Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 02:10
Behavioral task
behavioral1
Sample
1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe
Resource
win7-20240903-en
9 signatures
120 seconds
General
-
Target
1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe
-
Size
3.7MB
-
MD5
fc9e3eeadfb100e3fba51b069e10c7b0
-
SHA1
3c80a6610dc34ab42e93b2760d364ccec5425c05
-
SHA256
1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7
-
SHA512
3f493afaeb614bf3c9ae092045155539a82b013cf4e2d1039151e3e3c5535b5ad01bd8d9bc81521cc75cc40c1cb1e84d516732f0048003c778a03c875523daed
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF989:U6XLq/qPPslzKx/dJg1ErmNo
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4176-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1188-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4996-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1396-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2096-22-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2500-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4092-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2764-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/216-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5072-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2808-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1212-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/996-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2152-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1972-111-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1504-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4392-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2940-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4404-139-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/428-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1548-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4184-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3944-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/264-179-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3948-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1152-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2084-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1432-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2996-212-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2684-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3568-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1936-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3568-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/724-247-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2436-269-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4488-272-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4516-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1476-289-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1332-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1176-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1812-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2196-329-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/208-339-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/708-370-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2712-392-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2240-399-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4692-403-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1036-419-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/920-423-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3872-433-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4368-446-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-453-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3912-460-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/540-494-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4876-507-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3768-526-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4832-560-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-618-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1260-794-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3928-1095-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/708-1331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4956-1401-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4076-1435-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1188 