Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 23:21
Behavioral task
behavioral1
Sample
0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe
-
Size
67KB
-
MD5
28ad9528f44fa7bab934285e87902d36
-
SHA1
dedf3f6bbf4f8a22e3f22d1dbc907e8c5ac9b507
-
SHA256
0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114
-
SHA512
db7a264c5e7aed2aed140d38b30e8a8720ccda8e781ee196598533302436f507b8fe3f20a230d3ed6e3bcf6b895e825de9ba919c7e674d44ec5091ce970bb652
-
SSDEEP
1536:vvQBeOGtrYS3srx93UBWfwC6Ggnouy8TeRkuCwS:vhOmTsF93UYfwC6GIoutCRrS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 55 IoCs
resource yara_rule behavioral1/memory/2312-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3048-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2328-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2640-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2840-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2860-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2744-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1876-110-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2084-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/996-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1992-135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1804-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1988-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-161-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2424-159-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2176-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1788-207-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/852-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/852-200-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/2588-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2496-243-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2304-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2988-257-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2988-255-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2304-266-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/3048-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2408-314-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2756-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2520-321-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2240-337-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2632-351-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/1948-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1864-388-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/572-389-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/572-395-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2000-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1856-448-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2956-461-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1368-506-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1776-513-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1352-533-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1588-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2712-608-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2832-622-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2728-667-0x00000000005C0000-0x00000000005E7000-memory.dmp family_blackmoon behavioral1/memory/592-671-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2676-678-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/1716-685-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1984-722-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1620-778-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/3028-806-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2552-822-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2316-909-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2312 08624.exe 1972 q64460.exe 