Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe
Resource
win7-20240903-en
General
-
Target
1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe
-
Size
455KB
-
MD5
665c6c57bec5443dd19c09bf26229498
-
SHA1
2efbb80fd11f945211b97a2dc9e4fe147e0d8bf0
-
SHA256
1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7
-
SHA512
c6337aa319c85ee894bdfa343034236749f55016c9c56a41065b206009c19f657878625bbe37217ef5199479e5190acca199d6a81cebfdfcababf54f78092930
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeR4:q7Tc2NYHUrAwfMp3CDR4
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
Processes:
resource yara_rule behavioral2/memory/3204-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4056-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4948-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3656-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1672-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2136-41-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2044-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2716-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3200-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1700-59-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4092-78-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4864-84-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4484-83-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1220-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3036-121-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4836-120-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1736-188-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2392-192-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1256-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2444-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3168-207-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1460-211-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/452-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4452-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/224-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4940-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2876-248-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2716-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4004-254-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2468-264-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3984-268-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1536-166-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3460-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2248-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4832-278-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4880-312-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4856-319-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2656-331-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1344-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5000-349-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4952-360-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3492-372-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1904-382-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4208-397-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4940-401-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4636-414-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2352-424-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3152-458-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-462-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4880-475-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2656-497-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/8-531-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4544-568-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5068-602-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4480-609-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3588-670-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4288-680-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4420-705-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3712-770-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4600-843-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3492-1819-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3712-1410-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