flrfxlf.exe 4996 frxrxrr.exe 1396 xlxrffl.exe 2096 bnhnth.exe 2500 5nthbt.exe 4092 rxflrxf.exe 2764 xlrlrfl.exe 2952 vdddv.exe 216 hhbtbn.exe 5072 hntnth.exe 736 djdvj.exe 1560 llxrlxl.exe 2808 tbtttt.exe 1212 frfxrff.exe 996 vjvvv.exe 2152 tnhthn.exe 2012 lxfxllr.exe 1504 xxxlflf.exe 1972 1jjdj.exe 4392 ffrlrrx.exe 2940 jjpjd.exe 1028 nnhttb.exe 4404 rlfrfxl.exe 428 djvjd.exe 1548 hnhhtn.exe 4832 xrrxxxr.exe 4184 rxffflr.exe 1728 llfxrfr.exe 3944 nnhbtn.exe 264 dvjjj.exe 4804 nhtbbh.exe 3948 tthttb.exe 2092 flflllr.exe 1152 nbhbht.exe 2876 dpvvj.exe 2084 rxrrlrr.exe 1432 bhbbtb.exe 2996 hnbntn.exe 2684 pdpjv.exe 1936 pjvpd.exe 3568 dvjpd.exe 3740 ttttbh.exe 1336 dvdvd.exe 4700 3rxrrrr.exe 4380 xlflrrf.exe 1972 tnhbnt.exe 1468 djpjp.exe 724 bnthnh.exe 764 3dvvd.exe 3228 jvppd.exe 4692 xflllll.exe 2544 bhbtnt.exe 4948 nnbhhn.exe 3720 vvppp.exe 2436 ddppp.exe 4488 llrrlfr.exe 2596 xfrlxlr.exe 3532 bhhtnn.exe 3696 jdjvp.exe 4516 vvpvp.exe 1476 vvpjp.exe 4160 xxxxxfx.exe 1824 fxrllfx.exe 3584 3nnnbh.exe -
resource yara_rule behavioral2/memory/4176-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b57-5.dat upx behavioral2/memory/4176-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1188-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5b-11.dat upx behavioral2/files/0x000a000000023b5c-12.dat upx behavioral2/memory/4996-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5d-21.dat upx behavioral2/memory/1396-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2096-22-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5e-29.dat upx behavioral2/memory/2500-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5f-34.dat upx behavioral2/memory/4092-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022dc9-41.dat upx behavioral2/memory/2764-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2952-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0002000000022dcd-45.dat upx behavioral2/files/0x000f000000023a2b-53.dat upx behavioral2/files/0x0012000000023a0c-56.dat upx behavioral2/memory/216-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000d000000023a25-65.dat upx behavioral2/memory/5072-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1560-71-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000f000000023a2c-69.dat upx behavioral2/files/0x000a000000023b60-76.dat upx behavioral2/memory/1212-81-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b61-80.dat upx behavioral2/memory/2808-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b63-87.dat upx behavioral2/memory/1212-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b66-93.dat upx behavioral2/memory/996-96-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2152-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b64-101.dat upx behavioral2/files/0x000b000000023b68-105.dat upx behavioral2/memory/1972-111-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1504-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b69-110.dat upx behavioral2/files/0x000a000000023b6a-117.dat upx behavioral2/files/0x000a000000023b6b-122.dat upx behavioral2/memory/4392-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2940-128-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6c-127.dat upx behavioral2/files/0x000a000000023b6e-134.dat upx behavioral2/files/0x000a000000023b6f-140.dat upx behavioral2/memory/4404-139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b70-146.dat upx behavioral2/memory/428-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b71-149.dat upx behavioral2/memory/1548-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4184-158-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b72-156.dat upx behavioral2/memory/4184-164-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b73-162.dat upx behavioral2/files/0x000a000000023b74-169.dat upx