2328 826284.exe 2752 5hbbnh.exe 2860 nhtntt.exe 2840 xlffrxf.exe 2640 bbbhbh.exe 2744 664226.exe 2600 vvvjj.exe 996 g4680.exe 2084 22288.exe 1876 xrlllrx.exe 1908 4280284.exe 264 48646.exe 1992 rflrfxf.exe 1804 pjvvd.exe 2424 hbtbnb.exe 1988 3vdjp.exe 2708 c006828.exe 2176 7xxlrxr.exe 852 24066.exe 1788 9bttbb.exe 1296 e08420.exe 2588 pjdjv.exe 1104 420466.exe 2496 206866.exe 2988 7nbhtb.exe 2304 dvpvj.exe 2140 4868406.exe 2400 9vpvp.exe 3048 4246662.exe 2060 028800.exe 2172 dvdjd.exe 2408 9pddd.exe 2520 btbhnt.exe 2756 006662.exe 2884 nhnnnt.exe 2240 26406.exe 2724 868884.exe 2632 0446022.exe 304 82086.exe 1948 66208.exe 2720 lxfrxrx.exe 2728 60862.exe 1864 3fxrrfx.exe 572 084682.exe 2592 48642.exe 588 5llrllf.exe 1084 26468.exe 1488 jddvd.exe 2808 ttbbtt.exe 2356 66688.exe 2000 vvpvd.exe 1856 4008622.exe 2976 dvjpj.exe 2956 ffxffxf.exe 2188 jdjjp.exe 2360 26464.exe 2412 042844.exe 2456 3rlrxlr.exe 2784 0466440.exe 3020 6024624.exe 1368 rlfxllr.exe 1776 9vddp.exe -
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00080000000120f9-9.dat upx behavioral1/memory/2312-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2312-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3048-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016141-21.dat upx behavioral1/memory/1972-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00080000000162e4-28.dat upx behavioral1/memory/2752-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016399-38.dat upx behavioral1/memory/2328-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2640-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016b86-65.dat upx behavioral1/memory/2840-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2860-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00080000000164de-47.dat upx behavioral1/files/0x0008000000016689-56.dat upx behavioral1/memory/2744-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016c89-74.dat upx behavioral1/files/0x00060000000175f1-118.dat upx behavioral1/memory/1876-110-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017570-109.dat upx behavioral1/memory/2084-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00060000000174f8-100.dat upx behavioral1/files/0x0007000000016ca0-83.dat upx behavioral1/memory/996-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016cf0-91.dat upx behavioral1/files/0x00060000000175f7-125.dat upx behavioral1/memory/1992-135-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000d000000018683-134.dat upx behavioral1/files/0x0005000000018697-143.dat upx behavioral1/memory/1804-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018706-151.dat upx behavioral1/memory/2424-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001871c-173.dat upx behavioral1/memory/1988-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001870c-164.dat upx behavioral1/memory/1988-163-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2176-185-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/2176-183-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018745-181.dat upx behavioral1/files/0x0006000000018be7-190.dat upx behavioral1/memory/852-191-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018d7b-204.dat upx behavioral1/memory/1788-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/852-202-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018d83-213.dat upx behavioral1/memory/2588-224-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018fdf-223.dat upx behavioral1/files/0x0006000000019056-232.dat upx behavioral1/files/0x0005000000019203-239.dat upx behavioral1/memory/2496-243-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0005000000019237-247.dat upx behavioral1/files/0x0008000000015fa6-259.dat upx behavioral1/memory/2304-261-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001924f-268.dat upx behavioral1/files/0x0005000000019261-277.dat upx behavioral1/files/0x0005000000019274-284.dat