Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 03:23
Behavioral task
behavioral1
Sample
ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe
-
Size
3.7MB
-
MD5
ae0fc95b71170c92dc1df2f92664a50f
-
SHA1
3cfe597bf7564404a7a67c987cd1d70416d6a4c4
-
SHA256
ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4
-
SHA512
02cad3cd87ce608c941149542bff752e99030c33f032278e91c43ee013d0fd1ea36f3a96e1a4d6860378d9cc6e2f7eadc41b1a09a5ad87751ec4d8b4d29ab40f
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF981:U6XLq/qPPslzKx/dJg1ErmNo
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/1880-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2532-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4896-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4640-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3820-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4928-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4928-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2644-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/408-50-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2588-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1264-62-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3768-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2396-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4068-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4920-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1700-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1048-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3488-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3992-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4884-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1516-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4972-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4308-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1216-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4424-165-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1840-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2200-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3576-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1552-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4516-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1016-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2396-215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2144-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2164-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1260-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1048-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3080-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1816-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2992-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1264-330-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2396-346-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3968-356-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2004-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4432-367-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3080-395-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1816-399-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1604-406-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-431-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1236-447-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4304-457-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1708-467-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3200-552-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3684-571-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2144-590-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1416-600-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2988-643-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3604-797-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1644-897-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1120-934-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2828-947-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1960-988-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2640-1019-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1988-1113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1856 