Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 03:19
Behavioral task
behavioral1
Sample
ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe
Resource
win7-20240903-en
9 signatures
150 seconds
General
-
Target
ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe
-
Size
3.7MB
-
MD5
ae0fc95b71170c92dc1df2f92664a50f
-
SHA1
3cfe597bf7564404a7a67c987cd1d70416d6a4c4
-
SHA256
ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4
-
SHA512
02cad3cd87ce608c941149542bff752e99030c33f032278e91c43ee013d0fd1ea36f3a96e1a4d6860378d9cc6e2f7eadc41b1a09a5ad87751ec4d8b4d29ab40f
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF981:U6XLq/qPPslzKx/dJg1ErmNo
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/4216-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3420-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1972-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1004-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2844-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1848-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3932-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1304-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3884-66-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3580-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4476-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/404-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/432-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4796-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3392-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/780-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3288-310-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1464-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2068-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3748-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4300-377-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4244-419-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2576-400-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4216-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2268-372-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1484-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-364-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2040-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3084-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4476-303-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3632-289-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/264-282-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3884-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4508-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2188-264-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1012-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2820-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3368-240-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5088-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/316-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3548-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2348-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2992-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1288-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/888-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1188-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1356-130-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/640-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2784-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4424-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4852-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4508-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4740-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5036-446-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-498-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/628-535-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1784-558-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1328-604-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4328-608-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4260-657-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1604-765-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4724-808-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 