behavioral2/files/0x000a000000023b75-174.dat upx behavioral2/memory/3944-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b76-180.dat upx behavioral2/memory/264-179-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7a-185.dat upx behavioral2/memory/3948-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1152-197-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2084-204-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxllrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9llrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlllfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfllxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rffrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrxxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxllxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhthhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lflrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbttht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rrlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ttttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrrflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvppj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1188 4176 1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe 84 PID 4176 wrote to memory of 1188 4176 1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe 84 PID 4176 wrote to memory of 1188 4176 1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe 84 PID 1188 wrote to memory of 4996 1188 flrfxlf.exe 86 PID 1188 wrote to memory of 4996 1188 flrfxlf.exe 86 PID 1188 wrote to memory of 4996 1188 flrfxlf.exe 86 PID 4996 wrote to memory of 1396 4996 frxrxrr.exe 88 PID 4996 wrote to memory of 1396 4996 frxrxrr.exe 88 PID 4996 wrote to memory of 1396 4996 frxrxrr.exe 88 PID 1396 wrote to memory of 2096 1396 xlxrffl.exe 90 PID 1396 wrote to memory of 2096 1396 xlxrffl.exe 90 PID 1396 wrote to memory of 2096 1396 xlxrffl.exe 90 PID 2096 wrote to memory of 2500 2096 bnhnth.exe 91 PID 2096 wrote to memory of 2500 2096 bnhnth.exe 91 PID 2096 wrote to memory of 2500 2096 bnhnth.exe 91 PID 2500 wrote to memory of 4092 2500 5nthbt.exe 92 PID 2500 wrote to memory of 4092 2500 5nthbt.exe 92 PID 2500 wrote to memory of 4092 2500 5nthbt.exe 92 PID 4092 wrote to memory of 2764 4092 rxflrxf.exe 93 PID 4092 wrote to memory of 2764 4092 rxflrxf.exe 93 PID 4092 wrote to memory of 2764 4092 rxflrxf.exe 93 PID 2764 wrote to memory of 2952 2764 xlrlrfl.exe 94 PID 2764 wrote to memory of 2952 2764 xlrlrfl.exe 94 PID 2764 wrote to memory of 2952 2764 xlrlrfl.exe 94 PID 2952 wrote to memory of 216 2952 vdddv.exe 95 PID 2952 wrote to memory of 216 2952 vdddv.exe 95 PID 2952 wrote to memory of 216 2952 vdddv.exe 95 PID 216 wrote to memory of 5072 216 hhbtbn.exe 96 PID 216 wrote to memory of 5072 216 hhbtbn.exe 96 PID 216 wrote to memory of 5072 216 hhbtbn.exe 96 PID 5072 wrote to memory of 736 5072 hntnth.exe 97 PID 5072 wrote to memory of 736 5072 hntnth.exe 97 PID 5072 wrote to memory of 736 5072 hntnth.exe 97 PID 736 wrote to memory of 1560 736 djdvj.exe 98 PID 736 wrote to memory of 1560 736 djdvj.exe 98 PID 736 wrote to memory of 1560 736 djdvj.exe 98 PID 1560 wrote to memory of 2808 1560 llxrlxl.exe 101 PID 1560 wrote to memory of 2808 1560 llxrlxl.exe 101 PID 1560 wrote to memory of 2808 1560 llxrlxl.exe 101 PID 2808 wrote to memory of 1212 2808 tbtttt.exe 170 PID 2808 wrote to memory of 1212 2808 tbtttt.exe 170 PID 2808 wrote to memory of 1212 2808 tbtttt.exe 170 PID 1212 wrote to memory of 996 1212 frfxrff.exe 103 PID 1212 wrote to memory of 996 1212 frfxrff.exe 103 PID 1212 wrote to memory of 996 1212 frfxrff.exe 103 PID 996 wrote to memory of 2152 996 vjvvv.exe 105 PID 996 wrote to memory of 2152 996 vjvvv.exe 105 PID 996 wrote to memory of 2152 996 vjvvv.exe 105 PID 2152 wrote to memory of 2012 2152 tnhthn.exe 107 PID 2152 wrote to memory of 2012 2152 tnhthn.exe 107 PID 2152 wrote to memory of 2012 2152 tnhthn.exe 107 PID 2012 wrote to memory of 1504 2012 lxfxllr.exe 220 PID 2012 wrote to memory of 1504 2012 lxfxllr.exe 220 PID 2012 wrote to memory of 1504 2012 lxfxllr.exe 220 PID 1504 wrote to memory of 1972 1504 xxxlflf.exe 139 PID 1504 wrote to memory of 1972 1504 xxxlflf.exe 139 PID 1504 wrote to memory of 1972 1504 xxxlflf.exe 139 PID 1972 wrote to memory of 4392 1972 1jjdj.exe 110 PID 1972 wrote to memory of 4392 1972 1jjdj.exe 110 PID 1972 wrote to memory of 4392 1972 1jjdj.exe 110 PID 4392 wrote to memory of 2940 4392 ffrlrrx.exe 227 PID 4392 wrote to memory of 2940 4392 ffrlrrx.exe 227 PID 4392 wrote to memory of 2940 4392 ffrlrrx.exe 227 PID 2940 wrote to memory of 1028 2940 jjpjd.exe 231
