Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 22:10
Behavioral task
behavioral1
Sample
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe
Resource
win7-20240903-en
General
-
Target
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe
-
Size
1.9MB
-
MD5
739a4cc33f07c69c7a37b5848967ce9b
-
SHA1
a2aab686705709fa39475da23b327a4c919867d9
-
SHA256
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747
-
SHA512
886d831ef51a8c5709fc818080f6262f71a1fd9ad954704d49812fd7485af6fe7719c2a676203fb2b04385f0d26627edd7ff25449bf40e8e39e55d8d2a39a564
-
SSDEEP
24576:gC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PPsbb1hwR4j:gCOfN6X5tLLQTg20ITS/PPs/1kk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 60 IoCs
Processes:
resource yara_rule behavioral2/memory/2044-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2752-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/456-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3000-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1292-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4756-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4004-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/712-62-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2560-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3692-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3168-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3788-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/920-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2024-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4544-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1980-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4600-168-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1276-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4884-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4464-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4580-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2852-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4404-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1084-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3628-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1316-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3680-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2884-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2936-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3788-269-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2740-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4832-283-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2024-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4960-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2272-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2364-362-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3012-405-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4576-411-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4616-422-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4088-426-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1256-448-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4128-479-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4012-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3812-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5004-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/412-495-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2684-517-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4448-572-