lflfxxr.exe4882828.exe02882.exe1hbnhb.exevppjj.exeo642288.exe2028884.exerlllfff.exerfxxrlf.exejdjvj.exedpvpd.exe02882.exe26826.exe242060.exe86260.exea2000.exe8422882.exehtbtnh.exedvvpj.exe0222604.exetbhbtt.exe0882624.exennhhbt.exefxffxrx.exefxfflfl.exe22260.exeu682228.exe3pppp.exelfllffl.exelllfrrr.exehnnhbb.exe7ttnbn.exerrllrxf.exelxrxrxr.exe8226060.exedvpjv.exehtbnbb.exenhnhbb.exeq28282.exehtnbnh.exebtttnn.exevvjpv.exe2648602.exebnbhtn.exe484204.exeo286820.exe088426.exe0408260.exe426426.exejppjv.exenhnntn.exe026224.exe0448222.exejvvpd.exeg2808.exelxxrlfx.exexllxlfr.exe3nnbnn.exe08482.exelffllxl.exe04000.exe06488.exefxfxlrr.exea8482.exepid process 4056 lflfxxr.exe 4948 4882828.exe 3656 02882.exe 2716 1hbnhb.exe 1672 vppjj.exe 2136 o642288.exe 3180 2028884.exe 2044 rlllfff.exe 1700 rfxxrlf.exe 3200 jdjvj.exe 3860 dpvpd.exe 4092 02882.exe 4484 26826.exe 4864 242060.exe 4236 86260.exe 2248 a2000.exe 1220 8422882.exe 2676 htbtnh.exe 4836 dvvpj.exe 3036 0222604.exe 2224 tbhbtt.exe 2924 0882624.exe 4776 nnhhbt.exe 2724 fxffxrx.exe 804 fxfflfl.exe 3460 22260.exe 5024 u682228.exe 1536 3pppp.exe 4812 lfllffl.exe 4952 lllfrrr.exe 832 hnnhbb.exe 3640 7ttnbn.exe 1736 rrllrxf.exe 2392 lxrxrxr.exe 1256 8226060.exe 2444 dvpjv.exe 4892 htbnbb.exe 3168 nhnhbb.exe 1460 q28282.exe 1904 htnbnh.exe 3564 btttnn.exe 452 vvjpv.exe 4452 2648602.exe 4332 bnbhtn.exe 2124 484204.exe 224 o286820.exe 4940 088426.exe 1028 0408260.exe 4948 426426.exe 2876 jppjv.exe 2716 nhnntn.exe 4004 026224.exe 1560 0448222.exe 2612 jvvpd.exe 2468 g2808.exe 3984 lxxrlfx.exe 4876 xllxlfr.exe 1320 3nnbnn.exe 4832 08482.exe 4480 lffllxl.exe 1000 04000.exe 3456 06488.exe 2588 fxfxlrr.exe 3932 a8482.exe -
Processes:
resource yara_rule behavioral2/memory/3204-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4056-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4948-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3656-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2136-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2136-41-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2044-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2716-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3200-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1700-59-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4092-78-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4864-84-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4484-83-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2248-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3036-121-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-120-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1736-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2392-192-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1256-196-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2444-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3168-207-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1460-211-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/452-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4452-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/224-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2876-248-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2716-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-254-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2468-264-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3984-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1536-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3460-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2248-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4832-278-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4484-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-319-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2656-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1344-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-349-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4952-360-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3492-372-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1904-382-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-387-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4208-397-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4636-