Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe
Resource
win7-20241023-en
7 signatures
120 seconds
General
-
Target
d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe
-
Size
453KB
-
MD5
fb4503b07f4cf2e3daddf1e1091a78ed
-
SHA1
a8871af6f317601ada255c5ae0d5a74e5cb60641
-
SHA256
d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4
-
SHA512
cc5ca8d73ab7de160fd659935d7c65dfe832d7b86d8bc1bd8602228d2dbb41358ba2fa48dc23029a7f01377635248bc5cecd51f1b62545fbbdd2d2198522d363
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbet:q7Tc2NYHUrAwfMp3CDt
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2016-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4516-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3600-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1388-21-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3492-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4564-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3904-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1548-50-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3592-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3224-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2080-72-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/740-67-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/748-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/800-81-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4392-107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/776-102-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2348-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4608-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4300-120-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2044-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3912-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3932-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/60-163-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4776-170-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4020-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1524-186-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/456-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3388-194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1844-201-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1312-211-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2244-215-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2240-219-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4028-227-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4432-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2896-235-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2420-236-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1472-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2424-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1152-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2856-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/512-271-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2828-277-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2168-289-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/368-314-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2044-321-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/764-331-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1924-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3972-388-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4888-401-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4864-408-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4156-418-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4548-422-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4844-453-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2052-469-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3476-488-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2032-519-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2132-529-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/868-548-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1140-720-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2588-835-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2092-860-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1100-915-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4068-1087-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1196-1939-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4564 