdp.exejdvjv.exehhhnth.exepdpvd.exenhhbtn.exetnbhtt.exe1vvdd.exeddvvp.exebbhttt.exebtbbhn.exevvpvv.exejvvdd.exebnnntb.exe7vddd.exefrrxxll.exejvddp.exerxrffff.exehbtnhh.exe3jjjp.exerlrrlll.exehbntbt.exerlrfffr.exexrflflx.exetnnnnn.exehthnbn.exedjvjj.exevpvdp.exerlfxllf.exehbtbbn.exebnbhht.exevdvvd.exepjvjp.exejpjpv.exelrrxxxx.exebnhbtt.exedpdpp.exedvpvj.exelxxrrrx.exelxfffff.exenhttbb.exetbhhht.exedvjpp.exepvdjd.exelrffllx.exenbbhth.exepid process 2444 xrllfxl.exe 5116 lrlxxff.exe 3256 9jdjj.exe 2952 pvvjj.exe 2748 lrffflr.exe 3852 tthhnh.exe 1628 pjjvd.exe 3024 vvppv.exe 776 fxfllrf.exe 3304 btbhbt.exe 3772 3fffxff.exe 1416 rxrrxlr.exe 1300 jvdvp.exe 1784 pvjjp.exe 2944 ppvdd.exe 772 xffffff.exe 1856 pjdjp.exe 4504 pvdpv.exe 2564 htntbh.exe 1464 pjjdp.exe 1376 jdvjv.exe 4580 hhhnth.exe 232 pdpvd.exe 372 nhhbtn.exe 4036 tnbhtt.exe 3224 1vvdd.exe 3744 ddvvp.exe 4968 bbhttt.exe 4464 btbbhn.exe 3244 vvpvv.exe 3564 jvvdd.exe 3720 bnnntb.exe 2568 7vddd.exe 3916 frrxxll.exe 4548 jvddp.exe 3600 rxrffff.exe 1500 hbtnhh.exe 1932 3jjjp.exe 3268 rlrrlll.exe 2920 hbntbt.exe 3504 rlrfffr.exe 4828 xrflflx.exe 1288 tnnnnn.exe 3416 hthnbn.exe 864 djvjj.exe 5092 vpvdp.exe 1904 rlfxllf.exe 3964 hbtbbn.exe 4692 bnbhht.exe 4204 vdvvd.exe 4552 pjvjp.exe 3228 jpjpv.exe 5072 lrrxxxx.exe 2868 bnhbtt.exe 3252 dpdpp.exe 2260 dvpvj.exe 3392 lxxrrrx.exe 1520 lxfffff.exe 2052 nhttbb.exe 376 tbhhht.exe 3460 dvjpp.exe 804 pvdjd.exe 3224 lrffllx.exe 4944 nbbhth.exe -
Processes:
resource yara_rule behavioral2/memory/3148-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrllfxl.exe upx behavioral2/memory/3148-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lrlxxff.exe upx C:\9jdjj.exe upx behavioral2/memory/5116-16-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pvvjj.exe upx behavioral2/memory/3256-23-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lrffflr.exe upx behavioral2/memory/2748-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2952-29-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tthhnh.exe upx behavioral2/memory/3852-35-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjjvd.exe upx behavioral2/memory/3024-46-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vvppv.exe upx \??\c:\fxfllrf.exe upx C:\btbhbt.exe upx C:\3fffxff.exe upx behavioral2/memory/3772-63-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rxrrxlr.exe upx behavioral2/memory/1416-68-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvdvp.exe upx behavioral2/memory/1300-74-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pvjjp.exe upx behavioral2/memory/1300-79-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ppvdd.exe upx behavioral2/memory/1784-85-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xffffff.exe upx