414-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2352-424-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3152-458-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4496-462-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-475-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2656-497-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/8-531-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4544-568-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5068-602-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4480-609-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3588-670-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4288-680-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4420-705-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3712-770-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4600-843-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
k28828.exem6648.exe266602.exes0648.exe2464400.exe84044.exejjpjd.exe420424.exea8482.exevvjjj.exe8422882.exerxrxlfl.exexllxlfr.exe460244.exelxrxrxr.exejdpjv.exe66220.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k28828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m6648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2464400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8422882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrxlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exelflfxxr.exe4882828.exe02882.exe1hbnhb.exevppjj.exeo642288.exe2028884.exerlllfff.exerfxxrlf.exejdjvj.exedpvpd.exe02882.exe26826.exe242060.exe86260.exea2000.exe8422882.exehtbtnh.exedvvpj.exe0222604.exetbhbtt.exedescription pid process target process PID 3204 wrote to memory of 4056 3204 1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe lflfxxr.exe PID 3204 wrote to memory of 4056 3204 1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe lflfxxr.exe PID 3204 wrote to memory of 4056 3204 1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe lflfxxr.exe PID 4056 wrote to memory of 4948 4056 lflfxxr.exe 4882828.exe PID 4056 wrote to memory of 4948 4056 lflfxxr.exe 4882828.exe PID 4056 wrote to memory of 4948 4056 lflfxxr.exe 4882828.exe PID 4948 wrote to memory of 3656 4948 4882828.exe 02882.exe PID 4948 wrote to memory of 3656 4948 4882828.exe 02882.exe PID 4948 wrote to memory of 3656 4948 4882828.exe 02882.exe PID 3656 wrote to memory of 2716 3656 02882.exe nhnntn.exe PID 3656 wrote to memory of 2716 3656 02882.exe nhnntn.exe PID 3656 wrote to memory of 2716 3656 02882.exe nhnntn.exe PID 2716 wrote to memory of 1672 2716 1hbnhb.exe vppjj.exe PID 2716 wrote to memory of 1672 2716 1hbnhb.exe vppjj.exe PID 2716 wrote to memory of 1672 2716 1hbnhb.exe vppjj.exe PID 1672 wrote to memory of 2136 1672 vppjj.exe o642288.exe PID 1672 wrote to memory of 2136 1672 vppjj.exe o642288.exe PID 1672 wrote to memory of 2136 1672 vppjj.exe o642288.exe PID 2136 wrote to memory of 3180 2136 o642288.exe 2028884.exe PID 2136 wrote to memory of 3180 2136 o642288.exe 2028884.exe PID 2136 wrote to memory of 3180 2136 o642288.exe 2028884.exe PID 3180 wrote to memory of 2044 3180 2028884.exe rlllfff.exe PID 3180 wrote to memory of 2044 3180 2028884.exe rlllfff.exe PID 3180 wrote to memory of 2044 3180 2028884.exe rlllfff.exe PID 2044 wrote to memory of 1700 2044 rlllfff.exe rfxxrlf.exe PID 2044 wrote to memory of 1700 2044 rlllfff.exe rfxxrlf.exe PID 2044 wrote to memory of 1700 2044 rlllfff.exe rfxxrlf.exe PID 1700 wrote to memory of 3200 1700 rfxxrlf.exe jdjvj.exe PID 1700 wrote to memory of 3200 1700 rfxxrlf.exe jdjvj.exe PID 1700 wrote to memory of 3200 1700 rfxxrlf.exe jdjvj.exe PID 3200 wrote to memory of 3860 3200 jdjvj.exe dpvpd.exe PID 3200 wrote to memory of 3860 3200 jdjvj.exe dpvpd.exe PID 3200 wrote to memory of 3860 3200 jdjvj.exe dpvpd.exe PID 3860 wrote to memory of 4092 3860 dpvpd.exe 02882.exe PID 3860 wrote to memory of 4092 3860 dpvpd.exe 02882.exe PID 3860 wrote to memory of 4092 3860 dpvpd.exe 02882.exe PID 4092 wrote to memory of 4484 4092 02882.exe 26826.exe PID 4092 wrote to memory of 4484 4092 02882.exe 26826.exe PID 4092 wrote to memory of 4484 4092 02882.exe 26826.exe PID 4484 wrote to memory of 4864 4484 26826.exe 242060.exe PID 4484 wrote to memory of 4864 4484 26826.exe 242060.exe PID 4484 wrote to memory of 4864 4484 26826.exe 242060.exe PID 4864 wrote to memory of 4236 4864 