fxrfrxx.exe 1388 vvvvv.exe 3492 llrfxff.exe 3600 thnbnb.exe 4516 jdddp.exe 3904 lxlllrx.exe 1548 vddvp.exe 3592 bbbhth.exe 3224 jjvdj.exe 740 xxxflrx.exe 2080 tbhttb.exe 800 lxxfxff.exe 748 pdpdd.exe 4608 htnnnh.exe 2348 llxxrfr.exe 776 ntbbnt.exe 4392 lrlrllr.exe 5036 nhhhbn.exe 4300 rrrrrrr.exe 2044 fxrrlll.exe 2068 jpvjd.exe 2208 nbntnt.exe 3912 pvvdd.exe 3168 ttnbnb.exe 4068 ddvjj.exe 3932 7bbhhn.exe 60 fflffff.exe 4776 xrffxxf.exe 2156 hhhhbb.exe 4020 nnttbt.exe 1524 hbbhtb.exe 456 rlfrrll.exe 3388 jvddp.exe 3660 xfrrlxx.exe 1844 nhhbtt.exe 2756 dpjdd.exe 5004 frrlfrl.exe 1312 vjjdj.exe 2244 xxrrflx.exe 2240 hhntnt.exe 4032 jvjdd.exe 4028 lfffrxf.exe 4432 bnnhht.exe 2896 thhbbb.exe 2420 pdvvp.exe 1472 fllxrll.exe 2424 nhhhnt.exe 3504 jpvdj.exe 1152 lllllff.exe 4268 ffffrxr.exe 4100 dpvvv.exe 2856 jjvdd.exe 1548 rllxlxr.exe 4340 pdpjj.exe 2780 ppdjj.exe 512 fllxxff.exe 2828 7nbbbh.exe 3012 pjjdd.exe 1940 xrlrflf.exe 2984 httbht.exe 2168 ddvvv.exe 5068 frllxxl.exe 3132 hnbtnt.exe 4608 vjvvv.exe -
resource yara_rule behavioral2/memory/2016-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4516-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3600-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1388-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3492-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1388-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4564-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3904-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3592-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1548-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3592-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3224-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2080-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-67-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/748-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/800-81-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4392-107-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/776-102-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2348-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4608-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4300-120-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2044-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3912-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3932-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/60-163-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4776-170-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4020-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1524-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3388-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1844-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1312-211-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2244-215-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2240-219-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3388-226-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-227-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4432-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2896-235-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2420-236-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1472-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2424-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1152-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2856-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/512-271-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