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe"C:\Users\Admin\AppData\Local\Temp\1f4dc055345bb7479461cb14d5763136c654ee5978b4eae1c818f01c1c819db7N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\flrfxlf.exec:\flrfxlf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\frxrxrr.exec:\frxrxrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\xlxrffl.exec:\xlxrffl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
\??\c:\bnhnth.exec:\bnhnth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\5nthbt.exec:\5nthbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\rxflrxf.exec:\rxflrxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
\??\c:\xlrlrfl.exec:\xlrlrfl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\vdddv.exec:\vdddv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\hhbtbn.exec:\hhbtbn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\hntnth.exec:\hntnth.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\djdvj.exec:\djdvj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\llxrlxl.exec:\llxrlxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\tbtttt.exec:\tbtttt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\frfxrff.exec:\frfxrff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\vjvvv.exec:\vjvvv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\tnhthn.exec:\tnhthn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\lxfxllr.exec:\lxfxllr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\xxxlflf.exec:\xxxlflf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\1jjdj.exec:\1jjdj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\ffrlrrx.exec:\ffrlrrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\jjpjd.exec:\jjpjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\nnhttb.exec:\nnhttb.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028 -
\??\c:\rlfrfxl.exec:\rlfrfxl.exe24⤵
- Executes dropped EXE
PID:4404 -
\??\c:\djvjd.exec:\djvjd.exe25⤵
- Executes dropped EXE
PID:428 -
\??\c:\hnhhtn.exec:\hnhhtn.exe26⤵
- Executes dropped EXE
PID:1548 -
\??\c:\xrrxxxr.exec:\xrrxxxr.exe27⤵
- Executes dropped EXE
PID:4832 -
\??\c:\rxffflr.exec:\rxffflr.exe28⤵
- Executes dropped EXE
PID:4184 -
\??\c:\llfxrfr.exec:\llfxrfr.exe29⤵
- Executes dropped EXE
PID:1728 -
\??\c:\nnhbtn.exec:\nnhbtn.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3944 -
\??\c:\dvjjj.exec:\dvjjj.exe31⤵
- Executes dropped EXE
PID:264 -
\??\c:\nhtbbh.exec:\nhtbbh.exe32⤵
- Executes dropped EXE
PID:4804 -
\??\c:\tthttb.exec:\tthttb.exe33⤵
- Executes dropped EXE
PID:3948 -
\??\c:\flflllr.exec:\flflllr.exe34⤵
- Executes dropped EXE
PID:2092 -
\??\c:\nbhbht.exec:\nbhbht.exe35⤵
- Executes dropped EXE
PID:1152 -
\??\c:\dpvvj.exec:\dpvvj.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876 -
\??\c:\rxrrlrr.exec:\rxrrlrr.exe37⤵
- Executes dropped EXE
PID:2084 -
\??\c:\bhbbtb.exec:\bhbbtb.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1432 -
\??\c:\hnbntn.exec:\hnbntn.exe39⤵
- Executes dropped EXE
PID:2996 -
\??\c:\pdpjv.exec:\pdpjv.exe40⤵
- Executes dropped EXE
PID:2684 -
\??\c:\pjvpd.exec:\pjvpd.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936 -
\??\c:\dvjpd.exec:\dvjpd.exe42⤵
- Executes dropped EXE
PID:3568 -
\??\c:\ttttbh.exec:\ttttbh.exe43⤵
- Executes dropped EXE
PID:3740 -
\??\c:\dvdvd.exec:\dvdvd.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1336 -
\??\c:\3rxrrrr.exec:\3rxrrrr.exe45⤵
- Executes dropped EXE
PID:4700 -
\??\c:\xlflrrf.exec:\xlflrrf.exe46⤵
- Executes dropped EXE
PID:4380 -
\??\c:\tnhbnt.exec:\tnhbnt.exe47⤵
- Executes dropped EXE
PID:1972 -
\??\c:\djpjp.exec:\djpjp.exe48⤵
- Executes dropped EXE
PID:1468 -
\??\c:\bnthnh.exec:\bnthnh.exe49⤵