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1480-579-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-598-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1764-632-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1096-649-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3548-674-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4812-762-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1852-865-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4928-950-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5096-1017-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
frxfflf.exerrfxxxr.exe3pjpp.exetbbbnt.exenhnbbn.exeffxfxfx.exexxlxfxf.exefxrrfrf.exedvjjp.exeppdjp.exebnnhbb.exevvvdd.exe7hbhhb.exettnhtn.exetttbnt.exebnhtbb.exexxxrfxl.exe7vvpj.exettttnt.exethnnnt.exerxrffrr.exe7pddv.exejdvjj.exehbhhhn.exerrxxxff.exevjdvj.exe9nntnb.exepdvvd.exenbhtht.exebhhnnt.exelrlfrll.exe3fxrlxr.exepvjjd.exevpdpd.exebnbhbh.exeppjjp.exebnhbbh.exedpjpd.exevvdvp.exetthhhh.exehthhhn.exerllrrxx.exepjvdv.exepjdpd.exevpppp.exe3rllxrl.exelxflflf.exexfxrlfx.exexflfxrr.exevvvjp.exeflrrlxl.exelrfrrxf.exevvppp.exetttttt.exebhbhht.exelllfxxx.exevjppv.exehhhtbn.exetbbntn.exellfxfll.exejdjjj.exebhnhbh.exellxlfxx.exerflfllr.exepid process 2752 frxfflf.exe 5004 rrfxxxr.exe 456 3pjpp.exe 3000 tbbbnt.exe 1292 nhnbbn.exe 4756 ffxfxfx.exe 1028 xxlxfxf.exe 3812 fxrrfrf.exe 4004 dvjjp.exe 712 ppdjp.exe 4012 bnnhbb.exe 3692 vvvdd.exe 2560 7hbhhb.exe 3168 ttnhtn.exe 3788 tttbnt.exe 4684 bnhtbb.exe 64 xxxrfxl.exe 4616 7vvpj.exe 920 ttttnt.exe 1328 thnnnt.exe 2024 rxrffrr.exe 4344 7pddv.exe 4544 jdvjj.exe 1980 hbhhhn.exe 3224 rrxxxff.exe 1228 vjdvj.exe 4184 9nntnb.exe 4600 pdvvd.exe 4848 nbhtht.exe 1620 bhhnnt.exe 3120 lrlfrll.exe 1276 3fxrlxr.exe 4464 pvjjd.exe 4884 vpdpd.exe 4580 bnbhbh.exe 2852 ppjjp.exe 372 bnhbbh.exe 4404 dpjpd.exe 1084 vvdvp.exe 4764 tthhhh.exe 3628 hthhhn.exe 1316 rllrrxx.exe 3680 pjvdv.exe 2884 pjdpd.exe 5104 vpppp.exe 4432 3rllxrl.exe 3356 lxflflf.exe 1608 xfxrlfx.exe 1120 xflfxrr.exe 2052 vvvjp.exe 5020 flrrlxl.exe 2936 lrfrrxf.exe 1224 vvppp.exe 3936 tttttt.exe 3788 bhbhht.exe 4936 lllfxxx.exe 2740 vjppv.exe 2548 hhhtbn.exe 4832 tbbntn.exe 3888 llfxfll.exe 4448 jdjjj.exe 2024 bhnhbh.exe 3128 llxlfxx.exe 2324 rflfllr.exe -
Processes:
resource yara_rule behavioral2/memory/2044-0-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\frxfflf.exe upx behavioral2/memory/2044-5-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rrfxxxr.exe upx behavioral2/memory/2752-11-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3pjpp.exe upx behavioral2/memory/456-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/456-25-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tbbbnt.exe upx behavioral2/memory/3000-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1292-37-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ffxfxfx.exe upx behavioral2/memory/4756-43-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxlxfxf.exe upx \??\c:\fxrrfrf.exe upx behavioral2/memory/3812-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4004-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/712-62-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnnhbb.exe upx \??\c:\ppdjp.exe upx \??\c:\vvvdd.exe upx behavioral2/memory/2560-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3692-79-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ttnhtn.exe upx behavioral2/memory/3168-91-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tttbnt.exe upx C:\bnhtbb.exe upx behavioral2/memory/3788-97-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxxrfxl.exe upx \??