2828-277-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2168-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/368-314-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2044-321-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/764-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1272-334-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1924-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3972-388-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4888-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4864-408-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4156-418-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4548-422-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4844-453-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2052-469-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3476-488-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2032-519-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-529-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/868-548-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1140-720-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lxrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrffrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrlrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9httnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4564 2016 d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe 83 PID 2016 wrote to memory of 4564 2016 d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe 83 PID 2016 wrote to memory of 4564 2016 d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe 83 PID 4564 wrote to memory of 1388 4564 fxrfrxx.exe 84 PID 4564 wrote to memory of 1388 4564 fxrfrxx.exe 84 PID 4564 wrote to memory of 1388 4564 fxrfrxx.exe 84 PID 1388 wrote to memory of 3492 1388 vvvvv.exe 85 PID 1388 wrote to memory of 3492 1388 vvvvv.exe 85 PID 1388 wrote to memory of 3492 1388 vvvvv.exe 85 PID 3492 wrote to memory of 3600 3492 llrfxff.exe 86 PID 3492 wrote to memory of 3600 3492 llrfxff.exe 86 PID 3492 wrote to memory of 3600 3492 llrfxff.exe 86 PID 3600 wrote to memory of 4516 3600 thnbnb.exe 87 PID 3600 wrote to memory of 4516 3600 thnbnb.exe 87 PID 3600 wrote to memory of 4516 3600 thnbnb.exe 87 PID 4516 wrote to memory of 3904 4516 jdddp.exe 88 PID 4516 wrote to memory of 3904 4516 jdddp.exe 88 PID 4516 wrote to memory of 3904 4516 jdddp.exe 88 PID 3904 wrote to memory of 1548 3904 lxlllrx.exe 89 PID 3904 wrote to memory of 1548 3904 lxlllrx.exe 89 PID 3904 wrote to memory of 1548 3904 lxlllrx.exe 89 PID 1548 wrote to memory of 3592 1548 vddvp.exe 91 PID 1548 wrote to memory of 3592 1548 vddvp.exe 91 PID 1548 wrote to memory of 3592 1548 vddvp.exe 91 PID 3592 wrote to memory of 3224 3592 bbbhth.exe 92 PID 3592 wrote to memory of 3224 3592 bbbhth.exe 92 PID 3592 wrote to memory of 3224 3592 bbbhth.exe 92 PID 3224 wrote to memory of 740 3224 jjvdj.exe 93 PID 3224 wrote to memory of 740 3224 jjvdj.exe 93 PID 3224 wrote to memory of 740 3224 jjvdj.exe 93 PID 740 wrote to memory of 2080 740 xxxflrx.exe 94 PID 740 wrote to memory of 2080 740 xxxflrx.exe 94 PID 740 wrote to memory of 2080 740 xxxflrx.exe 94 PID 2080 wrote to memory of 800 2080 tbhttb.exe 95 PID 2080 wrote to memory of 800 2080 tbhttb.exe 95 PID 2080 wrote to memory of 800 2080 tbhttb.exe 95 PID 800 wrote to memory of 748 800 lxxfxff.exe 96 PID 800 wrote to memory of 748 800 lxxfxff.exe 96 PID 800 wrote to memory of 748 800 lxxfxff.exe 96 PID 748 wrote to memory of 4608 748 pdpdd.exe 97 PID 748 wrote to memory of 4608 748 pdpdd.exe 97 PID 748 wrote to memory of 4608 748 pdpdd.exe 97 PID 4608 wrote to memory of 2348 4608 htnnnh.exe 98 PID 4608 wrote to memory of 2348 4608 htnnnh.exe 98 PID 4608 wrote to memory of 2348 4608 htnnnh.exe 98 PID 2348 wrote to memory of 776 2348 llxxrfr.exe 99 PID 2348 wrote to memory of 776 2348 llxxrfr.exe 99 PID 2348 wrote to memory of 776 2348 llxxrfr.exe 99 PID 776 wrote to memory of 4392 776 ntbbnt.exe 100 PID 776 