- Executes dropped EXE
PID:724 -
\??\c:\3dvvd.exec:\3dvvd.exe50⤵
- Executes dropped EXE
PID:764 -
\??\c:\jvppd.exec:\jvppd.exe51⤵
- Executes dropped EXE
PID:3228 -
\??\c:\xflllll.exec:\xflllll.exe52⤵
- Executes dropped EXE
PID:4692 -
\??\c:\bhbtnt.exec:\bhbtnt.exe53⤵
- Executes dropped EXE
PID:2544 -
\??\c:\nnbhhn.exec:\nnbhhn.exe54⤵
- Executes dropped EXE
PID:4948 -
\??\c:\vvppp.exec:\vvppp.exe55⤵
- Executes dropped EXE
PID:3720 -
\??\c:\ddppp.exec:\ddppp.exe56⤵
- Executes dropped EXE
PID:2436 -
\??\c:\llrrlfr.exec:\llrrlfr.exe57⤵
- Executes dropped EXE
PID:4488 -
\??\c:\xfrlxlr.exec:\xfrlxlr.exe58⤵
- Executes dropped EXE
PID:2596 -
\??\c:\bhhtnn.exec:\bhhtnn.exe59⤵
- Executes dropped EXE
PID:3532 -
\??\c:\jdjvp.exec:\jdjvp.exe60⤵
- Executes dropped EXE
PID:3696 -
\??\c:\vvpvp.exec:\vvpvp.exe61⤵
- Executes dropped EXE
PID:4516 -
\??\c:\vvpjp.exec:\vvpjp.exe62⤵
- Executes dropped EXE
PID:1476 -
\??\c:\xxxxxfx.exec:\xxxxxfx.exe63⤵
- Executes dropped EXE
PID:4160 -
\??\c:\fxrllfx.exec:\fxrllfx.exe64⤵
- Executes dropped EXE
PID:1824 -
\??\c:\3nnnbh.exec:\3nnnbh.exe65⤵
- Executes dropped EXE
PID:3584 -
\??\c:\jdppp.exec:\jdppp.exe66⤵PID:3960
-
\??\c:\fxxffxf.exec:\fxxffxf.exe67⤵PID:5100
-
\??\c:\xflxxll.exec:\xflxxll.exe68⤵PID:1332
-
\??\c:\hbhttb.exec:\hbhttb.exe69⤵PID:1176
-
\??\c:\jpvdd.exec:\jpvdd.exe70⤵PID:4804
-
\??\c:\fxffrxr.exec:\fxffrxr.exe71⤵PID:3808
-
\??\c:\lrfxfff.exec:\lrfxfff.exe72⤵PID:620
-
\??\c:\nbbhtb.exec:\nbbhtb.exe73⤵PID:1812
-
\??\c:\pjvdv.exec:\pjvdv.exe74⤵PID:2196
-
\??\c:\jvppv.exec:\jvppv.exe75⤵PID:408
-
\??\c:\llrxrxf.exec:\llrxrxf.exe76⤵PID:2084
-
\??\c:\xxlrfll.exec:\xxlrfll.exe77⤵PID:208
-
\??\c:\ntntht.exec:\ntntht.exe78⤵PID:1212
-
\??\c:\bhtnbt.exec:\bhtnbt.exe79⤵PID:4036
-
\??\c:\djdpd.exec:\djdpd.exe80⤵PID:2684
-
\??\c:\djdvd.exec:\djdvd.exe81⤵PID:5092
-
\??\c:\jvppp.exec:\jvppp.exe82⤵
- System Location Discovery: System Language Discovery
PID:548 -
\??\c:\lxllrxx.exec:\lxllrxx.exe83⤵
- System Location Discovery: System Language Discovery
PID:2492 -
\??\c:\xrlrfxf.exec:\xrlrfxf.exe84⤵PID:2552
-
\??\c:\rlfffrx.exec:\rlfffrx.exe85⤵PID:1336
-
\??\c:\frxllxr.exec:\frxllxr.exe86⤵
- System Location Discovery: System Language Discovery
PID:4456 -
\??\c:\frxxrrx.exec:\frxxrrx.exe87⤵PID:708
-
\??\c:\lxlrfrl.exec:\lxlrfrl.exe88⤵
- System Location Discovery: System Language Discovery
PID:4512 -
\??\c:\nnnbht.exec:\nnnbht.exe89⤵PID:3704
-
\??\c:\hbnnnn.exec:\hbnnnn.exe90⤵PID:4248
-
\??\c:\hnnthh.exec:\hnnthh.exe91⤵PID:2476
-
\??\c:\tbtthn.exec:\tbtthn.exe92⤵PID:2660
-
\??\c:\tbhtnt.exec:\tbhtnt.exe93⤵PID:384
-
\??\c:\vvjjj.exec:\vvjjj.exe94⤵PID:2712
-
\??\c:\jpjjj.exec:\jpjjj.exe95⤵PID:4868
-
\??\c:\jppjj.exec:\jppjj.exe96⤵
- System Location Discovery: System Language Discovery
PID:2240 -
\??\c:\rxrfxlr.exec:\rxrfxlr.exe97⤵PID:4692
-
\??\c:\flffrrf.exec:\flffrrf.exe98⤵PID:4880
-
\??\c:\xxllrff.exec:\xxllrff.exe99⤵PID:2668
-
\??\c:\llrxrrr.exec:\llrxrrr.exe100⤵PID:3320
-
\??\c:\htnhhb.exec:\htnhhb.exe101⤵PID:1628
-
\??\c:\djvpv.exec:\djvpv.exe102⤵PID:1036
-
\??\c:\vpvdj.exec:\vpvdj.exe103⤵PID:920
-
\??\c:\pjdjp.exec:\pjdjp.exe104⤵PID:3532
-
\??\c:\rfxrllr.exec:\rfxrllr.exe105⤵PID:4216
-
\??\c:\frxrxff.exec:\frxrxff.exe106⤵
- System Location Discovery: System Language Discovery
PID:3872 -
\??\c:\vjddv.exec:\vjddv.exe107⤵PID:1488
-
\??\c:\flfllrx.exec:\flfllrx.exe108⤵PID:4160
-
\??\c:\lfrxlfl.exec:\lfrxlfl.exe109⤵PID:4820
-
\??\c:\rxxlfxx.exec:\rxxlfxx.exe110⤵PID:4368
-
\??\c:\9lrrflf.exec:\9lrrflf.exe111⤵
- System Location Discovery: System Language Discovery
PID:3744 -
\??\c:\xlxlrfx.exec:\xlxlrfx.exe112⤵PID:1712
-
\??\c:\thnthb.exec:\thnthb.exe113⤵PID:4508
-
\??\c:\tttnbt.exec:\tttnbt.exe114⤵PID:3912
-
\??\c:\thnttt.exec:\thnttt.exe115⤵
- System Location Discovery: System Language Discovery
PID:2272 -
\??\c:\ttbhhh.exec:\ttbhhh.exe116⤵PID:3172
-
\??\c:\jjpvd.exec:\jjpvd.exe117⤵PID:2092
-
\??\c:\ddppp.exec:\ddppp.exe118⤵PID:3336
-
\??\c:\vpvpp.exec:\vpvpp.exe119⤵PID:3580
-
\??\c:\vjjjd.exec:\vjjjd.exe120⤵PID:1512
-
\??\c:\lxfflrf.exec:\lxfflrf.exe121⤵PID:1300
-
\??\c:\lrlllfr.exec:\lrlllfr.exe122⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-