Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe
Resource
win7-20240903-en
General
-
Target
642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe
-
Size
453KB
-
MD5
43329281f879a335bbbfb81dae3dcc5f
-
SHA1
67ea86f7a992c3c7754e850ee448c66d57ad4d1f
-
SHA256
642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61
-
SHA512
4fe6cd4b4a93fcba6581035773876557a4d9818845809fd0b8c77d22859fccc92e487e7656c017efc04f2396f7a0f47211a31cf38e3b76d6ab43c9e91f02491f
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeE:q7Tc2NYHUrAwfMp3CDE
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 49 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1472-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1056-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2764-44-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2912-53-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2704-64-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3056-73-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2536-83-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2616-91-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2800-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/692-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1444-127-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1908-144-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/768-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2880-157-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2112-173-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/316-185-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/316-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/964-206-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1308-221-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/2968-233-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1976-248-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2432-266-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2452-297-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3056-361-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/3016-378-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2212-352-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2784-338-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1596-337-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2820-319-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/560-259-0x00000000002A0000-0x00000000002CA000-memory.dmp family_blackmoon behavioral1/memory/1380-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1380-240-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/2600-392-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1904-440-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2364-454-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2892-478-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2900-581-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2616-655-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2864-713-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1536-792-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2288-855-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1848-874-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2584-889-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/552-961-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/848-973-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2928-1027-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1752-1042-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2432-1090-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
0862020.exelfxfxfr.exe0428664.exellfrlrl.exe264660.exe82620.exebtthbb.exetnhntt.exe826240.exe820024.exe7fllrrf.exe48628.exetnhnbb.exelfxxlrx.exe602028.exec244006.exe08624.exe8246224.exeq26684.exe480400.exe866800.exerlxrxfr.exedjdpv.exe2084624.exe1vjjv.exevpvvd.exefxlrrxf.exeu006002.exe7flllrr.exe6004260.exe648028.exe04062.exe04228.exehbntnn.exe3fllrrf.exelxxxflf.exe00464.exevdvdv.exepjjjp.exefxlrrfl.exe486262.exe60406.exerrfrxfr.exek24400.exew86240.exejdppd.exe604444.exeddppd.exehbntbb.exetnntbt.exe3hnntt.exe0464828.exe484404.exenhtntb.exehbnntb.exe0428602.exenhtbhn.exeg8468.exe86828.exe3pjvp.exes2068.exerlflrlx.exe864022.exe6806406.exepid Process 1056 0862020.exe 1472 lfxfxfr.exe 2216 0428664.exe 2764 llfrlrl.exe 2912 264660.exe 2704 82620.exe 3056 btthbb.exe 2536 tnhntt.exe 2616 826240.exe 3020 820024.exe 2800 7fllrrf.exe 692 48628.exe 1444 tnhnbb.exe 884 lfxxlrx.exe 1908 602028.exe 768 c244006.exe 2880 08624.exe 2112 8246224.exe 1708 q26684.exe 316 480400.exe 2516 866800.exe 964 rlxrxfr.exe 1032 djdpv.exe 1308 2084624.exe 2968 1vjjv.exe 1380 vpvvd.exe 1976 fxlrrxf.exe 560 u006002.exe 2432 7flllrr.exe 2068 6004260.exe 3036 648028.exe 2284 04062.exe 2452 04228.exe 2188 hbntnn.exe 2652 3fllrrf.exe 2820 lxxxflf.exe 2752 00464.exe 1596 vdvdv.exe 2784 pjjjp.exe 2212 fxlrrfl.exe 2724 486262.exe 3056 60406.exe 2596 rrfrxfr.exe 3016 k24400.exe 2616 w86240.exe 3024 jdppd.exe 2600 604444.exe 1360 ddppd.exe 1944 hbntbb.exe 736 tnntbt.exe 292 3hnntt.exe 884 0464828.exe 1640 484404.exe 1904 nhtntb.exe 2844 hbnntb.exe 2364 0428602.exe 2112 nhtbhn.exe 2044 g8468.exe 2148 86828.exe 2892 3pjvp.exe 1372 s2068.exe 1860 rlflrlx.exe 1704 864022.exe 840 6806406.exe -