xffrxff.exe 4896 rxlffrr.exe 2532 lllxxxx.exe 4640 vjpvp.exe 3820 nnhnnn.exe 4928 fffxxlx.exe 2644 tthttt.exe 408 htnbbt.exe 2588 tbthnn.exe 1264 pvjvp.exe 3768 nnbhtn.exe 2396 xrxxxxf.exe 4068 rfrfxfx.exe 4788 jpvvv.exe 4768 thbhbb.exe 4920 fxxrllx.exe 1700 frxrlll.exe 1048 hhnhnh.exe 3488 vdvvv.exe 3992 lrlllrx.exe 452 fxlllll.exe 4884 llfflxx.exe 1516 thttbb.exe 4972 dvddp.exe 4308 9xfflfx.exe 1216 xxrxflr.exe 4424 rxlllrx.exe 1840 vjppp.exe 2200 lflxffr.exe 3576 tnthbh.exe 1800 rllxrrf.exe 2644 djpvp.exe 408 ppvvj.exe 1552 nbnhbb.exe 4516 dvvdd.exe 1016 nnnhnt.exe 4572 vppjp.exe 2396 dvdpj.exe 2144 xflfrlr.exe 2164 3btntn.exe 4788 rrflfff.exe 4768 bhnnnh.exe 1260 ntnhnh.exe 4456 jpdvj.exe 3524 xrflxlx.exe 2212 bnnbbb.exe 1048 tnthbt.exe 4772 jjpjj.exe 1844 xrxrrxr.exe 3492 lrllffl.exe 2776 hbbhhb.exe 3080 tthnhb.exe 1816 dddpv.exe 4512 ppdjv.exe 1040 xxfrxrl.exe 4664 httbhh.exe 3220 ntbhhn.exe 4172 dvppj.exe 1420 vdvpp.exe 4668 rfrrrff.exe 5116 1hbntt.exe 852 jdjdd.exe 732 dpjvj.exe 2992 lfffflf.exe -
resource yara_rule behavioral2/memory/1880-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c5f-3.dat upx behavioral2/memory/1880-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1856-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c63-11.dat upx behavioral2/files/0x0007000000023c64-13.dat upx behavioral2/memory/2532-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4896-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c65-23.dat upx behavioral2/memory/4640-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c66-28.dat upx behavioral2/memory/3820-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c67-35.dat upx behavioral2/memory/4928-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4928-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c68-42.dat upx behavioral2/memory/2644-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/408-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022dcd-47.dat upx behavioral2/files/0x0011000000023b2a-53.dat upx behavioral2/memory/2588-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b2b-59.dat upx behavioral2/memory/1264-62-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022dc9-66.dat upx behavioral2/memory/3768-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c69-71.dat upx behavioral2/memory/2396-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000d000000023b21-80.dat upx behavioral2/memory/2396-79-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b22-84.dat upx behavioral2/memory/4068-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b1f-89.dat upx behavioral2/files/0x0007000000023c6c-96.dat upx behavioral2/files/0x0007000000023c71-99.dat upx behavioral2/memory/4920-102-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023c6d-105.dat upx behavioral2/memory/1700-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c6f-114.dat upx behavioral2/memory/1048-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c73-117.dat upx behavioral2/memory/3488-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c74-123.dat upx behavioral2/memory/3992-125-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c75-129.dat upx behavioral2/memory/4884-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c76-134.dat upx behavioral2/files/0x0007000000023c77-142.dat upx behavioral2/memory/1516-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c78-147.dat upx behavioral2/memory/4972-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c79-152.dat upx