Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 07:36
Behavioral task
behavioral1
Sample
5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe
Resource
win7-20241010-en
9 signatures
120 seconds
General
-
Target
5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe
-
Size
1.8MB
-
MD5
ddb2703449e217facb200cfd32b304e0
-
SHA1
3c6c5072519570047e6533d2b8c658c4309f04a5
-
SHA256
5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fb
-
SHA512
33dbd5fe2f6f0ac515b81c6d65615b529968b4017c4b7014c28a19b23656a88aa4405dd613ae7c4b513c11d0566d9a00d373ad003b31645dae15f6b4afce161e
-
SSDEEP
24576:gC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PT:gCOfN6X5tLLQTg20ITS/PT
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 52 IoCs
resource yara_rule behavioral1/memory/1728-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2300-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1028-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1968-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2460-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2836-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-64-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-59-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2648-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2688-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2688-78-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2256-97-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2076-135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1512-139-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2928-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/316-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2728-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1768-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/916-203-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/836-220-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/836-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1088-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2144-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1760-262-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2236-275-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1268-298-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2072-335-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1976-342-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2916-360-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2876-374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1612-413-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1688-424-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1688-427-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/632-455-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/632-453-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2852-470-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2852-469-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2092-491-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1368-497-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2136-510-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/1088-530-0x00000000002E0000-0x0000000000307000-memory.dmp family_blackmoon behavioral1/memory/1568-587-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1968-620-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2504-628-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2632-659-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2376-823-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2220-1208-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2668-1215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2220-1229-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2076-1291-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3020-1331-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2540-1455-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2300 448846.exe 1968 xxrlfff.exe 1028 pdjvv.exe 2460 nhbbtt.exe 2892 