Processes:
resource yara_rule behavioral1/memory/1056-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2036-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1472-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1472-22-0x00000000001B0000-0x00000000001DA000-memory.dmp upx behavioral1/memory/1056-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2764-44-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2912-53-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2704-64-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3056-73-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2536-83-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2616-91-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2800-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/692-118-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1444-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1908-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/768-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2880-157-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/768-149-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/2112-173-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/316-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/964-206-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1976-248-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2432-266-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2452-297-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3016-378-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2212-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2784-338-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1596-337-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1596-332-0x0000000000320000-0x000000000034A000-memory.dmp upx behavioral1/memory/1380-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2600-392-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2844-441-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1904-440-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2892-478-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1704-491-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2624-552-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2900-581-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3024-662-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2864-713-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1536-792-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1740-799-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3036-812-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1848-874-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-900-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1756-907-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2348-950-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1624-1001-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2948-1103-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2188-1117-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3016-1179-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1756-1186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/300-1205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1300-1238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2988-1243-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1956-1304-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fxxxllf.exek22806.exe7pvjd.exehbtbtb.exetntntb.exehhhhhh.exe6088008.exejdvdp.exeg4284.exe4244440.exe86842.exea4246.exexrlxllx.exefxlxrlx.exe4822406.exe0266828.exe04808.exedpjjv.exe820688.exe0428602.exeg8284.exeppjpj.exe6088440.exelrllflr.exe7tnntt.exehhbntb.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k22806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6088008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4244440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlxrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4822406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0266828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0428602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6088440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrllflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe0862020.exelfxfxfr.exe0428664.exellfrlrl.exe264660.exe82620.exebtthbb.exetnhntt.exe826240.exe820024.exe7fllrrf.exe48628.exetnhnbb.exelfxxlrx.exe602028.exedescription pid Process procid_target PID 2036 wrote to memory of 1056 2036 642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe 31 PID 2036 wrote to memory of 1056 2036 642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe 31 PID 2036 wrote to memory of 1056 2036 642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe 31 PID 2036 wrote to memory of 1056 2036 642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe 31 PID 1056 wrote to memory of 1472 1056 0862020.exe 32 PID 1056 wrote to memory of 1472 1056 0862020.exe 32 PID 1056 