\c:\7vvpj.exe upx \??\c:\ttttnt.exe upx \??\c:\thnnnt.exe upx behavioral2/memory/920-118-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rxrffrr.exe upx \??\c:\7pddv.exe upx behavioral2/memory/2024-128-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jdvjj.exe upx behavioral2/memory/4544-140-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hbhhhn.exe upx behavioral2/memory/1980-146-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rrxxxff.exe upx C:\vjdvj.exe upx behavioral2/memory/3224-151-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\9nntnb.exe upx \??\c:\pdvvd.exe upx behavioral2/memory/4600-168-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nbhtht.exe upx \??\c:\bhhnnt.exe upx \??\c:\lrlfrll.exe upx \??\c:\3fxrlxr.exe upx behavioral2/memory/1276-187-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4884-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4464-191-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4580-199-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2852-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4404-210-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1084-214-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4764-218-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3628-222-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1316-225-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3680-229-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2884-233-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1608-246-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2936-259-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tbbttn.exexxlrrxr.exedjvpj.exedppjv.exelxlffll.exefxffxfr.exellfxfll.exeppvvd.exe5jdvj.exerrxxflr.exelrfffxf.exejjdjd.exevjvvj.exebhtnnt.exevpjjp.exerfxxxxf.exexxfffrr.exe3llrrrl.exehbhhhn.exebhbthh.exelfxxlrf.exeppvdj.exevppvd.exebbbhnb.exenbhthh.exebthhnn.exepjjdv.exe9pddj.exepjvvd.exeflrrlxl.exexfxrrrl.exefrrrfll.exexfrxxlf.exedpvpj.exexlrxxfr.exevdpvd.exe7pddv.exejvvjj.exeppdvv.exerxrrllf.exehbtthb.exerxfllrx.exedpddv.exenbbnbn.exellxfrrr.exefllrrxr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxffxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfxfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfffrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3llrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrxxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrxxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfllrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxfrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrrxr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exefrxfflf.exerrfxxxr.exe3pjpp.exetbbbnt.exenhnbbn.exeffxfxfx.exexxlxfxf.exefxrrfrf.exedvjjp.exeppdjp.exebnnhbb.exevvvdd.exe7hbhhb.exettnhtn.exetttbnt.exebnhtbb.exexxxrfxl.exe7vvpj.exettttnt.exethnnnt.exerxrffrr.exedescription pid process target process PID 2044 wrote to memory of 2752 2044 30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe frxfflf.exe PID 2044 wrote to memory of 2752 2044 30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe frxfflf.exe PID 2044 wrote to memory of 2752 2044 30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe frxfflf.exe PID 2752 wrote to memory of 5004 2752 frxfflf.exe rrfxxxr.exe PID 2752 wrote to memory of 5004 2752 frxfflf.exe rrfxxxr.exe PID 2752 wrote to memory of 5004 2752 frxfflf.exe rrfxxxr.exe PID 5004 wrote to memory of 456 5004 rrfxxxr.exe 3pjpp.exe PID 5004 wrote to memory of 456 5004 