608806.exe 2752 1xffrrx.exe 2836 g4224.exe 2688 7xxrxfr.exe 2648 3nhntb.exe 2256 s6446.exe 1196 tnhhnt.exe 1236 0602880.exe 2840 hnnbht.exe 2076 22264.exe 1512 82268.exe 2928 xflffxf.exe 2856 080262.exe 316 fxrfrxf.exe 3004 86404.exe 2728 jvvdj.exe 1768 3nnhbh.exe 916 0400806.exe 1736 ttbbnn.exe 836 xlfllll.exe 1088 vdjpv.exe 1252 vjvpp.exe 2144 6206240.exe 1760 0206002.exe 2992 66086.exe 2236 6642402.exe 700 5nhnnb.exe 1268 84864.exe 876 u480646.exe 1956 82228.exe 2564 ttthbb.exe 1440 4868086.exe 1156 djjvd.exe 2072 o088680.exe 1976 bbthbb.exe 2572 fffxrxx.exe 2880 04408.exe 2916 6220806.exe 2988 2624640.exe 2808 7xrxllf.exe 2876 44806.exe 2664 466840.exe 2416 404062.exe 2628 5htbbn.exe 1104 jjvjj.exe 1672 lffrflx.exe 1612 bnhtnh.exe 1688 480688.exe 2064 xrrxlxl.exe 1512 886868.exe 1328 042840.exe 632 m6402.exe 2856 rfxxxxx.exe 2852 hbbntb.exe 2820 hbtbnh.exe 2728 220246.exe 2092 tnhnbb.exe 1368 9tthnb.exe 2160 ttthtb.exe 2136 i806268.exe -
resource yara_rule behavioral1/memory/1728-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000c000000012263-5.dat upx behavioral1/memory/1728-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016d0e-18.dat upx behavioral1/memory/2300-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d27-27.dat upx behavioral1/memory/1028-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1968-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d42-37.dat upx behavioral1/files/0x0007000000016d4a-48.dat upx behavioral1/memory/2460-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d66-56.dat upx behavioral1/files/0x0007000000016dbc-65.dat upx behavioral1/files/0x0009000000016dc0-75.dat upx behavioral1/memory/2836-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2752-64-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016dc8-84.dat upx behavioral1/memory/2648-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2688-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001955c-93.dat upx behavioral1/files/0x0005000000019581-102.dat upx behavioral1/files/0x00050000000195c0-110.dat upx behavioral1/files/0x00050000000195f7-119.dat upx behavioral1/files/0x00050000000195f9-127.dat upx behavioral1/memory/2076-135-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195fb-136.dat upx behavioral1/memory/1512-139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195fd-145.dat upx behavioral1/memory/2928-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195fe-155.dat upx behavioral1/files/0x00050000000195ff-162.dat upx behavioral1/files/0x0005000000019601-172.dat upx behavioral1/memory/316-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/316-166-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0005000000019603-180.dat upx behavioral1/memory/2728-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1768-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019605-189.dat upx behavioral1/files/0x0005000000019615-200.dat upx behavioral1/memory/1768-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019659-208.dat upx behavioral1/files/0x000500000001969b-216.dat upx behavioral1/files/0x00050000000196ed-226.dat upx behavioral1/memory/836-225-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1088-234-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019999-235.dat upx behavioral1/files/0x0005000000019c32-244.dat upx behavioral1/memory/2144-246-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019c34-253.dat upx behavioral1/files/0x0005000000019c36-263.dat upx behavioral1/memory/1760-262-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019c50-271.dat upx behavioral1/memory/700-281-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019d18-279.dat upx behavioral1/files/0x0005000000019d40-289.dat upx behavioral1/memory/1268-298-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1268-293-0x00000000001B0000-0x00000000001D7000-memory.dmp upx