behavioral2/memory/4308-154-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7b-158.dat upx behavioral2/memory/1216-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7e-166.dat upx behavioral2/memory/4424-165-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7f-173.dat upx behavioral2/memory/1840-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c80-175.dat upx behavioral2/memory/2200-178-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c81-182.dat upx behavioral2/memory/3576-185-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c82-188.dat upx behavioral2/memory/1552-200-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlllrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrlxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nbbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrllff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflrxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjdd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1856 1880 ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe 84 PID 1880 wrote to memory of 1856 1880 ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe 84 PID 1880 wrote to memory of 1856 1880 ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe 84 PID 1856 wrote to memory of 4896 1856 xffrxff.exe 87 PID 1856 wrote to memory of 4896 1856 xffrxff.exe 87 PID 1856 wrote to memory of 4896 1856 xffrxff.exe 87 PID 4896 wrote to memory of 2532 4896 rxlffrr.exe 89 PID 4896 wrote to memory of 2532 4896 rxlffrr.exe 89 PID 4896 wrote to memory of 2532 4896 rxlffrr.exe 89 PID 2532 wrote to memory of 4640 2532 lllxxxx.exe 90 PID 2532 wrote to memory of 4640 2532 lllxxxx.exe 90 PID 2532 wrote to memory of 4640 2532 lllxxxx.exe 90 PID 4640 wrote to memory of 3820 4640 vjpvp.exe 91 PID 4640 wrote to memory of 3820 4640 vjpvp.exe 91 PID 4640 wrote to memory of 3820 4640 vjpvp.exe 91 PID 3820 wrote to memory of 4928 3820 nnhnnn.exe 92 PID 3820 wrote to memory of 4928 3820 nnhnnn.exe 92 PID 3820 wrote to memory of 4928 3820 nnhnnn.exe 92 PID 4928 wrote to memory of 2644 4928 fffxxlx.exe 93 PID 4928 wrote to memory of 2644 4928 fffxxlx.exe 93 PID 4928 wrote to memory of 2644 4928 fffxxlx.exe 93 PID 2644 wrote to memory of 408 2644 tthttt.exe 94 PID 2644 wrote to memory of 408 2644 tthttt.exe 94 PID 2644 wrote to memory of 408 2644 tthttt.exe 94 PID 408 wrote to memory of 2588 408 htnbbt.exe 95 PID 408 wrote to memory of 2588 408 htnbbt.exe 95 PID 408 wrote to memory of 2588 408 htnbbt.exe 95 PID 2588 wrote to memory of 1264 2588 tbthnn.exe 96 PID 2588 wrote to memory of 1264 2588 tbthnn.exe 96 PID 2588 wrote to memory of 1264 2588 tbthnn.exe 96 PID 1264 wrote to memory of 3768 1264 pvjvp.exe 97 PID 1264 wrote to memory of 3768 1264 pvjvp.exe 97 PID 1264 wrote to memory of 3768 1264 pvjvp.exe 97 PID 3768 wrote to memory of 2396 3768 nnbhtn.exe 98 PID 3768 wrote to memory of 2396 3768 nnbhtn.exe 98 PID 3768 wrote to memory of 2396 3768 nnbhtn.exe 98 PID 2396 wrote to memory of 4068 2396 xrxxxxf.exe 101 PID 2396 wrote to memory of 4068 2396 xrxxxxf.exe 101 PID 2396 wrote to memory of 4068 2396 xrxxxxf.exe 101 PID 4068 wrote to memory of 4788 4068 rfrfxfx.exe 103 PID 4068 wrote to memory of 4788 4068 rfrfxfx.exe 103 PID 4068 wrote to memory of 4788 4068 rfrfxfx.exe 103 PID 4788 wrote to memory of 4768 4788 jpvvv.exe 105 PID 4788 wrote to memory of 4768 4788 jpvvv.exe 105 PID 4788 wrote to memory of 4768 4788 jpvvv.exe 105 PID 4768 wrote to memory of 4920 4768 thbhbb.exe 106 PID 4768 wrote to memory of 4920 4768 thbhbb.exe 106 PID 4768 wrote to memory of 4920 4768 thbhbb.exe 106 PID 4920 wrote to memory of 1700 4920 fxxrllx.exe 107 PID 4920 wrote to memory of 1700 4920 fxxrllx.exe 107 PID 4920 wrote to memory of 1700 4920 fxxrllx.exe 107 PID 1700 wrote to memory of 1048 1700 frxrlll.exe 108 PID 1700 wrote to memory of 1048 1700 frxrlll.exe 108 PID 1700 wrote to memory of 1048 1700 frxrlll.exe 108 PID 1048 wrote to memory of 3488 1048 hhnhnh.exe 109 PID 1048 wrote to memory of 3488 1048 hhnhnh.exe 109 PID 1048 wrote to memory of 3488 1048 hhnhnh.exe 109 PID 3488 wrote to memory of 3992 3488 vdvvv.exe 111 PID 3488 wrote to memory of 3992 3488 vdvvv.exe 111 PID 3488 wrote to memory of 3992 3488 vdvvv.exe 111 PID 3992 wrote to memory of 452 3992 lrlllrx.exe 112 PID 3992 wrote to memory of 452 3992 lrlllrx.exe 112 PID 3992 wrote to memory of 452 3992 lrlllrx.exe 112 PID 452 wrote to memory of 4884 452 fxlllll.