3420 hhhttb.exe 1972 jdvjj.exe 1004 tntnnb.exe 2844 tnbbtt.exe 1848 dvjpd.exe 3932 xxxffrx.exe 1304 jjpdp.exe 4740 frxlrxr.exe 4508 ntthnt.exe 2828 vjdjp.exe 3884 rllxrlf.exe 4852 hbhhbh.exe 3580 jvpjj.exe 4424 ffflxlr.exe 2784 fxxxxxf.exe 4100 bthnbb.exe 780 pjjdp.exe 640 llfrxff.exe 4476 9nbntb.exe 404 ppjvj.exe 432 rlrrlll.exe 1356 nnhbbb.exe 2680 xfxrxxl.exe 1188 bnnttt.exe 2156 lflxrrx.exe 4796 hbttnt.exe 2744 ffrlffr.exe 888 tnbbbb.exe 2860 rxrxxff.exe 1680 tttbnt.exe 2416 vddjp.exe 3268 ttbttn.exe 3392 pvjjj.exe 3404 xflfrlx.exe 1288 hntntn.exe 2992 rxxlrff.exe 4812 bnnntn.exe 2348 jdjjp.exe 3548 vjppd.exe 1852 xxfxxxx.exe 3572 ttnnnt.exe 924 xlllfrx.exe 4160 vdjdp.exe 1116 tbnbhh.exe 316 frfllrr.exe 5088 nbbhnb.exe 5000 jpjjj.exe 3368 hthhhb.exe 4148 pvvjd.exe 1004 rxxlfxf.exe 2820 1thnnt.exe 1848 pvjpp.exe 1012 flflxxx.exe 1132 nbhtbh.exe 2188 jppdv.exe 4508 rxffxfl.exe 2828 bntbnn.exe 3884 djvdp.exe 4756 ntnbbb.exe 264 vvddp.exe 4424 xxrrxxl.exe 3632 nhnhbn.exe 4236 lxlfxfl.exe 780 hhttbt.exe -
resource yara_rule behavioral2/memory/4216-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4216-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023c0c-3.dat upx behavioral2/files/0x0007000000023cb4-9.dat upx behavioral2/memory/1972-13-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3420-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023cb1-14.dat upx behavioral2/memory/1972-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1004-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb6-24.dat upx behavioral2/memory/2844-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb7-30.dat upx behavioral2/memory/1848-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3932-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb9-42.dat upx behavioral2/memory/1304-43-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cba-48.dat upx behavioral2/files/0x0007000000023cbb-54.dat upx behavioral2/files/0x0007000000023cbc-59.dat upx behavioral2/files/0x0007000000023cbd-64.dat upx behavioral2/memory/3884-66-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbe-71.dat upx behavioral2/memory/3580-78-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc1-88.dat upx behavioral2/files/0x0007000000023cc2-95.dat upx behavioral2/memory/4476-112-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/404-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/432-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cca-140.dat upx behavioral2/files/0x0007000000023ccb-146.dat upx behavioral2/memory/4796-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccf-168.dat upx behavioral2/memory/3392-187-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/780-296-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3288-310-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1464-327-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2068-338-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3748-360-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4300-377-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4244-419-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2576-400-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4216-381-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2268-372-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1484-368-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1856-364-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2040-334-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3084-314-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4476-303-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3632-289-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/264-282-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3884-275