behavioral1/memory/2072-335-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1976-342-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2876-374-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2416-387-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1104-400-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1612-413-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1688-427-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8640068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1llfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lrxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e64680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 264246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 222486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2280806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4822024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 222444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0862844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 060284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q24626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2084460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6046246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fllrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xrxlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbht.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2300 1728 5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe 31 PID 1728 wrote to memory of 2300 1728 5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe 31 PID 1728 wrote to memory of 2300 1728 5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe 31 PID 1728 wrote to memory of 2300 1728 5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe 31 PID 2300 wrote to memory of 1968 2300 448846.exe 32 PID 2300 wrote to memory of 1968 2300 448846.exe 32 PID 2300 wrote to memory of 1968 2300 448846.exe 32 PID 2300 wrote to memory of 1968 2300 448846.exe 32 PID 1968 wrote to memory of 1028 1968 xxrlfff.exe 33 PID 1968 wrote to memory of 1028 1968 xxrlfff.exe 33 PID 1968 wrote to memory of 1028 1968 xxrlfff.exe 33 PID 1968 wrote to memory of 1028 1968 xxrlfff.exe 33 PID 1028 wrote to memory of 2460 1028 pdjvv.exe 34 PID 1028 wrote to memory of 2460 1028 pdjvv.exe 34 PID 1028 wrote to memory of 2460 1028 pdjvv.exe 34 PID 1028 wrote to memory of 2460 1028 pdjvv.exe 34 PID 2460 wrote to memory of 2892 2460 nhbbtt.exe 35 PID 2460 wrote to memory of 2892 2460 nhbbtt.exe 35 PID 2460 wrote to memory of 2892 2460 nhbbtt.exe 35 PID 2460 wrote to memory of 2892 2460 nhbbtt.exe 35 PID 2892 wrote to memory of 2752 2892 608806.exe 36 PID 2892 wrote to memory of 2752 2892 608806.exe 36 PID 2892 wrote to memory of 2752 2892 608806.exe 36 PID 2892 wrote to memory of 2752 2892 608806.exe 36 PID 2752 wrote to memory of 2836 2752 1xffrrx.exe 37 PID 2752 wrote to memory of 2836 2752 1xffrrx.exe 37 PID 2752 wrote to memory of 2836 2752 1xffrrx.exe 37 PID 2752 wrote to memory of 2836 2752 1xffrrx.exe 37 PID 2836 wrote to memory of 2688 2836 g4224.exe 38 PID 2836 wrote to memory of 2688 2836 g4224.exe 38 PID 2836 wrote to memory of 2688 2836 g4224.exe 38 PID 2836 wrote to memory of 2688 2836 g4224.exe 38 PID 2688 wrote to memory of 2648 2688 7xxrxfr.exe 39 PID 2688 wrote to memory of 2648 2688 7xxrxfr.exe 39 PID 2688 wrote to memory of 2648 2688 7xxrxfr.exe 39 PID 2688 wrote to memory of 2648 2688 7xxrxfr.exe 39 PID 2648 wrote to memory of 2256 2648 3nhntb.exe 40 PID 2648 wrote to memory of 2256 2648 3nhntb.exe 40 PID 2648 wrote to memory of 2256 2648 3nhntb.exe 40 PID 2648 wrote to memory of 2256 2648 3nhntb.exe 40 PID 2256 wrote to memory of 1196 2256 s6446.exe 41 PID 2256 wrote to memory of 1196 2256 s6446.exe 41 PID 2256 wrote to memory of 1196 2256 s6446.exe 41 PID 2256 wrote to memory of 1196 2256 s6446.exe 41 PID 1196 wrote to memory of 1236 1196 tnhhnt.exe 42 PID 1196 wrote to memory of 1236 1196 tnhhnt.exe 42 PID 1196 wrote to memory of 1236 1196 tnhhnt.exe 42 PID 1196 wrote to memory of 1236 1196 tnhhnt.exe 42 PID 1236 wrote to memory of 2840 1236 0602880.exe 43 PID 1236 wrote to memory of 2840 1236 0602880.exe 