242060.exe 86260.exe PID 4864 wrote to memory of 4236 4864 242060.exe 86260.exe PID 4864 wrote to memory of 4236 4864 242060.exe 86260.exe PID 4236 wrote to memory of 2248 4236 86260.exe a2000.exe PID 4236 wrote to memory of 2248 4236 86260.exe a2000.exe PID 4236 wrote to memory of 2248 4236 86260.exe a2000.exe PID 2248 wrote to memory of 1220 2248 a2000.exe ddvpj.exe PID 2248 wrote to memory of 1220 2248 a2000.exe ddvpj.exe PID 2248 wrote to memory of 1220 2248 a2000.exe ddvpj.exe PID 1220 wrote to memory of 2676 1220 8422882.exe WaaSMedicAgent.exe PID 1220 wrote to memory of 2676 1220 8422882.exe WaaSMedicAgent.exe PID 1220 wrote to memory of 2676 1220 8422882.exe WaaSMedicAgent.exe PID 2676 wrote to memory of 4836 2676 htbtnh.exe dvvpj.exe PID 2676 wrote to memory of 4836 2676 htbtnh.exe dvvpj.exe PID 2676 wrote to memory of 4836 2676 htbtnh.exe dvvpj.exe PID 4836 wrote to memory of 3036 4836 dvvpj.exe 0222604.exe PID 4836 wrote to memory of 3036 4836 dvvpj.exe 0222604.exe PID 4836 wrote to memory of 3036 4836 dvvpj.exe 0222604.exe PID 3036 wrote to memory of 2224 3036 0222604.exe tbhbtt.exe PID 3036 wrote to memory of 2224 3036 0222604.exe tbhbtt.exe PID 3036 wrote to memory of 2224 3036 0222604.exe tbhbtt.exe PID 2224 wrote to memory of 2924 2224 tbhbtt.exe 0882624.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe"C:\Users\Admin\AppData\Local\Temp\1e4e25346db4f4c49c12ef220d57c6d5fce5c4164d396106a2f0cbd44edcd3d7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\lflfxxr.exec:\lflfxxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\4882828.exec:\4882828.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
\??\c:\02882.exec:\02882.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
\??\c:\1hbnhb.exec:\1hbnhb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\vppjj.exec:\vppjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\o642288.exec:\o642288.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\2028884.exec:\2028884.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
\??\c:\rlllfff.exec:\rlllfff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\rfxxrlf.exec:\rfxxrlf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\jdjvj.exec:\jdjvj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\dpvpd.exec:\dpvpd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\02882.exec:\02882.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
\??\c:\26826.exec:\26826.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
\??\c:\242060.exec:\242060.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\86260.exec:\86260.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\a2000.exec:\a2000.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\8422882.exec:\8422882.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\htbtnh.exec:\htbtnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\dvvpj.exec:\dvvpj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\0222604.exec:\0222604.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\tbhbtt.exec:\tbhbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\0882624.exec:\0882624.exe23⤵
- Executes dropped EXE
PID:2924 -
\??\c:\nnhhbt.exec:\nnhhbt.exe24⤵
- Executes dropped EXE
PID:4776 -
\??\c:\fxffxrx.exec:\fxffxrx.exe25⤵
- Executes dropped EXE
PID:2724 -
\??\c:\fxfflfl.exec:\fxfflfl.exe26⤵
- Executes dropped EXE
PID:804 -
\??\c:\22260.exec:\22260.exe27⤵
- Executes dropped EXE
PID:3460 -
\??\c:\u682228.exec:\u682228.exe28⤵
- Executes dropped EXE
PID:5024 -
\??\c:\3pppp.exec:\3pppp.exe29⤵
- Executes dropped EXE
PID:1536 -
\??\c:\lfllffl.exec:\lfllffl.exe30⤵
- Executes dropped EXE
PID:4812 -
\??\c:\lllfrrr.exec:\lllfrrr.exe31⤵
- Executes dropped EXE
PID:4952 -
\??\c:\hnnhbb.exec:\hnnhbb.exe32⤵
- Executes dropped EXE
PID:832 -
\??\c:\7ttnbn.exec:\7ttnbn.exe33⤵
- Executes dropped EXE
PID:3640 -
\??\c:\rrllrxf.exec:\rrllrxf.exe34⤵
- Executes dropped EXE
PID:1736 -
\??\c:\lxrxrxr.exec:\lxrxrxr.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392 -
\??\c:\8226060.exec:\8226060.exe36⤵
- Executes dropped EXE
PID:1256 -
\??\c:\dvpjv.exec:\dvpjv.exe37⤵
- Executes dropped EXE
PID:2444 -
\??\c:\htbnbb.exec:\htbnbb.exe38⤵
- Executes dropped EXE
PID:4892 -
\??\c:\nhnhbb.exec:\nhnhbb.exe39⤵
- Executes dropped EXE
PID:3168 -
\??\c:\q28282.exec:\q28282.exe40⤵
- Executes dropped EXE
PID:1460 -
\??\c:\htnbnh.exec:\htnbnh.exe41⤵
- Executes dropped EXE