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe"C:\Users\Admin\AppData\Local\Temp\ae2c769cd1db718e8d4cd488d517941b1a8e3a3926d504bcd1841cf946f94dc4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\xffrxff.exec:\xffrxff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\rxlffrr.exec:\rxlffrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\lllxxxx.exec:\lllxxxx.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\vjpvp.exec:\vjpvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\nnhnnn.exec:\nnhnnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
\??\c:\fffxxlx.exec:\fffxxlx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\tthttt.exec:\tthttt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\htnbbt.exec:\htnbbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
\??\c:\tbthnn.exec:\tbthnn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\pvjvp.exec:\pvjvp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\nnbhtn.exec:\nnbhtn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\xrxxxxf.exec:\xrxxxxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\rfrfxfx.exec:\rfrfxfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\jpvvv.exec:\jpvvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\thbhbb.exec:\thbhbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\fxxrllx.exec:\fxxrllx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\frxrlll.exec:\frxrlll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\hhnhnh.exec:\hhnhnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\vdvvv.exec:\vdvvv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\lrlllrx.exec:\lrlllrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
\??\c:\fxlllll.exec:\fxlllll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
\??\c:\llfflxx.exec:\llfflxx.exe23⤵
- Executes dropped EXE
PID:4884 -
\??\c:\thttbb.exec:\thttbb.exe24⤵
- Executes dropped EXE
PID:1516 -
\??\c:\dvddp.exec:\dvddp.exe25⤵
- Executes dropped EXE
PID:4972 -
\??\c:\9xfflfx.exec:\9xfflfx.exe26⤵
- Executes dropped EXE
PID:4308 -
\??\c:\xxrxflr.exec:\xxrxflr.exe27⤵
- Executes dropped EXE
PID:1216 -
\??\c:\rxlllrx.exec:\rxlllrx.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4424 -
\??\c:\vjppp.exec:\vjppp.exe29⤵
- Executes dropped EXE
PID:1840 -
\??\c:\lflxffr.exec:\lflxffr.exe30⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tnthbh.exec:\tnthbh.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3576 -
\??\c:\rllxrrf.exec:\rllxrrf.exe32⤵
- Executes dropped EXE
PID:1800 -
\??\c:\djpvp.exec:\djpvp.exe33⤵
- Executes dropped EXE
PID:2644 -
\??\c:\ppvvj.exec:\ppvvj.exe34⤵
- Executes dropped EXE
PID:408 -
\??\c:\nbnhbb.exec:\nbnhbb.exe35⤵
- Executes dropped EXE
PID:1552 -
\??\c:\dvvdd.exec:\dvvdd.exe36⤵
- Executes dropped EXE
PID:4516 -
\??\c:\nnnhnt.exec:\nnnhnt.exe37⤵
- Executes dropped EXE
PID:1016 -
\??\c:\vppjp.exec:\vppjp.exe38⤵
- Executes dropped EXE
PID:4572 -
\??\c:\dvdpj.exec:\dvdpj.exe39⤵
- Executes dropped EXE
PID:2396 -
\??\c:\xflfrlr.exec:\xflfrlr.exe40⤵
- Executes dropped EXE
PID:2144 -
\??\c:\3btntn.exec:\3btntn.exe41⤵
- Executes dropped EXE
PID:2164 -
\??\c:\rrflfff.exec:\rrflfff.exe42⤵
- Executes dropped EXE
PID:4788 -
\??\c:\bhnnnh.exec:\bhnnnh.exe43⤵
- Executes dropped EXE
PID:4768 -
\??\c:\ntnhnh.exec:\ntnhnh.exe44⤵
- Executes dropped EXE
PID:1260 -
\??\c:\jpdvj.exec:\jpdvj.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
\??\c:\xrflxlx.exec:\xrflxlx.exe46⤵