43 PID 1236 wrote to memory of 2840 1236 0602880.exe 43 PID 1236 wrote to memory of 2840 1236 0602880.exe 43 PID 2840 wrote to memory of 2076 2840 hnnbht.exe 44 PID 2840 wrote to memory of 2076 2840 hnnbht.exe 44 PID 2840 wrote to memory of 2076 2840 hnnbht.exe 44 PID 2840 wrote to memory of 2076 2840 hnnbht.exe 44 PID 2076 wrote to memory of 1512 2076 22264.exe 45 PID 2076 wrote to memory of 1512 2076 22264.exe 45 PID 2076 wrote to memory of 1512 2076 22264.exe 45 PID 2076 wrote to memory of 1512 2076 22264.exe 45 PID 1512 wrote to memory of 2928 1512 82268.exe 46 PID 1512 wrote to memory of 2928 1512 82268.exe 46 PID 1512 wrote to memory of 2928 1512 82268.exe 46 PID 1512 wrote to memory of 2928 1512 82268.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe"C:\Users\Admin\AppData\Local\Temp\5b36db45baf14439ebe5d527edbb572c69297af6659c3d230780e242e45ab8fbN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\448846.exec:\448846.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\xxrlfff.exec:\xxrlfff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\pdjvv.exec:\pdjvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\nhbbtt.exec:\nhbbtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\608806.exec:\608806.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\1xffrrx.exec:\1xffrrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\g4224.exec:\g4224.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\7xxrxfr.exec:\7xxrxfr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\3nhntb.exec:\3nhntb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\s6446.exec:\s6446.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\tnhhnt.exec:\tnhhnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\0602880.exec:\0602880.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\hnnbht.exec:\hnnbht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\22264.exec:\22264.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\82268.exec:\82268.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\xflffxf.exec:\xflffxf.exe17⤵
- Executes dropped EXE
PID:2928 -
\??\c:\080262.exec:\080262.exe18⤵
- Executes dropped EXE
PID:2856 -
\??\c:\fxrfrxf.exec:\fxrfrxf.exe19⤵
- Executes dropped EXE
PID:316 -
\??\c:\86404.exec:\86404.exe20⤵
- Executes dropped EXE
PID:3004 -
\??\c:\jvvdj.exec:\jvvdj.exe21⤵
- Executes dropped EXE
PID:2728 -
\??\c:\3nnhbh.exec:\3nnhbh.exe22⤵
- Executes dropped EXE
PID:1768 -
\??\c:\0400806.exec:\0400806.exe23⤵
- Executes dropped EXE
PID:916 -
\??\c:\ttbbnn.exec:\ttbbnn.exe24⤵
- Executes dropped EXE
PID:1736 -
\??\c:\xlfllll.exec:\xlfllll.exe25⤵
- Executes dropped EXE
PID:836 -
\??\c:\vdjpv.exec:\vdjpv.exe26⤵
- Executes dropped EXE
PID:1088 -
\??\c:\vjvpp.exec:\vjvpp.exe27⤵
- Executes dropped EXE
PID:1252 -
\??\c:\6206240.exec:\6206240.exe28⤵
- Executes dropped EXE
PID:2144 -
\??\c:\0206002.exec:\0206002.exe29⤵
- Executes dropped EXE
PID:1760 -
\??\c:\66086.exec:\66086.exe30⤵
- Executes dropped EXE
PID:2992 -
\??\c:\6642402.exec:\6642402.exe31⤵
- Executes dropped EXE
PID:2236 -
\??\c:\5nhnnb.exec:\5nhnnb.exe32⤵
- Executes dropped EXE
PID:700 -
\??\c:\84864.exec:\84864.exe33⤵
- Executes dropped EXE
PID:1268 -
\??\c:\u480646.exec:\u480646.exe34⤵
- Executes dropped EXE
PID:876 -
\??\c:\82228.exec:\82228.exe35⤵
- Executes dropped EXE
PID:1956 -
\??\c:\ttthbb.exec:\ttthbb.exe36⤵
- Executes dropped EXE
PID:2564 -
\??\c:\4868086.exec:\4868086.exe37⤵
- Executes dropped EXE
PID:1440 -
\??\c:\djjvd.exec:\djjvd.exe38⤵
- Executes dropped EXE
PID:1156 -
\??\c:\o088680.exec:\o088680.exe39⤵
- Executes dropped EXE
PID:2072 -
\??\c:\bbthbb.exec:\bbthbb.exe40⤵
- Executes dropped EXE
PID:1976 -
\??\c:\fffxrxx.exec:\fffxrxx.exe41⤵
- Executes dropped EXE
PID:2572 -
\??\c:\04408.exec:\04408.exe42⤵
- Executes dropped EXE
PID:2880 -
\??\c:\6220806.exec:\6220806.exe43⤵
- Executes dropped EXE
PID:2916 -
\??\c:\2624640.exec:\2624640.exe44⤵
- Executes dropped EXE
PID:2988 -
\??\c:\7xrxllf.exec:\7xrxllf.exe45⤵
- Executes dropped EXE
PID:2808 -
\??\c:\44806.exec:\44806.exe46⤵