behavioral2/memory/2944-91-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjdjp.exe upx behavioral2/memory/1856-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/772-98-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pvdpv.exe upx behavioral2/memory/4504-105-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\htntbh.exe upx C:\pjjdp.exe upx behavioral2/memory/2564-116-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdvjv.exe upx C:\hhhnth.exe upx C:\pdpvd.exe upx behavioral2/memory/4580-132-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhhbtn.exe upx behavioral2/memory/232-136-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbhtt.exe upx \??\c:\1vvdd.exe upx behavioral2/memory/4036-148-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ddvvp.exe upx behavioral2/memory/3224-153-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbhttt.exe upx behavioral2/memory/4968-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3744-160-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\btbbhn.exe upx C:\vvpvv.exe upx behavioral2/memory/4464-171-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jvvdd.exe upx C:\bnnntb.exe upx behavioral2/memory/3916-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4548-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1500-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1932-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3504-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/864-228-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1904-235-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bhhhbt.exexrrrffx.exelfxfrrr.exelflxlll.exellxlrxf.exejddpv.exellrxxff.exeddjvv.exebhntth.exebhtbnn.exevvpjd.exejvdvj.exejvjpp.exetnbnth.exepjvvv.exe9thhtt.exejpvvj.exepjpvd.exefffxlrl.exefflrrxf.exeppjvd.exexrffllf.exepvjpj.exerxxlxfl.exehbnnhh.exepddvv.exe1pjjj.exedvjdv.exelrxrrfx.exebnnhht.exebbntth.exerrfllrr.exedpdvd.exeppvvp.exehbbhbh.exetbhhht.exevpdjv.exedvvjj.exetntntn.exepdjpd.exevvvjv.exebnnbnn.exethbnhn.exerlrfxfx.exebtbhht.exe1dpvp.exeppjdv.exenbbhnt.exetbtbhb.exe9jvvd.exehhbnnb.exebtnnnt.exerrxrlfx.exelrxffll.exexflxrlx.exeddjjd.exehhhnbt.exepvppj.exexxlrxff.exehnbhnt.exefxfflll.exebhntbh.exepjjdp.exebbtbbn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9thhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxlxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflxrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbbn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exexrllfxl.exelrlxxff.exe9jdjj.exepvvjj.exelrffflr.exetthhnh.exepjjvd.exevvppv.exefxfllrf.exebtbhbt.exe3fffxff.exerxrrxlr.exejvdvp.exepvjjp.exeppvdd.exexffffff.exepjdjp.exepvdpv.exehtntbh.exepjjdp.exejdvjv.exedescription pid process target process PID 3148 wrote to memory of 2444 