-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4508-268-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2188-264-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1012-257-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2820-250-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3368-240-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5088-233-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/316-229-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3572-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3548-209-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2348-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2992-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1288-194-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd2-183.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrfflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrlffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlrrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrfrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrlfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnntt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3420 4216 ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe 84 PID 4216 wrote to memory of 3420 4216 ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe 84 PID 4216 wrote to memory of 3420 4216 ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe 84 PID 3420 wrote to memory of 1972 3420 hhhttb.exe 86 PID 3420 wrote to memory of 1972 3420 hhhttb.exe 86 PID 3420 wrote to memory of 1972 3420 hhhttb.exe 86 PID 1972 wrote to memory of 1004 1972 jdvjj.exe 136 PID 1972 wrote to memory of 1004 1972 jdvjj.exe 136 PID 1972 wrote to memory of 1004 1972 jdvjj.exe 136 PID 1004 wrote to memory of 2844 1004 tntnnb.exe 89 PID 1004 wrote to memory of 2844 1004 tntnnb.exe 89 PID 1004 wrote to memory of 2844 1004 tntnnb.exe 89 PID 2844 wrote to memory of 1848 2844 tnbbtt.exe 138 PID 2844 wrote to memory of 1848 2844 tnbbtt.exe 138 PID 2844 wrote to memory of 1848 2844 tnbbtt.exe 138 PID 1848 wrote to memory of 3932 1848 dvjpd.exe 188 PID 1848 wrote to memory of 3932 1848 dvjpd.exe 188 PID 1848 wrote to memory of 3932 1848 dvjpd.exe 188 PID 3932 wrote to memory of 1304 3932 xxxffrx.exe 93 PID 3932 wrote to memory of 1304 3932 xxxffrx.exe 93 PID 3932 wrote to memory of 1304 3932 xxxffrx.exe 93 PID 1304 wrote to memory of 4740 1304 jjpdp.exe 94 PID 1304 wrote to memory of 4740 1304 jjpdp.exe 94 PID 1304 wrote to memory of 4740 1304 jjpdp.exe 94 PID 4740 wrote to memory of 4508 4740 frxlrxr.exe 142 PID 4740 wrote to memory of 4508 4740 frxlrxr.exe 142 PID 4740 wrote to memory of 4508 4740 frxlrxr.exe 142 PID 4508 wrote to memory of 2828 4508 ntthnt.exe 143 PID 4508 wrote to memory of 2828 4508 ntthnt.exe 143 PID 4508 wrote to memory of 2828 4508 ntthnt.exe 143 PID 2828 wrote to memory of 3884 2828 vjdjp.exe 144 PID 2828 wrote to memory of 3884 2828 vjdjp.exe 144 PID 2828 wrote to memory of 3884 2828 vjdjp.exe 144 PID 3884 wrote to memory of 4852 3884 rllxrlf.exe 98 PID 3884 wrote to memory of 4852 3884 rllxrlf.exe 98 PID 3884 wrote to memory of 4852 3884 rllxrlf.exe 98 PID 4852 wrote to memory of 3580 4852 hbhhbh.exe 99 PID 4852 wrote to memory of 3580 4852 hbhhbh.exe 99 PID 4852 wrote to memory of 3580 4852 hbhhbh.exe 99 PID 3580 wrote to memory of 4424 3580 jvpjj.exe 100 PID 3580 wrote to memory of 4424 3580 jvpjj.exe 100 PID 3580 wrote to memory of 4424 3580 jvpjj.exe 100 PID 4424 wrote to memory of 2784 4424 ffflxlr.exe 101 PID 4424 wrote to memory of 2784 4424 ffflxlr.exe 101 PID 4424 wrote to memory of 2784 4424 ffflxlr.exe 101 PID 2784 wrote to memory of 4100 2784 fxxxxxf.exe 102 PID 2784 wrote to memory of 4100 2784 fxxxxxf.exe 102 PID 2784 wrote to memory of 4100 2784 fxxxxxf.exe 102 PID 4100 wrote to memory of 780 4100 bthnbb.exe 103 PID 4100 wrote to memory of 780 4100 bthnbb.exe 103 PID 4100 wrote to memory of 780 4100 bthnbb.exe 103 PID 780 wrote to memory of 640 780 pjjdp.exe 104 PID 780 wrote to memory of 640 780 pjjdp.exe 104 PID 780 wrote to memory of 640 780 pjjdp.exe 104 PID 640 wrote to memory of 4476 640 llfrxff.exe 105 PID 640 wrote to memory of 4476 640 llfrxff.exe 105 PID 640 wrote to memory of 4476 640 llfrxff.exe 105 PID 4476 wrote to memory of 404 4476 9nbntb.exe 106 PID 4476 wrote to memory of 404 4476 9nbntb.exe 106 PID 4476 wrote to memory of 404 4476 9nbntb.exe 106 PID 404 wrote to memory of 432 404 ppjvj.exe 107 PID 404 wrote to memory of 432 404 ppjvj.exe 107 PID 404 wrote to memory of 432 404 ppjvj.exe 107 PID 432 wrote to memory of 1356 432 rlrrlll.exe 196