rrfxxxr.exe 3pjpp.exe PID 5004 wrote to memory of 456 5004 rrfxxxr.exe 3pjpp.exe PID 456 wrote to memory of 3000 456 3pjpp.exe tbbbnt.exe PID 456 wrote to memory of 3000 456 3pjpp.exe tbbbnt.exe PID 456 wrote to memory of 3000 456 3pjpp.exe tbbbnt.exe PID 3000 wrote to memory of 1292 3000 tbbbnt.exe djvvv.exe PID 3000 wrote to memory of 1292 3000 tbbbnt.exe djvvv.exe PID 3000 wrote to memory of 1292 3000 tbbbnt.exe djvvv.exe PID 1292 wrote to memory of 4756 1292 nhnbbn.exe ffxfxfx.exe PID 1292 wrote to memory of 4756 1292 nhnbbn.exe ffxfxfx.exe PID 1292 wrote to memory of 4756 1292 nhnbbn.exe ffxfxfx.exe PID 4756 wrote to memory of 1028 4756 ffxfxfx.exe xxlxfxf.exe PID 4756 wrote to memory of 1028 4756 ffxfxfx.exe xxlxfxf.exe PID 4756 wrote to memory of 1028 4756 ffxfxfx.exe xxlxfxf.exe PID 1028 wrote to memory of 3812 1028 xxlxfxf.exe fxrrfrf.exe PID 1028 wrote to memory of 3812 1028 xxlxfxf.exe fxrrfrf.exe PID 1028 wrote to memory of 3812 1028 xxlxfxf.exe fxrrfrf.exe PID 3812 wrote to memory of 4004 3812 fxrrfrf.exe dvjjp.exe PID 3812 wrote to memory of 4004 3812 fxrrfrf.exe dvjjp.exe PID 3812 wrote to memory of 4004 3812 fxrrfrf.exe dvjjp.exe PID 4004 wrote to memory of 712 4004 dvjjp.exe ppdjp.exe PID 4004 wrote to memory of 712 4004 dvjjp.exe ppdjp.exe PID 4004 wrote to memory of 712 4004 dvjjp.exe ppdjp.exe PID 712 wrote to memory of 4012 712 ppdjp.exe bnnhbb.exe PID 712 wrote to memory of 4012 712 ppdjp.exe bnnhbb.exe PID 712 wrote to memory of 4012 712 ppdjp.exe bnnhbb.exe PID 4012 wrote to memory of 3692 4012 bnnhbb.exe vvvdd.exe PID 4012 wrote to memory of 3692 4012 bnnhbb.exe vvvdd.exe PID 4012 wrote to memory of 3692 4012 bnnhbb.exe vvvdd.exe PID 3692 wrote to memory of 2560 3692 vvvdd.exe 7hbhhb.exe PID 3692 wrote to memory of 2560 3692 vvvdd.exe 7hbhhb.exe PID 3692 wrote to memory of 2560 3692 vvvdd.exe 7hbhhb.exe PID 2560 wrote to memory of 3168 2560 7hbhhb.exe ttnhtn.exe PID 2560 wrote to memory of 3168 2560 7hbhhb.exe ttnhtn.exe PID 2560 wrote to memory of 3168 2560 7hbhhb.exe ttnhtn.exe PID 3168 wrote to memory of 3788 3168 ttnhtn.exe bhbhht.exe PID 3168 wrote to memory of 3788 3168 ttnhtn.exe bhbhht.exe PID 3168 wrote to memory of 3788 3168 ttnhtn.exe bhbhht.exe PID 3788 wrote to memory of 4684 3788 tttbnt.exe bnhtbb.exe PID 3788 wrote to memory of 4684 3788 tttbnt.exe bnhtbb.exe PID 3788 wrote to memory of 4684 3788 tttbnt.exe bnhtbb.exe PID 4684 wrote to memory of 64 4684 bnhtbb.exe xxxrfxl.exe PID 4684 wrote to memory of 64 4684 bnhtbb.exe xxxrfxl.exe PID 4684 wrote to memory of 64 4684 bnhtbb.exe xxxrfxl.exe PID 64 wrote to memory of 4616 64 xxxrfxl.exe vjdpj.exe PID 64 wrote to memory of 4616 64 xxxrfxl.exe vjdpj.exe PID 64 wrote to memory of 4616 64 xxxrfxl.exe vjdpj.exe PID 4616 wrote to memory of 920 4616 7vvpj.exe ttttnt.exe PID 4616 wrote to memory of 920 4616 7vvpj.exe ttttnt.exe PID 4616 wrote to memory of 920 4616 7vvpj.exe ttttnt.exe PID 920 wrote to memory of 1328 920 ttttnt.exe thnnnt.exe PID 920 wrote to memory of 1328 920 ttttnt.exe thnnnt.exe PID 920 wrote to memory of 1328 920 ttttnt.exe thnnnt.exe PID 1328 wrote to memory of 2024 1328 thnnnt.exe rxrffrr.exe PID 1328 wrote to memory of 2024 1328 thnnnt.exe rxrffrr.exe PID 1328 wrote to memory of 2024 1328 thnnnt.exe rxrffrr.exe PID 2024 wrote to memory of 4344 2024 rxrffrr.exe 7pddv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe"C:\Users\Admin\AppData\Local\Temp\30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\frxfflf.exec:\frxfflf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\rrfxxxr.exec:\rrfxxxr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\3pjpp.exec:\3pjpp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\tbbbnt.exec:\tbbbnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\nhnbbn.exec:\nhnbbn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\ffxfxfx.exec:\ffxfxfx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\xxlxfxf.exec:\xxlxfxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\fxrrfrf.exec:\fxrrfrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