3148 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe xrllfxl.exe PID 3148 wrote to memory of 2444 3148 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe xrllfxl.exe PID 3148 wrote to memory of 2444 3148 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe xrllfxl.exe PID 2444 wrote to memory of 5116 2444 xrllfxl.exe lrlxxff.exe PID 2444 wrote to memory of 5116 2444 xrllfxl.exe lrlxxff.exe PID 2444 wrote to memory of 5116 2444 xrllfxl.exe lrlxxff.exe PID 5116 wrote to memory of 3256 5116 lrlxxff.exe 9jdjj.exe PID 5116 wrote to memory of 3256 5116 lrlxxff.exe 9jdjj.exe PID 5116 wrote to memory of 3256 5116 lrlxxff.exe 9jdjj.exe PID 3256 wrote to memory of 2952 3256 9jdjj.exe pvvjj.exe PID 3256 wrote to memory of 2952 3256 9jdjj.exe pvvjj.exe PID 3256 wrote to memory of 2952 3256 9jdjj.exe pvvjj.exe PID 2952 wrote to memory of 2748 2952 pvvjj.exe lrffflr.exe PID 2952 wrote to memory of 2748 2952 pvvjj.exe lrffflr.exe PID 2952 wrote to memory of 2748 2952 pvvjj.exe lrffflr.exe PID 2748 wrote to memory of 3852 2748 lrffflr.exe tthhnh.exe PID 2748 wrote to memory of 3852 2748 lrffflr.exe tthhnh.exe PID 2748 wrote to memory of 3852 2748 lrffflr.exe tthhnh.exe PID 3852 wrote to memory of 1628 3852 tthhnh.exe pjjvd.exe PID 3852 wrote to memory of 1628 3852 tthhnh.exe pjjvd.exe PID 3852 wrote to memory of 1628 3852 tthhnh.exe pjjvd.exe PID 1628 wrote to memory of 3024 1628 pjjvd.exe vvppv.exe PID 1628 wrote to memory of 3024 1628 pjjvd.exe vvppv.exe PID 1628 wrote to memory of 3024 1628 pjjvd.exe vvppv.exe PID 3024 wrote to memory of 776 3024 vvppv.exe fxfllrf.exe PID 3024 wrote to memory of 776 3024 vvppv.exe fxfllrf.exe PID 3024 wrote to memory of 776 3024 vvppv.exe fxfllrf.exe PID 776 wrote to memory of 3304 776 fxfllrf.exe btbhbt.exe PID 776 wrote to memory of 3304 776 fxfllrf.exe btbhbt.exe PID 776 wrote to memory of 3304 776 fxfllrf.exe btbhbt.exe PID 3304 wrote to memory of 3772 3304 btbhbt.exe 3fffxff.exe PID 3304 wrote to memory of 3772 3304 btbhbt.exe 3fffxff.exe PID 3304 wrote to memory of 3772 3304 btbhbt.exe 3fffxff.exe PID 3772 wrote to memory of 1416 3772 3fffxff.exe rxrrxlr.exe PID 3772 wrote to memory of 1416 3772 3fffxff.exe rxrrxlr.exe PID 3772 wrote to memory of 1416 3772 3fffxff.exe rxrrxlr.exe PID 1416 wrote to memory of 1300 1416 rxrrxlr.exe jvdvp.exe PID 1416 wrote to memory of 1300 1416 rxrrxlr.exe jvdvp.exe PID 1416 wrote to memory of 1300 1416 rxrrxlr.exe jvdvp.exe PID 1300 wrote to memory of 1784 1300 jvdvp.exe pvjjp.exe PID 1300 wrote to memory of 1784 1300 jvdvp.exe pvjjp.exe PID 1300 wrote to memory of 1784 1300 jvdvp.exe pvjjp.exe PID 1784 wrote to memory of 2944 1784 pvjjp.exe ppvdd.exe PID 1784 wrote to memory of 2944 1784 pvjjp.exe ppvdd.exe PID 1784 wrote to memory of 2944 1784 pvjjp.exe