upx behavioral1/files/0x000500000001927a-294.dat upx behavioral1/memory/3048-292-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2408-314-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/2756-322-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2520-321-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2240-337-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2284262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xxlrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0840662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 008044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rrlxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tthnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6084628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2312 3048 0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe 30 PID 3048 wrote to memory of 2312 3048 0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe 30 PID 3048 wrote to memory of 2312 3048 0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe 30 PID 3048 wrote to memory of 2312 3048 0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe 30 PID 2312 wrote to memory of 1972 2312 08624.exe 31 PID 2312 wrote to memory of 1972 2312 08624.exe 31 PID 2312 wrote to memory of 1972 2312 08624.exe 31 PID 2312 wrote to memory of 1972 2312 08624.exe 31 PID 1972 wrote to memory of 2328 1972 q64460.exe 32 PID 1972 wrote to memory of 2328 1972 q64460.exe 32 PID 1972 wrote to memory of 2328 1972 q64460.exe 32 PID 1972 wrote to memory of 2328 1972 q64460.exe 32 PID 2328 wrote to memory of 2752 2328 826284.exe 33 PID 2328 wrote to memory of 2752 2328 826284.exe 33 PID 2328 wrote to memory of 2752 2328 826284.exe 33 PID 2328 wrote to memory of 2752 2328 826284.exe 33 PID 2752 wrote to memory of 2860 2752 5hbbnh.exe 34 PID 2752 wrote to memory of 2860 2752 5hbbnh.exe 34 PID 2752 wrote to memory of 2860 2752 5hbbnh.exe 34 PID 2752 wrote to memory of 2860 2752 5hbbnh.exe 34 PID 2860 wrote to memory of 2840 2860 nhtntt.exe 35 PID 2860 wrote to memory of 2840 2860 nhtntt.exe 35 PID 2860 wrote to memory of 2840 2860 nhtntt.exe 35 PID 2860 wrote to memory of 2840 2860 nhtntt.exe 35 PID 2840 wrote to memory of 2640 2840 xlffrxf.exe 36 PID 2840 wrote to memory of 2640 2840 xlffrxf.exe 36 PID 2840 wrote to memory of 2640 2840 xlffrxf.exe 36 PID 2840 wrote to memory of 2640 2840 xlffrxf.exe 36 PID 2640 wrote to memory of 2744 2640 bbbhbh.exe 37 PID 2640 wrote to memory of 2744 2640 bbbhbh.exe 37 PID 2640 wrote to memory of 2744 2640 bbbhbh.exe 37 PID 2640 wrote to memory of 2744 2640 bbbhbh.exe 37 PID 2744 wrote to memory of 2600 2744 664226.exe 38 PID 2744 wrote to memory of 2600 2744 664226.exe 38 PID 2744 wrote to memory of 2600 2744 664226.exe 38 PID 2744 wrote to memory of 2600 2744 664226.exe 38 PID 2600 wrote to memory of 996 2600 vvvjj.exe 39 PID 2600 wrote to memory of 996 2600 vvvjj.exe 39 PID 2600 wrote to memory of 996 2600 vvvjj.exe 39 PID 2600 wrote to memory of 996 2600 vvvjj.exe 39 PID 996 wrote to memory of 2084 996 g4680.exe 40 PID 996 wrote to memory of 2084 996 g4680.exe 40 PID 996 wrote to memory of 2084 996 g4680.exe 40 PID 996 wrote to memory of 2084 996 g4680.exe 40 PID 2084 wrote to memory of 1876 2084 22288.exe 41 PID 2084 wrote to memory of 1876 2084 22288.exe 41 PID 2084 wrote to memory of 1876 2084 22288.exe 41 PID 2084 wrote to memory of 1876 2084 22288.exe 41 PID 1876 wrote to memory of 1908 1876 xrlllrx.exe 42 PID 1876 wrote to memory of 1908 1876 xrlllrx.exe 42 PID 1876 wrote to memory of 1908 1876 xrlllrx.exe 42 PID 1876 wrote to memory of 1908 1876 xrlllrx.exe 42 PID 1908 wrote to memory of 264 1908 4280284.exe 43 PID 1908 wrote to memory of 264 1908 4280284.exe 43 PID 1908 wrote to memory of 264 1908 4280284.exe 43 PID 1908 wrote to memory of 264 1908 4280284.exe 43 PID 264 wrote to memory of 1992 264 48646.exe 44 PID 264 wrote to memory of 1992 264 48646.exe 44 PID 264 wrote to memory of 1992 264 48646.exe 44 PID 264 wrote to memory of 1992 264 48646.exe 44 PID 1992 wrote to memory of 1804 1992 rflrfxf.exe 45 PID 1992 wrote to memory of 1804 1992 rflrfxf.exe 45 PID 1992 wrote to memory of 1804 1992 rflrfxf.exe 45 PID 1992 wrote to memory of 1804 1992 rflrfxf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe"C:\Users\Admin\AppData\Local\Temp\0e65387d408b9f826d05885cb8242b65eb3fee0458403c3fc3527c50711e7114.