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe"C:\Users\Admin\AppData\Local\Temp\ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
\??\c:\hhhttb.exec:\hhhttb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
\??\c:\jdvjj.exec:\jdvjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\tntnnb.exec:\tntnnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\tnbbtt.exec:\tnbbtt.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\dvjpd.exec:\dvjpd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
\??\c:\xxxffrx.exec:\xxxffrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\jjpdp.exec:\jjpdp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
\??\c:\frxlrxr.exec:\frxlrxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
\??\c:\ntthnt.exec:\ntthnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\vjdjp.exec:\vjdjp.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\rllxrlf.exec:\rllxrlf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
\??\c:\hbhhbh.exec:\hbhhbh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\jvpjj.exec:\jvpjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\ffflxlr.exec:\ffflxlr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\fxxxxxf.exec:\fxxxxxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\bthnbb.exec:\bthnbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
\??\c:\pjjdp.exec:\pjjdp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
\??\c:\llfrxff.exec:\llfrxff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\9nbntb.exec:\9nbntb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
\??\c:\ppjvj.exec:\ppjvj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
\??\c:\rlrrlll.exec:\rlrrlll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
\??\c:\nnhbbb.exec:\nnhbbb.exe23⤵
- Executes dropped EXE
PID:1356 -
\??\c:\xfxrxxl.exec:\xfxrxxl.exe24⤵
- Executes dropped EXE
PID:2680 -
\??\c:\bnnttt.exec:\bnnttt.exe25⤵
- Executes dropped EXE
PID:1188 -
\??\c:\lflxrrx.exec:\lflxrrx.exe26⤵
- Executes dropped EXE
PID:2156 -
\??\c:\hbttnt.exec:\hbttnt.exe27⤵
- Executes dropped EXE
PID:4796 -
\??\c:\ffrlffr.exec:\ffrlffr.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2744 -
\??\c:\tnbbbb.exec:\tnbbbb.exe29⤵
- Executes dropped EXE
PID:888 -
\??\c:\rxrxxff.exec:\rxrxxff.exe30⤵
- Executes dropped EXE
PID:2860 -
\??\c:\tttbnt.exec:\tttbnt.exe31⤵
- Executes dropped EXE
PID:1680 -
\??\c:\vddjp.exec:\vddjp.exe32⤵
- Executes dropped EXE
PID:2416 -
\??\c:\ttbttn.exec:\ttbttn.exe33⤵
- Executes dropped EXE
PID:3268 -
\??\c:\pvjjj.exec:\pvjjj.exe34⤵
- Executes dropped EXE
PID:3392 -
\??\c:\xflfrlx.exec:\xflfrlx.exe35⤵
- Executes dropped EXE
PID:3404 -
\??\c:\hntntn.exec:\hntntn.exe36⤵
- Executes dropped EXE
PID:1288 -
\??\c:\rxxlrff.exec:\rxxlrff.exe37⤵
- Executes dropped EXE
PID:2992 -
\??\c:\bnnntn.exec:\bnnntn.exe38⤵
- Executes dropped EXE
PID:4812 -
\??\c:\jdjjp.exec:\jdjjp.exe39⤵
- Executes dropped EXE
PID:2348 -
\??\c:\vjppd.exec:\vjppd.exe40⤵
- Executes dropped EXE
PID:3548 -
\??\c:\xxfxxxx.exec:\xxfxxxx.exe41⤵
- Executes dropped EXE
PID:1852 -
\??\c:\ttnnnt.exec:\ttnnnt.exe42⤵
- Executes dropped EXE
PID:3572 -
\??\c:\xlllfrx.exec:\xlllfrx.exe43⤵
- Executes dropped EXE
PID:924 -
\??\c:\vdjdp.exec:\vdjdp.exe44⤵
- Executes dropped EXE
PID:4160 -
\??\c:\tbnbhh.exec:\tbnbhh.exe45⤵
- Executes dropped EXE
PID:1116 -
\??\c:\frfllrr.exec:\frfllrr.exe46⤵
- Executes dropped EXE
PID:316 -
\??\c:\nbbhnb.exec:\nbbhnb.exe47⤵
- Executes dropped EXE
PID:5088 -
\??\c:\jpjjj.exec:\jpjjj.exe48⤵
- Executes dropped EXE