ppvdd.exe PID 2944 wrote to memory of 772 2944 ppvdd.exe xffffff.exe PID 2944 wrote to memory of 772 2944 ppvdd.exe xffffff.exe PID 2944 wrote to memory of 772 2944 ppvdd.exe xffffff.exe PID 772 wrote to memory of 1856 772 xffffff.exe pjdjp.exe PID 772 wrote to memory of 1856 772 xffffff.exe pjdjp.exe PID 772 wrote to memory of 1856 772 xffffff.exe pjdjp.exe PID 1856 wrote to memory of 4504 1856 pjdjp.exe pvdpv.exe PID 1856 wrote to memory of 4504 1856 pjdjp.exe pvdpv.exe PID 1856 wrote to memory of 4504 1856 pjdjp.exe pvdpv.exe PID 4504 wrote to memory of 2564 4504 pvdpv.exe htntbh.exe PID 4504 wrote to memory of 2564 4504 pvdpv.exe htntbh.exe PID 4504 wrote to memory of 2564 4504 pvdpv.exe htntbh.exe PID 2564 wrote to memory of 1464 2564 htntbh.exe pjjdp.exe PID 2564 wrote to memory of 1464 2564 htntbh.exe pjjdp.exe PID 2564 wrote to memory of 1464 2564 htntbh.exe pjjdp.exe PID 1464 wrote to memory of 1376 1464 pjjdp.exe jdvjv.exe PID 1464 wrote to memory of 1376 1464 pjjdp.exe jdvjv.exe PID 1464 wrote to memory of 1376 1464 pjjdp.exe jdvjv.exe PID 1376 wrote to memory of 4580 1376 jdvjv.exe hhhnth.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\xrllfxl.exec:\xrllfxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\lrlxxff.exec:\lrlxxff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\9jdjj.exec:\9jdjj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
\??\c:\pvvjj.exec:\pvvjj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\lrffflr.exec:\lrffflr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\tthhnh.exec:\tthhnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
\??\c:\pjjvd.exec:\pjjvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\vvppv.exec:\vvppv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\fxfllrf.exec:\fxfllrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\btbhbt.exec:\btbhbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\3fffxff.exec:\3fffxff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\rxrrxlr.exec:\rxrrxlr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
\??\c:\jvdvp.exec:\jvdvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\pvjjp.exec:\pvjjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\ppvdd.exec:\ppvdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\xffffff.exec:\xffffff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\pjdjp.exec:\pjdjp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\pvdpv.exec:\pvdpv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\htntbh.exec:\htntbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\pjjdp.exec:\pjjdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\jdvjv.exec:\jdvjv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\hhhnth.exec:\hhhnth.exe23⤵
- Executes dropped EXE
PID:4580 -