\??\c:\dvjjp.exec:\dvjjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\ppdjp.exec:\ppdjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
\??\c:\bnnhbb.exec:\bnnhbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\vvvdd.exec:\vvvdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\7hbhhb.exec:\7hbhhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\ttnhtn.exec:\ttnhtn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\tttbnt.exec:\tttbnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\bnhtbb.exec:\bnhtbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
\??\c:\xxxrfxl.exec:\xxxrfxl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\7vvpj.exec:\7vvpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\ttttnt.exec:\ttttnt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\thnnnt.exec:\thnnnt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
\??\c:\rxrffrr.exec:\rxrffrr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\7pddv.exec:\7pddv.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4344 -
\??\c:\jdvjj.exec:\jdvjj.exe24⤵
- Executes dropped EXE
PID:4544 -
\??\c:\hbhhhn.exec:\hbhhhn.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
\??\c:\rrxxxff.exec:\rrxxxff.exe26⤵
- Executes dropped EXE
PID:3224 -
\??\c:\vjdvj.exec:\vjdvj.exe27⤵
- Executes dropped EXE
PID:1228 -
\??\c:\9nntnb.exec:\9nntnb.exe28⤵
- Executes dropped EXE
PID:4184 -
\??\c:\pdvvd.exec:\pdvvd.exe29⤵
- Executes dropped EXE
PID:4600 -
\??\c:\nbhtht.exec:\nbhtht.exe30⤵
- Executes dropped EXE
PID:4848 -
\??\c:\bhhnnt.exec:\bhhnnt.exe31⤵
- Executes dropped EXE
PID:1620 -
\??\c:\lrlfrll.exec:\lrlfrll.exe32⤵
- Executes dropped EXE
PID:3120 -
\??\c:\3fxrlxr.exec:\3fxrlxr.exe33⤵
- Executes dropped EXE
PID:1276 -
\??\c:\pvjjd.exec:\pvjjd.exe34⤵
- Executes dropped EXE
PID:4464 -
\??\c:\vpdpd.exec:\vpdpd.exe35⤵
- Executes dropped EXE
PID:4884 -
\??\c:\bnbhbh.exec:\bnbhbh.exe36⤵
- Executes dropped EXE
PID:4580 -
\??\c:\ppjjp.exec:\ppjjp.exe37⤵
- Executes dropped EXE
PID:2852 -
\??\c:\bnhbbh.exec:\bnhbbh.exe38⤵
- Executes dropped EXE
PID:372 -
\??\c:\dpjpd.exec:\dpjpd.exe39⤵
- Executes dropped EXE
PID:4404 -
\??\c:\vvdvp.exec:\vvdvp.exe40⤵
- Executes dropped EXE
PID:1084 -
\??\c:\tthhhh.exec:\tthhhh.exe41⤵
- Executes dropped EXE
PID:4764 -
\??\c:\hthhhn.exec:\hthhhn.exe42⤵
- Executes dropped EXE
PID:3628 -
\??\c:\rllrrxx.exec:\rllrrxx.exe43⤵
- Executes dropped EXE
PID:1316 -
\??\c:\pjvdv.exec:\pjvdv.exe44⤵
- Executes dropped EXE
PID:3680 -
\??\c:\pjdpd.exec:\pjdpd.exe45⤵
- Executes dropped EXE
PID:2884 -
\??\c:\vpppp.exec:\vpppp.exe46⤵
- Executes dropped EXE
PID:5104 -
\??\c:\3rllxrl.exec:\3rllxrl.exe47⤵
- Executes dropped EXE
PID:4432 -
\??\c:\lxflflf.exec:\lxflflf.exe48⤵
- Executes dropped EXE
PID:3356 -
\??\c:\xfxrlfx.exec:\xfxrlfx.exe49⤵
- Executes dropped EXE
PID:1608 -
\??\c:\xflfxrr.exec:\xflfxrr.exe50⤵
- Executes dropped EXE
PID:1120 -
\??\c:\vvvjp.exec:\vvvjp.exe51⤵
- Executes dropped EXE
PID:2052 -
\??\c:\flrrlxl.exec:\flrrlxl.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5020 -
\??\c:\lrfrrxf.exec:\lrfrrxf.exe53⤵