PID:5000 -
\??\c:\hthhhb.exec:\hthhhb.exe49⤵
- Executes dropped EXE
PID:3368 -
\??\c:\pvvjd.exec:\pvvjd.exe50⤵
- Executes dropped EXE
PID:4148 -
\??\c:\rxxlfxf.exec:\rxxlfxf.exe51⤵
- Executes dropped EXE
PID:1004 -
\??\c:\1thnnt.exec:\1thnnt.exe52⤵
- Executes dropped EXE
PID:2820 -
\??\c:\pvjpp.exec:\pvjpp.exe53⤵
- Executes dropped EXE
PID:1848 -
\??\c:\flflxxx.exec:\flflxxx.exe54⤵
- Executes dropped EXE
PID:1012 -
\??\c:\nbhtbh.exec:\nbhtbh.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1132 -
\??\c:\jppdv.exec:\jppdv.exe56⤵
- Executes dropped EXE
PID:2188 -
\??\c:\rxffxfl.exec:\rxffxfl.exe57⤵
- Executes dropped EXE
PID:4508 -
\??\c:\bntbnn.exec:\bntbnn.exe58⤵
- Executes dropped EXE
PID:2828 -
\??\c:\djvdp.exec:\djvdp.exe59⤵
- Executes dropped EXE
PID:3884 -
\??\c:\ntnbbb.exec:\ntnbbb.exe60⤵
- Executes dropped EXE
PID:4756 -
\??\c:\vvddp.exec:\vvddp.exe61⤵
- Executes dropped EXE
PID:264 -
\??\c:\xxrrxxl.exec:\xxrrxxl.exe62⤵
- Executes dropped EXE
PID:4424 -
\??\c:\nhnhbn.exec:\nhnhbn.exe63⤵
- Executes dropped EXE
PID:3632 -
\??\c:\lxlfxfl.exec:\lxlfxfl.exe64⤵
- Executes dropped EXE
PID:4236 -
\??\c:\hhttbt.exec:\hhttbt.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:780 -
\??\c:\djjpp.exec:\djjpp.exe66⤵PID:3656
-
\??\c:\xxlrxll.exec:\xxlrxll.exe67⤵PID:4476
-
\??\c:\lrxrrlf.exec:\lrxrrlf.exe68⤵PID:964
-
\??\c:\pjjjj.exec:\pjjjj.exe69⤵PID:3288
-
\??\c:\hbhntn.exec:\hbhntn.exe70⤵PID:3084
-
\??\c:\jjppd.exec:\jjppd.exe71⤵PID:1784
-
\??\c:\nttbbb.exec:\nttbbb.exe72⤵PID:4764
-
\??\c:\djvpv.exec:\djvpv.exe73⤵PID:3964
-
\??\c:\tbnhbb.exec:\tbnhbb.exe74⤵PID:1464
-
\??\c:\jjvvj.exec:\jjvvj.exe75⤵PID:2708
-
\??\c:\nhthhn.exec:\nhthhn.exe76⤵PID:2040
-
\??\c:\xllrrfl.exec:\xllrrfl.exe77⤵PID:2068
-
\??\c:\nnbhbb.exec:\nnbhbb.exe78⤵
- System Location Discovery: System Language Discovery
PID:4680 -
\??\c:\fffrxfl.exec:\fffrxfl.exe79⤵PID:4388
-
\??\c:\ffllffx.exec:\ffllffx.exe80⤵PID:4836
-
\??\c:\ppdvp.exec:\ppdvp.exe81⤵
- System Location Discovery: System Language Discovery
PID:1220 -
\??\c:\nntnnt.exec:\nntnnt.exe82⤵PID:3324
-
\??\c:\rxrflfl.exec:\rxrflfl.exe83⤵PID:2128
-
\??\c:\ttbtth.exec:\ttbtth.exe84⤵PID:3748
-
\??\c:\rfrrrxx.exec:\rfrrrxx.exe85⤵PID:1856
-
\??\c:\vjdpd.exec:\vjdpd.exe86⤵PID:1484
-
\??\c:\htnthb.exec:\htnthb.exe87⤵PID:2268
-
\??\c:\rrrllrl.exec:\rrrllrl.exe88⤵PID:3524
-
\??\c:\dpddv.exec:\dpddv.exe89⤵PID:4300
-
\??\c:\nthhhb.exec:\nthhhb.exe90⤵PID:4216
-
\??\c:\flrxllx.exec:\flrxllx.exe91⤵PID:3980
-
\??\c:\vdvjv.exec:\vdvjv.exe92⤵PID:440
-
\??\c:\xrflffr.exec:\xrflffr.exe93⤵PID:2500
-
\??\c:\tbnbht.exec:\tbnbht.exe94⤵PID:2264
-
\??\c:\pdjjd.exec:\pdjjd.exe95⤵PID:4380
-
\??\c:\lrfxfll.exec:\lrfxfll.exe96⤵PID:2576
-
\??\c:\pvjvp.exec:\pvjvp.exe97⤵PID:3820
-
\??\c:\btnthh.exec:\btnthh.exe98⤵PID:4016
-
\??\c:\xlrfxlr.exec:\xlrfxlr.exe99⤵PID:4992
-
\??\c:\tttnhn.exec:\tttnhn.exe100⤵PID:3584
-
\??\c:\nnbthh.exec:\nnbthh.exe101⤵PID:4052
-
\??\c:\vdppd.exec:\vdppd.exe102⤵PID:4244
-
\??\c:\tntttb.exec:\tntttb.exe103⤵PID:3932
-
\??\c:\pdddv.exec:\pdddv.exe104⤵PID:4508
-
\??\c:\llrxrfr.exec:\llrxrfr.exe105⤵PID:1640
-
\??\c:\bbbnnb.exec:\bbbnnb.exe106⤵PID:5064
-
\??\c:\vdvvd.exec:\vdvvd.exe107⤵PID:4852
-
\??\c:\jdjvv.exec:\jdjvv.exe108⤵PID:2340
-
\??\c:\rfrrxll.exec:\rfrrxll.exe109⤵
- System Location Discovery: System Language Discovery
PID:5036 -
\??\c:\djpjv.exec:\djpjv.exe110⤵PID:4516
-
\??\c:\9ntnnn.exec:\9ntnnn.exe111⤵PID:1356
-
\??\c:\xlrrflx.exec:\xlrrflx.exe112⤵PID:4472
-
\??\c:\hnhhnn.exec:\hnhhnn.exe113⤵PID:3296
-
\??\c:\jjdpj.exec:\jjdpj.exe114⤵
- System Location Discovery: System Language Discovery
PID:2708 -
\??\c:\tbtbtt.exec:\tbtbtt.exe115⤵PID:2436
-
\??\c:\dpdpj.exec:\dpdpj.exe116⤵PID:1308
-
\??\c:\lflxrrr.exec:\lflxrrr.exe117⤵PID:2676
-
\??\c:\fxrfflx.exec:\fxrfflx.exe118⤵
- System Location Discovery: System Language Discovery
PID:2764 -
\??\c:\bnthhb.exec:\bnthhb.exe119⤵PID:3676
-
\??\c:\lrllrlx.exec:\lrllrlx.exe120⤵PID:1076
-
\??\c:\bhhhhh.exec:\bhhhhh.exe121⤵PID:2840
-
\??\c:\rlrfrfl.exec:\rlrfrfl.exe122⤵PID:2992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-