\??\c:\pdpvd.exec:\pdpvd.exe24⤵
- Executes dropped EXE
PID:232 -
\??\c:\nhhbtn.exec:\nhhbtn.exe25⤵
- Executes dropped EXE
PID:372 -
\??\c:\tnbhtt.exec:\tnbhtt.exe26⤵
- Executes dropped EXE
PID:4036 -
\??\c:\1vvdd.exec:\1vvdd.exe27⤵
- Executes dropped EXE
PID:3224 -
\??\c:\ddvvp.exec:\ddvvp.exe28⤵
- Executes dropped EXE
PID:3744 -
\??\c:\bbhttt.exec:\bbhttt.exe29⤵
- Executes dropped EXE
PID:4968 -
\??\c:\btbbhn.exec:\btbbhn.exe30⤵
- Executes dropped EXE
PID:4464 -
\??\c:\vvpvv.exec:\vvpvv.exe31⤵
- Executes dropped EXE
PID:3244 -
\??\c:\jvvdd.exec:\jvvdd.exe32⤵
- Executes dropped EXE
PID:3564 -
\??\c:\bnnntb.exec:\bnnntb.exe33⤵
- Executes dropped EXE
PID:3720 -
\??\c:\7vddd.exec:\7vddd.exe34⤵
- Executes dropped EXE
PID:2568 -
\??\c:\frrxxll.exec:\frrxxll.exe35⤵
- Executes dropped EXE
PID:3916 -
\??\c:\jvddp.exec:\jvddp.exe36⤵
- Executes dropped EXE
PID:4548 -
\??\c:\rxrffff.exec:\rxrffff.exe37⤵
- Executes dropped EXE
PID:3600 -
\??\c:\hbtnhh.exec:\hbtnhh.exe38⤵
- Executes dropped EXE
PID:1500 -
\??\c:\3jjjp.exec:\3jjjp.exe39⤵
- Executes dropped EXE
PID:1932 -
\??\c:\rlrrlll.exec:\rlrrlll.exe40⤵
- Executes dropped EXE
PID:3268 -
\??\c:\hbntbt.exec:\hbntbt.exe41⤵
- Executes dropped EXE
PID:2920 -
\??\c:\rlrfffr.exec:\rlrfffr.exe42⤵
- Executes dropped EXE
PID:3504 -
\??\c:\xrflflx.exec:\xrflflx.exe43⤵
- Executes dropped EXE
PID:4828 -
\??\c:\tnnnnn.exec:\tnnnnn.exe44⤵
- Executes dropped EXE
PID:1288 -
\??\c:\hthnbn.exec:\hthnbn.exe45⤵
- Executes dropped EXE
PID:3416 -
\??\c:\djvjj.exec:\djvjj.exe46⤵
- Executes dropped EXE
PID:864 -
\??\c:\vpvdp.exec:\vpvdp.exe47⤵
- Executes dropped EXE
PID:5092 -
\??\c:\rlfxllf.exec:\rlfxllf.exe48⤵
- Executes dropped EXE
PID:1904 -
\??\c:\hbtbbn.exec:\hbtbbn.exe49⤵
- Executes dropped EXE
PID:3964 -
\??\c:\bnbhht.exec:\bnbhht.exe50⤵
- Executes dropped EXE
PID:4692 -
\??\c:\vdvvd.exec:\vdvvd.exe51⤵
- Executes dropped EXE
PID:4204 -
\??\c:\pjvjp.exec:\pjvjp.exe52⤵
- Executes dropped EXE
PID:4552 -
\??\c:\jpjpv.exec:\jpjpv.exe53⤵
- Executes dropped EXE
PID:3228 -
\??\c:\lrrxxxx.exec:\lrrxxxx.exe54⤵
- Executes dropped EXE
PID:5072 -
\??\c:\bnhbtt.exec:\bnhbtt.exe55⤵
- Executes dropped EXE
PID:2868 -
\??\c:\dpdpp.exec:\dpdpp.exe56⤵
- Executes dropped EXE
PID:3252 -
\??\c:\dvpvj.exec:\dvpvj.exe57⤵
- Executes dropped EXE
PID:2260 -
\??\c:\lxxrrrx.exec:\lxxrrrx.exe58⤵
- Executes dropped EXE
PID:3392 -
\??\c:\lxfffff.exec:\lxfffff.exe59⤵
- Executes dropped EXE
PID:1520 -
\??\c:\nhttbb.exec:\nhttbb.exe60⤵
- Executes dropped EXE
PID:2052 -
\??\c:\tbhhht.exec:\tbhhht.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:376 -
\??\c:\dvjpp.exec:\dvjpp.exe62⤵
- Executes dropped EXE
PID:3460 -
\??\c:\pvdjd.exec:\pvdjd.exe63⤵
- Executes dropped EXE
PID:804 -
\??\c:\lrffllx.exec:\lrffllx.exe64⤵
- Executes dropped EXE