wrote to memory of 4392 776 ntbbnt.exe 100 PID 776 wrote to memory of 4392 776 ntbbnt.exe 100 PID 4392 wrote to memory of 5036 4392 lrlrllr.exe 101 PID 4392 wrote to memory of 5036 4392 lrlrllr.exe 101 PID 4392 wrote to memory of 5036 4392 lrlrllr.exe 101 PID 5036 wrote to memory of 4300 5036 nhhhbn.exe 103 PID 5036 wrote to memory of 4300 5036 nhhhbn.exe 103 PID 5036 wrote to memory of 4300 5036 nhhhbn.exe 103 PID 4300 wrote to memory of 2044 4300 rrrrrrr.exe 104 PID 4300 wrote to memory of 2044 4300 rrrrrrr.exe 104 PID 4300 wrote to memory of 2044 4300 rrrrrrr.exe 104 PID 2044 wrote to memory of 2068 2044 fxrrlll.exe 105 PID 2044 wrote to memory of 2068 2044 fxrrlll.exe 105 PID 2044 wrote to memory of 2068 2044 fxrrlll.exe 105 PID 2068 wrote to memory of 2208 2068 jpvjd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe"C:\Users\Admin\AppData\Local\Temp\d2b169163c395f2e3302d9dec10b9bc34cfadbd911f2601b69271ae52d67beb4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\fxrfrxx.exec:\fxrfrxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\vvvvv.exec:\vvvvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\llrfxff.exec:\llrfxff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
\??\c:\thnbnb.exec:\thnbnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
\??\c:\jdddp.exec:\jdddp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\lxlllrx.exec:\lxlllrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
\??\c:\vddvp.exec:\vddvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\bbbhth.exec:\bbbhth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
\??\c:\jjvdj.exec:\jjvdj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
\??\c:\xxxflrx.exec:\xxxflrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\tbhttb.exec:\tbhttb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\lxxfxff.exec:\lxxfxff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
\??\c:\pdpdd.exec:\pdpdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\htnnnh.exec:\htnnnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
\??\c:\llxxrfr.exec:\llxxrfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\ntbbnt.exec:\ntbbnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\lrlrllr.exec:\lrlrllr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\nhhhbn.exec:\nhhhbn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
\??\c:\rrrrrrr.exec:\rrrrrrr.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\fxrrlll.exec:\fxrrlll.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\jpvjd.exec:\jpvjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\nbntnt.exec:\nbntnt.exe23⤵
- Executes dropped EXE
PID:2208 -
\??\c:\pvvdd.exec:\pvvdd.exe24⤵
- Executes dropped EXE
PID:3912 -
\??\c:\ttnbnb.exec:\ttnbnb.exe25⤵
- Executes dropped EXE
PID:3168 -
\??\c:\ddvjj.exec:\ddvjj.exe26⤵
- Executes dropped EXE
PID:4068 -
\??\c:\7bbhhn.exec:\7bbhhn.exe27⤵
- Executes dropped EXE
PID:3932 -
\??\c:\fflffff.exec:\fflffff.exe28⤵
- Executes dropped EXE
PID:60 -
\??\c:\xrffxxf.exec:\xrffxxf.exe29⤵
- Executes dropped EXE
PID:4776 -
\??\c:\hhhhbb.exec:\hhhhbb.exe30⤵
- Executes dropped EXE
PID:2156 -
\??\c:\nnttbt.exec:\nnttbt.exe31⤵
- Executes dropped EXE
PID:4020 -
\??\c:\hbbhtb.exec:\hbbhtb.exe32⤵
- Executes dropped EXE
PID:1524 -
\??\c:\rlfrrll.exec:\rlfrrll.exe33⤵
- Executes dropped EXE
PID:456 -
\??\c:\jvddp.exec:\jvddp.exe34⤵
- Executes dropped EXE
PID:3388 -
\??\c:\xfrrlxx.exec:\xfrrlxx.exe35⤵
- Executes dropped EXE
PID:3660 -
\??\c:\nhhbtt.exec:\nhhbtt.exe36⤵
- Executes dropped EXE
PID:1844 -
\??\c:\dpjdd.exec:\dpjdd.exe37⤵
- Executes dropped EXE
PID:2756 -
\??\c:\frrlfrl.exec:\frrlfrl.exe38⤵
- Executes dropped EXE
PID:5004 -
\??\c:\vjjdj.exec:\vjjdj.exe39⤵
- Executes dropped EXE
PID:1312 -
\??\c:\xxrrflx.exec:\xxrrflx.exe40⤵
- Executes dropped EXE
PID:2244 -
\??\c:\hhntnt.exec:\hhntnt.exe41⤵
- Executes dropped EXE
PID:2240 -
\??\c:\jvjdd.exec:\jvjdd.exe42⤵
- Executes dropped EXE
PID:4032 -
\??\c:\lfffrxf.exec:\lfffrxf.exe43⤵
- Executes dropped EXE
PID:4028 -
\??\c:\bnnhht.exec:\bnnhht.exe44⤵