- Executes dropped EXE
PID:2876 -
\??\c:\466840.exec:\466840.exe47⤵
- Executes dropped EXE
PID:2664 -
\??\c:\404062.exec:\404062.exe48⤵
- Executes dropped EXE
PID:2416 -
\??\c:\5htbbn.exec:\5htbbn.exe49⤵
- Executes dropped EXE
PID:2628 -
\??\c:\jjvjj.exec:\jjvjj.exe50⤵
- Executes dropped EXE
PID:1104 -
\??\c:\lffrflx.exec:\lffrflx.exe51⤵
- Executes dropped EXE
PID:1672 -
\??\c:\bnhtnh.exec:\bnhtnh.exe52⤵
- Executes dropped EXE
PID:1612 -
\??\c:\480688.exec:\480688.exe53⤵
- Executes dropped EXE
PID:1688 -
\??\c:\xrrxlxl.exec:\xrrxlxl.exe54⤵
- Executes dropped EXE
PID:2064 -
\??\c:\886868.exec:\886868.exe55⤵
- Executes dropped EXE
PID:1512 -
\??\c:\042840.exec:\042840.exe56⤵
- Executes dropped EXE
PID:1328 -
\??\c:\m6402.exec:\m6402.exe57⤵
- Executes dropped EXE
PID:632 -
\??\c:\rfxxxxx.exec:\rfxxxxx.exe58⤵
- Executes dropped EXE
PID:2856 -
\??\c:\hbbntb.exec:\hbbntb.exe59⤵
- Executes dropped EXE
PID:2852 -
\??\c:\hbtbnh.exec:\hbtbnh.exe60⤵
- Executes dropped EXE
PID:2820 -
\??\c:\220246.exec:\220246.exe61⤵
- Executes dropped EXE
PID:2728 -
\??\c:\tnhnbb.exec:\tnhnbb.exe62⤵
- Executes dropped EXE
PID:2092 -
\??\c:\9tthnb.exec:\9tthnb.exe63⤵
- Executes dropped EXE
PID:1368 -
\??\c:\ttthtb.exec:\ttthtb.exe64⤵
- Executes dropped EXE
PID:2160 -
\??\c:\i806268.exec:\i806268.exe65⤵
- Executes dropped EXE
PID:2136 -
\??\c:\rfxfrfr.exec:\rfxfrfr.exe66⤵PID:1148
-
\??\c:\bhbntt.exec:\bhbntt.exe67⤵PID:2488
-
\??\c:\608028.exec:\608028.exe68⤵PID:1088
-
\??\c:\1rlrlxf.exec:\1rlrlxf.exe69⤵PID:904
-
\??\c:\20428.exec:\20428.exe70⤵PID:2596
-
\??\c:\xxrfrfr.exec:\xxrfrfr.exe71⤵PID:740
-
\??\c:\486280.exec:\486280.exe72⤵PID:2052
-
\??\c:\8284062.exec:\8284062.exe73⤵PID:2480
-
\??\c:\bttbtb.exec:\bttbtb.exe74⤵PID:2500
-
\??\c:\pdjdj.exec:\pdjdj.exe75⤵PID:1864
-
\??\c:\flxrlxf.exec:\flxrlxf.exe76⤵PID:960
-
\??\c:\hnhnbh.exec:\hnhnbh.exe77⤵PID:1264
-
\??\c:\628684.exec:\628684.exe78⤵PID:1568
-
\??\c:\c084460.exec:\c084460.exe79⤵PID:1720
-
\??\c:\8268402.exec:\8268402.exe80⤵PID:624
-
\??\c:\c468068.exec:\c468068.exe81⤵PID:2276
-
\??\c:\68402.exec:\68402.exe82⤵PID:1968
-
\??\c:\nbbnbh.exec:\nbbnbh.exe83⤵PID:2504
-
\??\c:\64246.exec:\64246.exe84⤵PID:1028
-
\??\c:\6822880.exec:\6822880.exe85⤵PID:2784
-
\??\c:\6462802.exec:\6462802.exe86⤵PID:2372
-
\??\c:\vpjvj.exec:\vpjvj.exe87⤵PID:2872
-
\??\c:\624680.exec:\624680.exe88⤵PID:2632
-
\??\c:\rrrflfx.exec:\rrrflfx.exe89⤵PID:2792
-
\??\c:\4060640.exec:\4060640.exe90⤵PID:2924
-
\??\c:\228024.exec:\228024.exe91⤵PID:2440
-
\??\c:\btnhhn.exec:\btnhhn.exe92⤵
- System Location Discovery: System Language Discovery
PID:584 -
\??\c:\tnhtbh.exec:\tnhtbh.exe93⤵PID:2684
-
\??\c:\vjjpv.exec:\vjjpv.exe94⤵PID:388
-
\??\c:\vjdpj.exec:\vjdpj.exe95⤵PID:536
-
\??\c:\hbnhbt.exec:\hbnhbt.exe96⤵PID:1496
-
\??\c:\3llxrlx.exec:\3llxrlx.exe97⤵PID:1488
-
\??\c:\nthbtn.exec:\nthbtn.exe98⤵PID:2076
-
\??\c:\nhtbhn.exec:\nhtbhn.exe99⤵PID:1288
-
\??\c:\1fxxffr.exec:\1fxxffr.exe100⤵PID:1512
-
\??\c:\8246240.exec:\8246240.exe101⤵PID:1328
-
\??\c:\6444224.exec:\6444224.exe102⤵PID:632
-
\??\c:\k26862.exec:\k26862.exe103⤵PID:756
-
\??\c:\vpjpj.exec:\vpjpj.exe104⤵PID:2948
-
\??\c:\5xflrxx.exec:\5xflrxx.exe105⤵PID:2420
-
\??\c:\008460.exec:\008460.exe106⤵PID:2148
-
\??\c:\s6468.exec:\s6468.exe107⤵PID:2172
-
\??\c:\g4640.exec:\g4640.exe108⤵PID:408
-
\??\c:\62246.exec:\62246.exe109⤵PID:1368
-
\??\c:\xflfxxf.exec:\xflfxxf.exe110⤵PID:320
-
\??\c:\6608204.exec:\6608204.exe111⤵PID:1736
-
\??\c:\xrrrflx.exec:\xrrrflx.exe112⤵PID:2040
-
\??\c:\hbbbhb.exec:\hbbbhb.exe113⤵PID:1840
-
\??\c:\fflxflx.exec:\fflxflx.exe114⤵PID:1040
-
\??\c:\2642060.exec:\2642060.exe115⤵PID:2376
-
\??\c:\40880.exec:\40880.exe116⤵PID:2096
-
\??\c:\fxrrfll.exec:\fxrrfll.exe117⤵PID:2232
-
\??\c:\rlxxrrr.exec:\rlxxrrr.exe118⤵PID:2140
-
\??\c:\9jvdv.exec:\9jvdv.exe119⤵
- System Location Discovery: System Language Discovery
PID:2444 -
\??\c:\vvjpd.exec:\vvjpd.exe120⤵PID:2548
-
\??\c:\fxlxflr.exec:\fxlxflr.exe121⤵PID:304
-
\??\c:\nnnbth.exec:\nnnbth.exe122⤵PID:1004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-