PID:1904 -
\??\c:\btttnn.exec:\btttnn.exe42⤵
- Executes dropped EXE
PID:3564 -
\??\c:\vvjpv.exec:\vvjpv.exe43⤵
- Executes dropped EXE
PID:452 -
\??\c:\2648602.exec:\2648602.exe44⤵
- Executes dropped EXE
PID:4452 -
\??\c:\bnbhtn.exec:\bnbhtn.exe45⤵
- Executes dropped EXE
PID:4332 -
\??\c:\484204.exec:\484204.exe46⤵
- Executes dropped EXE
PID:2124 -
\??\c:\o286820.exec:\o286820.exe47⤵
- Executes dropped EXE
PID:224 -
\??\c:\088426.exec:\088426.exe48⤵
- Executes dropped EXE
PID:4940 -
\??\c:\0408260.exec:\0408260.exe49⤵
- Executes dropped EXE
PID:1028 -
\??\c:\426426.exec:\426426.exe50⤵
- Executes dropped EXE
PID:4948 -
\??\c:\jppjv.exec:\jppjv.exe51⤵
- Executes dropped EXE
PID:2876 -
\??\c:\nhnntn.exec:\nhnntn.exe52⤵
- Executes dropped EXE
PID:2716 -
\??\c:\026224.exec:\026224.exe53⤵
- Executes dropped EXE
PID:4004 -
\??\c:\0448222.exec:\0448222.exe54⤵
- Executes dropped EXE
PID:1560 -
\??\c:\jvvpd.exec:\jvvpd.exe55⤵
- Executes dropped EXE
PID:2612 -
\??\c:\g2808.exec:\g2808.exe56⤵
- Executes dropped EXE
PID:2468 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe57⤵
- Executes dropped EXE
PID:3984 -
\??\c:\xllxlfr.exec:\xllxlfr.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4876 -
\??\c:\3nnbnn.exec:\3nnbnn.exe59⤵
- Executes dropped EXE
PID:1320 -
\??\c:\08482.exec:\08482.exe60⤵
- Executes dropped EXE
PID:4832 -
\??\c:\lffllxl.exec:\lffllxl.exe61⤵
- Executes dropped EXE
PID:4480 -
\??\c:\04000.exec:\04000.exe62⤵
- Executes dropped EXE
PID:1000 -
\??\c:\06488.exec:\06488.exe63⤵
- Executes dropped EXE
PID:3456 -
\??\c:\fxfxlrr.exec:\fxfxlrr.exe64⤵
- Executes dropped EXE
PID:2588 -
\??\c:\a8482.exec:\a8482.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3932 -
\??\c:\9nbnbn.exec:\9nbnbn.exe66⤵PID:1556
-
\??\c:\00226.exec:\00226.exe67⤵PID:2776
-
\??\c:\dppjd.exec:\dppjd.exe68⤵PID:3896
-
\??\c:\vddpd.exec:\vddpd.exe69⤵PID:1092
-
\??\c:\ddvpj.exec:\ddvpj.exe70⤵PID:1220
-
\??\c:\jdpjv.exec:\jdpjv.exe71⤵
- System Location Discovery: System Language Discovery
PID:4880 -
\??\c:\3rxxfrr.exec:\3rxxfrr.exe72⤵PID:1180
-
\??\c:\8660482.exec:\8660482.exe73⤵PID:4856
-
\??\c:\2000826.exec:\2000826.exe74⤵PID:380
-
\??\c:\44486.exec:\44486.exe75⤵PID:3032
-
\??\c:\244422.exec:\244422.exe76⤵PID:3980
-
\??\c:\fllfxxr.exec:\fllfxxr.exe77⤵PID:4148
-
\??\c:\6022806.exec:\6022806.exe78⤵PID:2656
-
\??\c:\028820.exec:\028820.exe79⤵PID:4916
-
\??\c:\xrlxxlf.exec:\xrlxxlf.exe80⤵PID:1344
-
\??\c:\vppdp.exec:\vppdp.exe81⤵PID:4256
-
\??\c:\jjpdp.exec:\jjpdp.exe82⤵PID:5000
-
\??\c:\64086.exec:\64086.exe83⤵PID:1844
-
\??\c:\6626488.exec:\6626488.exe84⤵PID:4260
-
\??\c:\g0642.exec:\g0642.exe85⤵PID:4952
-
\??\c:\5xlxlfr.exec:\5xlxlfr.exe86⤵PID:832
-
\??\c:\jjpjd.exec:\jjpjd.exe87⤵
- System Location Discovery: System Language Discovery
PID:3640 -
\??\c:\k62026.exec:\k62026.exe88⤵PID:876
-
\??\c:\0820242.exec:\0820242.exe89⤵PID:3492
-
\??\c:\4060820.exec:\4060820.exe90⤵PID:4204
-
\??\c:\224204.exec:\224204.exe91⤵PID:3804
-
\??\c:\228204.exec:\228204.exe92⤵PID:1904
-
\??\c:\84086.exec:\84086.exe93⤵PID:3132
-
\??\c:\64426.exec:\64426.exe94⤵PID:1896
-
\??\c:\8808640.exec:\8808640.exe95⤵PID:2872
-
\??\c:\6244884.exec:\6244884.exe96⤵PID:2584
-
\??\c:\g8026.exec:\g8026.exe97⤵PID:4208
-
\??\c:\vpvpj.exec:\vpvpj.exe98⤵PID:4940
-
\??\c:\vpvvp.exec:\vpvvp.exe99⤵PID:4416
-
\??\c:\7llfffx.exec:\7llfffx.exe100⤵PID:348
-
\??\c:\dpddp.exec:\dpddp.exe101⤵PID:4608
-
\??\c:\hbhhhh.exec:\hbhhhh.exe102⤵PID:4636
-
\??\c:\2004448.exec:\2004448.exe103⤵PID:2176
-
\??\c:\228828.exec:\228828.exe104⤵PID:116
-
\??\c:\3pvpj.exec:\3pvpj.exe105⤵PID:2352
-
\??\c:\888604.exec:\888604.exe106⤵PID:3244
-
\??\c:\lxfxllx.exec:\lxfxllx.exe107⤵PID:1968
-
\??\c:\8680844.exec:\8680844.exe108⤵PID:2284
-
\??\c:\200482.exec:\200482.exe109⤵PID:4224
-
\??\c:\hnbbnt.exec:\hnbbnt.exe110⤵PID:2244
-
\??\c:\w00204.exec:\w00204.exe111⤵PID:4480
-
\??\c:\662044.exec:\662044.exe112⤵PID:1000
-
\??\c:\246028.exec:\246028.exe113⤵PID:2992
-
\??\c:\jppdp.exec:\jppdp.exe114⤵PID:2588
-
\??\c:\9nnhhh.exec:\9nnhhh.exe115⤵PID:3104
-
\??\c:\s4826.exec:\s4826.exe116⤵PID:3152
-
\??\c:\680204.exec:\680204.exe117⤵PID:4496
-
\??\c:\nbnnbt.exec:\nbnnbt.exe118⤵PID:3896
-
\??\c:\lffrlfx.exec:\lffrlfx.exe119⤵PID:3436
-
\??\c:\822262.exec:\822262.exe120⤵PID:440
-
\??\c:\jvpdv.exec:\jvpdv.exe121⤵PID:4880
-
\??\c:\3xrrlfr.exec:\3xrrlfr.exe122⤵PID:1180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-