- Executes dropped EXE
PID:4432 -
\??\c:\thhbbb.exec:\thhbbb.exe45⤵
- Executes dropped EXE
PID:2896 -
\??\c:\pdvvp.exec:\pdvvp.exe46⤵
- Executes dropped EXE
PID:2420 -
\??\c:\fllxrll.exec:\fllxrll.exe47⤵
- Executes dropped EXE
PID:1472 -
\??\c:\nhhhnt.exec:\nhhhnt.exe48⤵
- Executes dropped EXE
PID:2424 -
\??\c:\jpvdj.exec:\jpvdj.exe49⤵
- Executes dropped EXE
PID:3504 -
\??\c:\lllllff.exec:\lllllff.exe50⤵
- Executes dropped EXE
PID:1152 -
\??\c:\ffffrxr.exec:\ffffrxr.exe51⤵
- Executes dropped EXE
PID:4268 -
\??\c:\dpvvv.exec:\dpvvv.exe52⤵
- Executes dropped EXE
PID:4100 -
\??\c:\jjvdd.exec:\jjvdd.exe53⤵
- Executes dropped EXE
PID:2856 -
\??\c:\rllxlxr.exec:\rllxlxr.exe54⤵
- Executes dropped EXE
PID:1548 -
\??\c:\pdpjj.exec:\pdpjj.exe55⤵
- Executes dropped EXE
PID:4340 -
\??\c:\ppdjj.exec:\ppdjj.exe56⤵
- Executes dropped EXE
PID:2780 -
\??\c:\fllxxff.exec:\fllxxff.exe57⤵
- Executes dropped EXE
PID:512 -
\??\c:\7nbbbh.exec:\7nbbbh.exe58⤵
- Executes dropped EXE
PID:2828 -
\??\c:\pjjdd.exec:\pjjdd.exe59⤵
- Executes dropped EXE
PID:3012 -
\??\c:\xrlrflf.exec:\xrlrflf.exe60⤵
- Executes dropped EXE
PID:1940 -
\??\c:\httbht.exec:\httbht.exe61⤵
- Executes dropped EXE
PID:2984 -
\??\c:\ddvvv.exec:\ddvvv.exe62⤵
- Executes dropped EXE
PID:2168 -
\??\c:\frllxxl.exec:\frllxxl.exe63⤵
- Executes dropped EXE
PID:5068 -
\??\c:\hnbtnt.exec:\hnbtnt.exe64⤵
- Executes dropped EXE
PID:3132 -
\??\c:\vjvvv.exec:\vjvvv.exe65⤵
- Executes dropped EXE
PID:4608 -
\??\c:\xxrrlll.exec:\xxrrlll.exe66⤵PID:1236
-
\??\c:\1nhnbn.exec:\1nhnbn.exe67⤵PID:3408
-
\??\c:\vvjpj.exec:\vvjpj.exe68⤵PID:3260
-
\??\c:\xxrllrx.exec:\xxrllrx.exe69⤵PID:4976
-
\??\c:\vvjjp.exec:\vvjjp.exe70⤵PID:368
-
\??\c:\llfrlrl.exec:\llfrlrl.exe71⤵PID:4000
-
\??\c:\tttthh.exec:\tttthh.exe72⤵PID:2044
-
\??\c:\pjvvd.exec:\pjvvd.exe73⤵PID:4596
-
\??\c:\xrfffff.exec:\xrfffff.exe74⤵PID:2596
-
\??\c:\bnthht.exec:\bnthht.exe75⤵PID:764
-
\??\c:\pdppp.exec:\pdppp.exe76⤵PID:116
-
\??\c:\lxxrffx.exec:\lxxrffx.exe77⤵PID:1272
-
\??\c:\tthntb.exec:\tthntb.exe78⤵PID:1924
-
\??\c:\vvjpp.exec:\vvjpp.exe79⤵PID:3176
-
\??\c:\xxfxlrx.exec:\xxfxlrx.exe80⤵PID:3148
-
\??\c:\bbhbtt.exec:\bbhbtt.exe81⤵PID:2140
-
\??\c:\vvdvv.exec:\vvdvv.exe82⤵PID:2376
-
\??\c:\pjdpd.exec:\pjdpd.exe83⤵PID:4148
-
\??\c:\nbntnb.exec:\nbntnb.exe84⤵PID:5060
-
\??\c:\dpppp.exec:\dpppp.exe85⤵PID:1084
-
\??\c:\lrlrlff.exec:\lrlrlff.exe86⤵PID:4044
-
\??\c:\ntnhtb.exec:\ntnhtb.exe87⤵PID:4164
-
\??\c:\pdvpv.exec:\pdvpv.exe88⤵PID:1812
-
\??\c:\rllrxlr.exec:\rllrxlr.exe89⤵PID:1468
-
\??\c:\hnttbb.exec:\hnttbb.exe90⤵PID:440
-
\??\c:\frxxrfx.exec:\frxxrfx.exe91⤵PID:3348
-
\??\c:\hbnhnh.exec:\hbnhnh.exe92⤵PID:2056
-
\??\c:\dvdjj.exec:\dvdjj.exe93⤵PID:3972
-
\??\c:\xlfrlfr.exec:\xlfrlfr.exe94⤵PID:392
-
\??\c:\hnbbnn.exec:\hnbbnn.exe95⤵PID:4552
-
\??\c:\pjvdv.exec:\pjvdv.exe96⤵PID:2388
-
\??\c:\lrlrfxl.exec:\lrlrfxl.exe97⤵PID:4888
-
\??\c:\nbttnt.exec:\nbttnt.exe98⤵PID:2200
-
\??\c:\lllxxrl.exec:\lllxxrl.exe99⤵PID:4864
-
\??\c:\xrxflfx.exec:\xrxflfx.exe100⤵PID:3004
-
\??\c:\9vpjd.exec:\9vpjd.exe101⤵PID:4964
-
\??\c:\xfrllll.exec:\xfrllll.exe102⤵PID:4156
-
\??\c:\thbhnh.exec:\thbhnh.exe103⤵PID:4548
-
\??\c:\fxffffx.exec:\fxffffx.exe104⤵PID:2816
-
\??\c:\nhbhhn.exec:\nhbhhn.exe105⤵PID:4992
-
\??\c:\jjdjv.exec:\jjdjv.exe106⤵PID:2028
-
\??\c:\rxrrflf.exec:\rxrrflf.exe107⤵PID:2804
-
\??\c:\bbhnnn.exec:\bbhnnn.exe108⤵PID:436
-
\??\c:\vjddv.exec:\vjddv.exe109⤵PID:5064
-
\??\c:\lfxlxlf.exec:\lfxlxlf.exe110⤵PID:4036
-
\??\c:\btbtbn.exec:\btbtbn.exe111⤵PID:3940
-
\??\c:\djppv.exec:\djppv.exe112⤵PID:3836
-
\??\c:\9flrxll.exec:\9flrxll.exe113⤵PID:4844
-
\??\c:\bhnbbn.exec:\bhnbbn.exe114⤵PID:2868
-
\??\c:\jpvvd.exec:\jpvvd.exe115⤵PID:4092
-
\??\c:\flxrxlx.exec:\flxrxlx.exe116⤵PID:1076
-
\??\c:\nhhbnt.exec:\nhhbnt.exe117⤵PID:1876
-
\??\c:\jdpvd.exec:\jdpvd.exe118⤵PID:2052
-
\??\c:\lfflfll.exec:\lfflfll.exe119⤵PID:3896
-
\??\c:\bnbbht.exec:\bnbbht.exe120⤵PID:1104
-
\??\c:\llfffxx.exec:\llfffxx.exe121⤵PID:4172
-
\??\c:\rrxrxlr.exec:\rrxrxlr.exe122⤵PID:452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-