PID:3224 -
\??\c:\nbbhth.exec:\nbbhth.exe65⤵
- Executes dropped EXE
PID:4944 -
\??\c:\tbtbhb.exec:\tbtbhb.exe66⤵PID:2500
-
\??\c:\pjjpp.exec:\pjjpp.exe67⤵PID:2456
-
\??\c:\lfxlxlx.exec:\lfxlxlx.exe68⤵PID:4804
-
\??\c:\fflllll.exec:\fflllll.exe69⤵PID:2040
-
\??\c:\tbhhnb.exec:\tbhhnb.exe70⤵PID:2128
-
\??\c:\dvpdj.exec:\dvpdj.exe71⤵PID:2768
-
\??\c:\xlffrxf.exec:\xlffrxf.exe72⤵PID:2908
-
\??\c:\tbhntn.exec:\tbhntn.exe73⤵PID:3448
-
\??\c:\bbbbtb.exec:\bbbbtb.exe74⤵PID:1472
-
\??\c:\jdjdd.exec:\jdjdd.exe75⤵PID:812
-
\??\c:\vjjpp.exec:\vjjpp.exe76⤵PID:4068
-
\??\c:\rllrrlx.exec:\rllrrlx.exe77⤵PID:3864
-
\??\c:\hnbhth.exec:\hnbhth.exe78⤵PID:4536
-
\??\c:\jpdpp.exec:\jpdpp.exe79⤵PID:2772
-
\??\c:\pvpvd.exec:\pvpvd.exe80⤵PID:1360
-
\??\c:\rrfxxfl.exec:\rrfxxfl.exe81⤵PID:2384
-
\??\c:\tttbhn.exec:\tttbhn.exe82⤵PID:3264
-
\??\c:\nnhtbt.exec:\nnhtbt.exe83⤵PID:396
-
\??\c:\vjvvd.exec:\vjvvd.exe84⤵PID:1760
-
\??\c:\rlrrxlf.exec:\rlrrxlf.exe85⤵PID:2944
-
\??\c:\rfxlxfl.exec:\rfxlxfl.exe86⤵PID:1096
-
\??\c:\rrfxrlx.exec:\rrfxrlx.exe87⤵PID:4652
-
\??\c:\ntbhhn.exec:\ntbhhn.exe88⤵PID:1456
-
\??\c:\dvvpd.exec:\dvvpd.exe89⤵PID:4788
-
\??\c:\rxfxfxr.exec:\rxfxfxr.exe90⤵PID:4532
-
\??\c:\rrllxlr.exec:\rrllxlr.exe91⤵PID:1756
-
\??\c:\htthhh.exec:\htthhh.exe92⤵PID:1652
-
\??\c:\jpppd.exec:\jpppd.exe93⤵PID:4300
-
\??\c:\flrrrlr.exec:\flrrrlr.exe94⤵PID:2360
-
\??\c:\bbttnn.exec:\bbttnn.exe95⤵PID:1708
-
\??\c:\vjdvp.exec:\vjdvp.exe96⤵PID:1232
-
\??\c:\xxfrlfx.exec:\xxfrlfx.exe97⤵PID:232
-
\??\c:\llrxxff.exec:\llrxxff.exe98⤵
- System Location Discovery: System Language Discovery
PID:1000 -
\??\c:\htntth.exec:\htntth.exe99⤵PID:3944
-
\??\c:\jjjpv.exec:\jjjpv.exe100⤵PID:2076
-
\??\c:\pvvdv.exec:\pvvdv.exe101⤵PID:1800
-
\??\c:\llrrrrl.exec:\llrrrrl.exe102⤵PID:2188
-
\??\c:\tbhbht.exec:\tbhbht.exe103⤵PID:1356
-
\??\c:\pjddd.exec:\pjddd.exe104⤵PID:4036
-
\??\c:\pdjpd.exec:\pdjpd.exe105⤵
- System Location Discovery: System Language Discovery
PID:3148 -
\??\c:\lrlrxll.exec:\lrlrxll.exe106⤵PID:4024
-
\??\c:\thtnhn.exec:\thtnhn.exe107⤵PID:860
-
\??\c:\7nhbtt.exec:\7nhbtt.exe108⤵PID:2396
-
\??\c:\vpvjp.exec:\vpvjp.exe109⤵PID:4800
-
\??\c:\lrlxrff.exec:\lrlxrff.exe110⤵PID:4288
-
\??\c:\llffllr.exec:\llffllr.exe111⤵PID:5116
-
\??\c:\tthhbb.exec:\tthhbb.exe112⤵PID:732
-
\??\c:\1vdjv.exec:\1vdjv.exe113⤵PID:1684
-
\??\c:\llrxrff.exec:\llrxrff.exe114⤵PID:2568
-
\??\c:\nhnnbt.exec:\nhnnbt.exe115⤵PID:2764
-
\??\c:\hhttbn.exec:\hhttbn.exe116⤵PID:464
-
\??\c:\vjjdd.exec:\vjjdd.exe117⤵PID:2160
-
\??\c:\xrfxlxl.exec:\xrfxlxl.exe118⤵PID:5088
-
\??\c:\5rfllrr.exec:\5rfllrr.exe119⤵PID:2932
-
\??\c:\nnhhhn.exec:\nnhhhn.exe120⤵PID:3268
-
\??\c:\5nbbbh.exec:\5nbbbh.exe121⤵PID:2920
-
\??\c:\nbnnnh.exec:\nbnnnh.exe122⤵PID:4836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-