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\08624.exec:\08624.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\q64460.exec:\q64460.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\826284.exec:\826284.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\5hbbnh.exec:\5hbbnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\nhtntt.exec:\nhtntt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\xlffrxf.exec:\xlffrxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\bbbhbh.exec:\bbbhbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\664226.exec:\664226.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\vvvjj.exec:\vvvjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\g4680.exec:\g4680.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\22288.exec:\22288.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\xrlllrx.exec:\xrlllrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\4280284.exec:\4280284.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\48646.exec:\48646.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
\??\c:\rflrfxf.exec:\rflrfxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\pjvvd.exec:\pjvvd.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804 -
\??\c:\hbtbnb.exec:\hbtbnb.exe18⤵
- Executes dropped EXE
PID:2424 -
\??\c:\3vdjp.exec:\3vdjp.exe19⤵
- Executes dropped EXE
PID:1988 -
\??\c:\c006828.exec:\c006828.exe20⤵
- Executes dropped EXE
PID:2708 -
\??\c:\7xxlrxr.exec:\7xxlrxr.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176 -
\??\c:\24066.exec:\24066.exe22⤵
- Executes dropped EXE
PID:852 -
\??\c:\9bttbb.exec:\9bttbb.exe23⤵
- Executes dropped EXE
PID:1788 -
\??\c:\e08420.exec:\e08420.exe24⤵
- Executes dropped EXE
PID:1296 -
\??\c:\pjdjv.exec:\pjdjv.exe25⤵
- Executes dropped EXE
PID:2588 -
\??\c:\420466.exec:\420466.exe26⤵
- Executes dropped EXE
PID:1104 -
\??\c:\206866.exec:\206866.exe27⤵
- Executes dropped EXE
PID:2496 -
\??\c:\7nbhtb.exec:\7nbhtb.exe28⤵
- Executes dropped EXE
PID:2988 -
\??\c:\dvpvj.exec:\dvpvj.exe29⤵
- Executes dropped EXE
PID:2304 -
\??\c:\4868406.exec:\4868406.exe30⤵
- Executes dropped EXE
PID:2140 -
\??\c:\9vpvp.exec:\9vpvp.exe31⤵
- Executes dropped EXE
PID:2400 -
\??\c:\4246662.exec:\4246662.exe32⤵
- Executes dropped EXE
PID:3048 -
\??\c:\028800.exec:\028800.exe33⤵
- Executes dropped EXE
PID:2060 -
\??\c:\dvdjd.exec:\dvdjd.exe34⤵
- Executes dropped EXE
PID:2172 -
\??\c:\9pddd.exec:\9pddd.exe35⤵
- Executes dropped EXE
PID:2408 -
\??\c:\btbhnt.exec:\btbhnt.exe36⤵
- Executes dropped EXE
PID:2520 -
\??\c:\006662.exec:\006662.exe37⤵
- Executes dropped EXE
PID:2756 -
\??\c:\nhnnnt.exec:\nhnnnt.exe38⤵
- Executes dropped EXE
PID:2884 -
\??\c:\26406.exec:\26406.exe39⤵
- Executes dropped EXE
PID:2240 -
\??\c:\868884.exec:\868884.exe40⤵
- Executes dropped EXE
PID:2724 -
\??\c:\0446022.exec:\0446022.exe41⤵
- Executes dropped EXE
PID:2632 -
\??\c:\82086.exec:\82086.exe42⤵
- Executes dropped EXE
PID:304 -
\??\c:\66208.exec:\66208.exe43⤵
- Executes dropped EXE
PID:1948 -
\??\c:\lxfrxrx.exec:\lxfrxrx.exe44⤵
- Executes dropped EXE
PID:2720 -
\??\c:\60862.exec:\60862.exe45⤵
- Executes dropped EXE
PID:2728 -
\??\c:\3fxrrfx.exec:\3fxrrfx.exe46⤵
- Executes dropped EXE
PID:1864 -
\??\c:\084682.exec:\084682.exe47⤵
- Executes dropped EXE
PID:572 -
\??\c:\48642.exec:\48642.exe48⤵
- Executes dropped EXE
PID:2592 -
\??\c:\5llrllf.exec:\5llrllf.exe49⤵