- Executes dropped EXE
PID:2936 -
\??\c:\vvppp.exec:\vvppp.exe54⤵
- Executes dropped EXE
PID:1224 -
\??\c:\tttttt.exec:\tttttt.exe55⤵
- Executes dropped EXE
PID:3936 -
\??\c:\bhbhht.exec:\bhbhht.exe56⤵
- Executes dropped EXE
PID:3788 -
\??\c:\lllfxxx.exec:\lllfxxx.exe57⤵
- Executes dropped EXE
PID:4936 -
\??\c:\vjppv.exec:\vjppv.exe58⤵
- Executes dropped EXE
PID:2740 -
\??\c:\hhhtbn.exec:\hhhtbn.exe59⤵
- Executes dropped EXE
PID:2548 -
\??\c:\tbbntn.exec:\tbbntn.exe60⤵
- Executes dropped EXE
PID:4832 -
\??\c:\llfxfll.exec:\llfxfll.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3888 -
\??\c:\jdjjj.exec:\jdjjj.exe62⤵
- Executes dropped EXE
PID:4448 -
\??\c:\bhnhbh.exec:\bhnhbh.exe63⤵
- Executes dropped EXE
PID:2024 -
\??\c:\llxlfxx.exec:\llxlfxx.exe64⤵
- Executes dropped EXE
PID:3128 -
\??\c:\rflfllr.exec:\rflfllr.exe65⤵
- Executes dropped EXE
PID:2324 -
\??\c:\dvvjj.exec:\dvvjj.exe66⤵PID:708
-
\??\c:\ntbhbb.exec:\ntbhbb.exe67⤵PID:540
-
\??\c:\xfxrrrl.exec:\xfxrrrl.exe68⤵
- System Location Discovery: System Language Discovery
PID:4960 -
\??\c:\dpvvv.exec:\dpvvv.exe69⤵PID:4320
-
\??\c:\vvvvp.exec:\vvvvp.exe70⤵PID:1736
-
\??\c:\ttttnn.exec:\ttttnn.exe71⤵PID:4600
-
\??\c:\frffrfl.exec:\frffrfl.exe72⤵PID:2272
-
\??\c:\jvjdd.exec:\jvjdd.exe73⤵PID:3460
-
\??\c:\7btttb.exec:\7btttb.exe74⤵PID:3964
-
\??\c:\nbhtbb.exec:\nbhtbb.exe75⤵PID:4812
-
\??\c:\xlxrxxx.exec:\xlxrxxx.exe76⤵PID:2788
-
\??\c:\5djpj.exec:\5djpj.exe77⤵PID:4816
-
\??\c:\bhtbnb.exec:\bhtbnb.exe78⤵PID:4284
-
\??\c:\xlrxxlr.exec:\xlrxxlr.exe79⤵PID:3484
-
\??\c:\jdjjj.exec:\jdjjj.exe80⤵PID:1764
-
\??\c:\9bhbtn.exec:\9bhbtn.exe81⤵PID:4492
-
\??\c:\rfrlflr.exec:\rfrlflr.exe82⤵PID:3700
-
\??\c:\jppdd.exec:\jppdd.exe83⤵PID:4352
-
\??\c:\btnnhh.exec:\btnnhh.exe84⤵PID:4596
-
\??\c:\ffrrxxf.exec:\ffrrxxf.exe85⤵PID:2364
-
\??\c:\jvvjj.exec:\jvvjj.exe86⤵
- System Location Discovery: System Language Discovery
PID:2340 -
\??\c:\btnnnb.exec:\btnnnb.exe87⤵PID:1016
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe88⤵PID:1452
-
\??\c:\djvdj.exec:\djvdj.exe89⤵PID:3628
-
\??\c:\bhhhnn.exec:\bhhhnn.exe90⤵PID:3156
-
\??\c:\rlxxxrx.exec:\rlxxxrx.exe91⤵PID:3688
-
\??\c:\nnhnth.exec:\nnhnth.exe92⤵PID:2564
-
\??\c:\tbbtht.exec:\tbbtht.exe93⤵PID:1284
-
\??\c:\rrlrrxf.exec:\rrlrrxf.exe94⤵PID:3812
-
\??\c:\djvvv.exec:\djvvv.exe95⤵PID:1292
-
\??\c:\ntnnhh.exec:\ntnnhh.exe96⤵PID:1428
-
\??\c:\rxlfxrx.exec:\rxlfxrx.exe97⤵PID:2744
-
\??\c:\5ppvj.exec:\5ppvj.exe98⤵PID:3896
-
\??\c:\bthnhn.exec:\bthnhn.exe99⤵PID:3012
-
\??\c:\frllfrx.exec:\frllfrx.exe100⤵PID:4672
-
\??\c:\dpvjv.exec:\dpvjv.exe101⤵PID:2352
-
\??\c:\1nbbht.exec:\1nbbht.exe102⤵PID:4576
-
\??\c:\1hbhhh.exec:\1hbhhh.exe103⤵PID:3648
-
\??\c:\vjdpj.exec:\vjdpj.exe104⤵PID:4616
-
\??\c:\pjvdj.exec:\pjvdj.exe105⤵PID:4088
-
\??\c:\nnhntb.exec:\nnhntb.exe106⤵PID:3080
-
\??\c:\jjvvv.exec:\jjvvv.exe107⤵PID:3704
-
\??\c:\htnbht.exec:\htnbht.exe108⤵PID:1480
-
\??\c:\7lrrrff.exec:\7lrrrff.exe109⤵PID:4524
-
\??\c:\dppdj.exec:\dppdj.exe110⤵PID:1956
-
\??\c:\bntttn.exec:\bntttn.exe111⤵PID:4636
-
\??\c:\flllrrx.exec:\flllrrx.exe112⤵PID:1256
-
\??\c:\ppdjj.exec:\ppdjj.exe113⤵PID:3224
-
\??\c:\htbnbb.exec:\htbnbb.exe114⤵PID:3600
-
\??\c:\rllxxlr.exec:\rllxxlr.exe115⤵PID:3480
-
\??\c:\pvdvj.exec:\pvdvj.exe116⤵PID:3564
-
\??\c:\flflffl.exec:\flflffl.exe117⤵PID:1072
-
\??\c:\jvvjv.exec:\jvvjv.exe118⤵PID:4588
-
\??\c:\bbhhht.exec:\bbhhht.exe119⤵PID:1372
-
\??\c:\xlxfrrl.exec:\xlxfrrl.exe120⤵PID:3608
-
\??\c:\pdvdp.exec:\pdvdp.exe121⤵PID:3120
-
\??\c:\nttttb.exec:\nttttb.exe122⤵PID:4128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-