- Executes dropped EXE
PID:3524 -
\??\c:\bnnbbb.exec:\bnnbbb.exe47⤵
- Executes dropped EXE
PID:2212 -
\??\c:\tnthbt.exec:\tnthbt.exe48⤵
- Executes dropped EXE
PID:1048 -
\??\c:\jjpjj.exec:\jjpjj.exe49⤵
- Executes dropped EXE
PID:4772 -
\??\c:\xrxrrxr.exec:\xrxrrxr.exe50⤵
- Executes dropped EXE
PID:1844 -
\??\c:\lrllffl.exec:\lrllffl.exe51⤵
- Executes dropped EXE
PID:3492 -
\??\c:\hbbhhb.exec:\hbbhhb.exe52⤵
- Executes dropped EXE
PID:2776 -
\??\c:\tthnhb.exec:\tthnhb.exe53⤵
- Executes dropped EXE
PID:3080 -
\??\c:\dddpv.exec:\dddpv.exe54⤵
- Executes dropped EXE
PID:1816 -
\??\c:\ppdjv.exec:\ppdjv.exe55⤵
- Executes dropped EXE
PID:4512 -
\??\c:\xxfrxrl.exec:\xxfrxrl.exe56⤵
- Executes dropped EXE
PID:1040 -
\??\c:\httbhh.exec:\httbhh.exe57⤵
- Executes dropped EXE
PID:4664 -
\??\c:\ntbhhn.exec:\ntbhhn.exe58⤵
- Executes dropped EXE
PID:3220 -
\??\c:\dvppj.exec:\dvppj.exe59⤵
- Executes dropped EXE
PID:4172 -
\??\c:\vdvpp.exec:\vdvpp.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1420 -
\??\c:\rfrrrff.exec:\rfrrrff.exe61⤵
- Executes dropped EXE
PID:4668 -
\??\c:\1hbntt.exec:\1hbntt.exe62⤵
- Executes dropped EXE
PID:5116 -
\??\c:\jdjdd.exec:\jdjdd.exe63⤵
- Executes dropped EXE
PID:852 -
\??\c:\dpjvj.exec:\dpjvj.exe64⤵
- Executes dropped EXE
PID:732 -
\??\c:\lfffflf.exec:\lfffflf.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
\??\c:\frlrxxx.exec:\frlrxxx.exe66⤵PID:4652
-
\??\c:\nnthtt.exec:\nnthtt.exe67⤵PID:2160
-
\??\c:\hbhtnn.exec:\hbhtnn.exe68⤵PID:1464
-
\??\c:\jdddj.exec:\jdddj.exe69⤵PID:4064
-
\??\c:\rflfxxr.exec:\rflfxxr.exe70⤵PID:4852
-
\??\c:\5fxrxlf.exec:\5fxrxlf.exe71⤵PID:3372
-
\??\c:\nttbtb.exec:\nttbtb.exe72⤵PID:3604
-
\??\c:\thnthn.exec:\thnthn.exe73⤵PID:2756
-
\??\c:\ppddd.exec:\ppddd.exe74⤵PID:4072
-
\??\c:\rrxxfrx.exec:\rrxxfrx.exe75⤵PID:1264
-
\??\c:\bhnnbh.exec:\bhnnbh.exe76⤵PID:2520
-
\??\c:\ppvvd.exec:\ppvvd.exe77⤵PID:764
-
\??\c:\flrlllf.exec:\flrlllf.exe78⤵PID:1708
-
\??\c:\fxfllxf.exec:\fxfllxf.exe79⤵PID:4364
-
\??\c:\nhtttt.exec:\nhtttt.exe80⤵PID:2396
-
\??\c:\jppdj.exec:\jppdj.exe81⤵PID:1988
-
\??\c:\vdjjj.exec:\vdjjj.exe82⤵PID:1416
-
\??\c:\1xlrfxf.exec:\1xlrfxf.exe83⤵PID:3968
-
\??\c:\hhbbhn.exec:\hhbbhn.exe84⤵PID:2004
-
\??\c:\jvdvv.exec:\jvdvv.exe85⤵PID:1376
-
\??\c:\fflxlrf.exec:\fflxlrf.exe86⤵PID:4432
-
\??\c:\tbhhhb.exec:\tbhhhb.exe87⤵PID:1700
-
\??\c:\pjjjj.exec:\pjjjj.exe88⤵PID:2212
-
\??\c:\rrrffxx.exec:\rrrffxx.exe89⤵PID:3488
-
\??\c:\btttth.exec:\btttth.exe90⤵PID:1044
-
\??\c:\jvjjv.exec:\jvjjv.exe91⤵PID:728
-
\??\c:\pvpvd.exec:\pvpvd.exe92⤵PID:4808
-
\??\c:\dpjjd.exec:\dpjjd.exe93⤵PID:1332
-
\??\c:\rxfxxxr.exec:\rxfxxxr.exe94⤵PID:4884
-
\??\c:\hbhbbh.exec:\hbhbbh.exe95⤵PID:3080
-
\??\c:\jvdvd.exec:\jvdvd.exe96⤵PID:1816
-
\??\c:\7pddv.exec:\7pddv.exe97⤵PID:4512
-
\??\c:\rflrrrx.exec:\rflrrrx.exe98⤵PID:1604
-
\??\c:\ffrllrx.exec:\ffrllrx.exe99⤵PID:1744
-
\??\c:\nbhhbb.exec:\nbhhbb.exe100⤵PID:2528
-
\??\c:\dvjjj.exec:\dvjjj.exe101⤵PID:3588
-
\??\c:\jvpdv.exec:\jvpdv.exe102⤵PID:3416
-
\??\c:\rlfxrrf.exec:\rlfxrrf.exe103⤵PID:3820
-
\??\c:\bhthht.exec:\bhthht.exe104⤵PID:3252
-
\??\c:\pvdvj.exec:\pvdvj.exe105⤵PID:3428
-
\??\c:\vjppp.exec:\vjppp.exe106⤵PID:5016
-
\??\c:\rlxrrxx.exec:\rlxrrxx.exe107⤵PID:3168
-
\??\c:\fxrllrl.exec:\fxrllrl.exe108⤵PID:5104
-
\??\c:\hntnnn.exec:\hntnnn.exe109⤵PID:3280
-
\??\c:\dvjjd.exec:\dvjjd.exe110⤵PID:4800
-
\??\c:\xlfxfff.exec:\xlfxfff.exe111⤵PID:1236
-
\??\c:\xlfrflx.exec:\xlfrflx.exe112⤵PID:4740
-
\??\c:\httbbb.exec:\httbbb.exe113⤵PID:2364
-
\??\c:\vvjjj.exec:\vvjjj.exe114⤵PID:4304
-
\??\c:\rrxfrrl.exec:\rrxfrrl.exe115⤵PID:5084
-
\??\c:\3tttnh.exec:\3tttnh.exe116⤵PID:3360
-
\??\c:\dvjdd.exec:\dvjdd.exe117⤵PID:1708
-
\??\c:\rrxrxfl.exec:\rrxrxfl.exe118⤵PID:1752
-
\??\c:\1lrrxxf.exec:\1lrrxxf.exe119⤵PID:4860
-
\??\c:\flrllll.exec:\flrllll.exe120⤵PID:1988
-
\??\c:\tnthbt.exec:\tnthbt.exe121⤵PID:3568
-
\??\c:\hbbbht.exec:\hbbbht.exe122⤵PID:1820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-