- Executes dropped EXE
PID:588 -
\??\c:\26468.exec:\26468.exe50⤵
- Executes dropped EXE
PID:1084 -
\??\c:\jddvd.exec:\jddvd.exe51⤵
- Executes dropped EXE
PID:1488 -
\??\c:\ttbbtt.exec:\ttbbtt.exe52⤵
- Executes dropped EXE
PID:2808 -
\??\c:\66688.exec:\66688.exe53⤵
- Executes dropped EXE
PID:2356 -
\??\c:\vvpvd.exec:\vvpvd.exe54⤵
- Executes dropped EXE
PID:2000 -
\??\c:\4008622.exec:\4008622.exe55⤵
- Executes dropped EXE
PID:1856 -
\??\c:\dvjpj.exec:\dvjpj.exe56⤵
- Executes dropped EXE
PID:2976 -
\??\c:\ffxffxf.exec:\ffxffxf.exe57⤵
- Executes dropped EXE
PID:2956 -
\??\c:\jdjjp.exec:\jdjjp.exe58⤵
- Executes dropped EXE
PID:2188 -
\??\c:\26464.exec:\26464.exe59⤵
- Executes dropped EXE
PID:2360 -
\??\c:\042844.exec:\042844.exe60⤵
- Executes dropped EXE
PID:2412 -
\??\c:\3rlrxlr.exec:\3rlrxlr.exe61⤵
- Executes dropped EXE
PID:2456 -
\??\c:\0466440.exec:\0466440.exe62⤵
- Executes dropped EXE
PID:2784 -
\??\c:\6024624.exec:\6024624.exe63⤵
- Executes dropped EXE
PID:3020 -
\??\c:\rlfxllr.exec:\rlfxllr.exe64⤵
- Executes dropped EXE
PID:1368 -
\??\c:\9vddp.exec:\9vddp.exe65⤵
- Executes dropped EXE
PID:1776 -
\??\c:\hhhntt.exec:\hhhntt.exe66⤵PID:708
-
\??\c:\6022480.exec:\6022480.exe67⤵PID:2012
-
\??\c:\hthttt.exec:\hthttt.exe68⤵PID:1588
-
\??\c:\0488620.exec:\0488620.exe69⤵PID:1352
-
\??\c:\rrlfllr.exec:\rrlfllr.exe70⤵PID:2484
-
\??\c:\pjjpv.exec:\pjjpv.exe71⤵PID:1676
-
\??\c:\ttbhnb.exec:\ttbhnb.exe72⤵PID:1516
-
\??\c:\5jjjd.exec:\5jjjd.exe73⤵PID:2324
-
\??\c:\20846.exec:\20846.exe74⤵PID:3048
-
\??\c:\vvjvp.exec:\vvjvp.exe75⤵PID:776
-
\??\c:\fxxfxfx.exec:\fxxfxfx.exe76⤵PID:1704
-
\??\c:\tnhhhh.exec:\tnhhhh.exe77⤵PID:1968
-
\??\c:\64602.exec:\64602.exe78⤵PID:2092
-
\??\c:\nnnbbh.exec:\nnnbbh.exe79⤵PID:2748
-
\??\c:\tnhnhn.exec:\tnhnhn.exe80⤵PID:2856
-
\??\c:\88268.exec:\88268.exe81⤵PID:2712
-
\??\c:\bbthtt.exec:\bbthtt.exe82⤵PID:2840
-
\??\c:\1xllrxf.exec:\1xllrxf.exe83⤵PID:2832
-
\??\c:\k20648.exec:\k20648.exe84⤵PID:2772
-
\??\c:\xlxxffr.exec:\xlxxffr.exe85⤵PID:2892
-
\??\c:\2684262.exec:\2684262.exe86⤵PID:2648
-
\??\c:\pjddj.exec:\pjddj.exe87⤵PID:2728
-
\??\c:\5nhbbb.exec:\5nhbbb.exe88⤵PID:1632
-
\??\c:\q42062.exec:\q42062.exe89⤵PID:1876
-
\??\c:\3jddp.exec:\3jddp.exe90⤵PID:592
-
\??\c:\7jdjp.exec:\7jdjp.exe91⤵PID:2676
-
\??\c:\pjppv.exec:\pjppv.exe92⤵PID:1716
-
\??\c:\vpdpd.exec:\vpdpd.exe93⤵PID:480
-
\??\c:\ttthhb.exec:\ttthhb.exe94⤵PID:1804
-
\??\c:\6446824.exec:\6446824.exe95⤵PID:1636
-
\??\c:\6042804.exec:\6042804.exe96⤵PID:2424
-
\??\c:\420022.exec:\420022.exe97⤵
- System Location Discovery: System Language Discovery
PID:1984 -
\??\c:\vppjj.exec:\vppjj.exe98⤵PID:2056
-
\??\c:\0840662.exec:\0840662.exe99⤵
- System Location Discovery: System Language Discovery
PID:2964 -
\??\c:\w86840.exec:\w86840.exe100⤵PID:2176
-
\??\c:\824066.exec:\824066.exe101⤵PID:2152
-
\??\c:\rlxflrx.exec:\rlxflrx.exe102⤵PID:1924
-
\??\c:\jjvdp.exec:\jjvdp.exe103⤵PID:2584
-
\??\c:\xlrrfxl.exec:\xlrrfxl.exe104⤵
- System Location Discovery: System Language Discovery
PID:2044 -
\??\c:\820224.exec:\820224.exe105⤵PID:544
-
\??\c:\nnbbbb.exec:\nnbbbb.exe106⤵PID:1620
-
\??\c:\420022.exec:\420022.exe107⤵
- System Location Discovery: System Language Discovery
PID:908 -
\??\c:\dvdvv.exec:\dvdvv.exe108⤵PID:1760
-
\??\c:\9ntttn.exec:\9ntttn.exe109⤵PID:1752
-
\??\c:\fxrlrfr.exec:\fxrlrfr.exe110⤵PID:3028
-
\??\c:\hhbhtb.exec:\hhbhtb.exe111⤵PID:1500
-
\??\c:\1fffrfl.exec:\1fffrfl.exe112⤵PID:1048
-
\??\c:\hbnhnb.exec:\hbnhnb.exe113⤵PID:2552
-
\??\c:\vpdvd.exec:\vpdvd.exe114⤵PID:1736
-
\??\c:\0664862.exec:\0664862.exe115⤵PID:2540
-
\??\c:\442046.exec:\442046.exe116⤵PID:1612
-
\??\c:\vjjdv.exec:\vjjdv.exe117⤵PID:776
-
\??\c:\3fffrxl.exec:\3fffrxl.exe118⤵PID:1704
-
\??\c:\48686.exec:\48686.exe119⤵PID:2328
-
\??\c:\48246.exec:\48246.exe120⤵PID:2860
-
\??\c:\64802.exec:\64802.exe121⤵PID:2904
-
\??\c:\5ddpd.exec:\5ddpd.exe122⤵PID:2856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-