wrote to memory of 1472 1056 0862020.exe 32 PID 1056 wrote to memory of 1472 1056 0862020.exe 32 PID 1472 wrote to memory of 2216 1472 lfxfxfr.exe 33 PID 1472 wrote to memory of 2216 1472 lfxfxfr.exe 33 PID 1472 wrote to memory of 2216 1472 lfxfxfr.exe 33 PID 1472 wrote to memory of 2216 1472 lfxfxfr.exe 33 PID 2216 wrote to memory of 2764 2216 0428664.exe 34 PID 2216 wrote to memory of 2764 2216 0428664.exe 34 PID 2216 wrote to memory of 2764 2216 0428664.exe 34 PID 2216 wrote to memory of 2764 2216 0428664.exe 34 PID 2764 wrote to memory of 2912 2764 llfrlrl.exe 35 PID 2764 wrote to memory of 2912 2764 llfrlrl.exe 35 PID 2764 wrote to memory of 2912 2764 llfrlrl.exe 35 PID 2764 wrote to memory of 2912 2764 llfrlrl.exe 35 PID 2912 wrote to memory of 2704 2912 264660.exe 36 PID 2912 wrote to memory of 2704 2912 264660.exe 36 PID 2912 wrote to memory of 2704 2912 264660.exe 36 PID 2912 wrote to memory of 2704 2912 264660.exe 36 PID 2704 wrote to memory of 3056 2704 82620.exe 37 PID 2704 wrote to memory of 3056 2704 82620.exe 37 PID 2704 wrote to memory of 3056 2704 82620.exe 37 PID 2704 wrote to memory of 3056 2704 82620.exe 37 PID 3056 wrote to memory of 2536 3056 btthbb.exe 38 PID 3056 wrote to memory of 2536 3056 btthbb.exe 38 PID 3056 wrote to memory of 2536 3056 btthbb.exe 38 PID 3056 wrote to memory of 2536 3056 btthbb.exe 38 PID 2536 wrote to memory of 2616 2536 tnhntt.exe 39 PID 2536 wrote to memory of 2616 2536 tnhntt.exe 39 PID 2536 wrote to memory of 2616 2536 tnhntt.exe 39 PID 2536 wrote to memory of 2616 2536 tnhntt.exe 39 PID 2616 wrote to memory of 3020 2616 826240.exe 40 PID 2616 wrote to memory of 3020 2616 826240.exe 40 PID 2616 wrote to memory of 3020 2616 826240.exe 40 PID 2616 wrote to memory of 3020 2616 826240.exe 40 PID 3020 wrote to memory of 2800 3020 820024.exe 41 PID 3020 wrote to memory of 2800 3020 820024.exe 41 PID 3020 wrote to memory of 2800 3020 820024.exe 41 PID 3020 wrote to memory of 2800 3020 820024.exe 41 PID 2800 wrote to memory of 692 2800 7fllrrf.exe 42 PID 2800 wrote to memory of 692 2800 7fllrrf.exe 42 PID 2800 wrote to memory of 692 2800 7fllrrf.exe 42 PID 2800 wrote to memory of 692 2800 7fllrrf.exe 42 PID 692 wrote to memory of 1444 692 48628.exe 43 PID 692 wrote to memory of 1444 692 48628.exe 43 PID 692 wrote to memory of 1444 692 48628.exe 43 PID 692 wrote to memory of 1444 692 48628.exe 43 PID 1444 wrote to memory of 884 1444 tnhnbb.exe 44 PID 1444 wrote to memory of 884 1444 tnhnbb.exe 44 PID 1444 wrote to memory of 884 1444 tnhnbb.exe 44 PID 1444 wrote to memory of 884 1444 tnhnbb.exe 44 PID 884 wrote to memory of 1908 884 lfxxlrx.exe 45 PID 884 wrote to memory of 1908 884 lfxxlrx.exe 45 PID 884 wrote to memory of 1908 884 lfxxlrx.exe 45 PID 884 wrote to memory of 1908 884 lfxxlrx.exe 45 PID 1908 wrote to memory of 768 1908 602028.exe 46 PID 1908 wrote to memory of 768 1908 602028.exe 46 PID 1908 wrote to memory of 768 1908 602028.exe 46 PID 1908 wrote to memory of 768 1908 602028.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe"C:\Users\Admin\AppData\Local\Temp\642b6c52b29a090b4acef85c8c9f287394ccbe718411c3d801a0f6238c8f8d61.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\0862020.exec:\0862020.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\lfxfxfr.exec:\lfxfxfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\0428664.exec:\0428664.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\llfrlrl.exec:\llfrlrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\264660.exec:\264660.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\82620.exec:\82620.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\btthbb.exec:\btthbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\tnhntt.exec:\tnhntt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\826240.exec:\826240.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\820024.exec:\820024.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\7fllrrf.exec:\7fllrrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\48628.exec:\48628.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\tnhnbb.exec:\tnhnbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
\??\c:\lfxxlrx.exec:\lfxxlrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\602028.exec:\602028.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\c244006.exec:\c244006.exe17⤵
- Executes dropped EXE
PID:768 -
\??\c:\08624.exec:\08624.exe18⤵
- Executes dropped EXE
PID:2880 -
\??\c:\8246224.exec:\8246224.exe19⤵
- Executes dropped EXE
PID:2112 -
\??\c:\q26684.exec:\q26684.exe20⤵
- Executes dropped EXE
PID:1708 -
\??\c:\480400.exec:\480400.exe21⤵
- Executes dropped EXE
PID:316 -
\??\c:\866800.exec:\866800.exe22⤵
- Executes dropped EXE
PID:2516 -
\??\c:\rlxrxfr.exec:\rlxrxfr.exe23⤵
- Executes dropped EXE
PID:964 -
\??\c:\djdpv.exec:\djdpv.exe24⤵
- Executes dropped EXE
PID:1032 -
\??\c:\2084624.exec:\2084624.exe25⤵
- Executes dropped EXE
PID:1308 -
\??\c:\1vjjv.exec:\1vjjv.exe26⤵
- Executes dropped EXE
PID:2968 -
\??\c:\vpvvd.exec:\vpvvd.exe27⤵
- Executes dropped EXE
PID:1380 -
\??\c:\fxlrrxf.exec:\fxlrrxf.exe28⤵
- Executes dropped EXE
PID:1976 -
\??\c:\u006002.exec:\u006002.exe29⤵
- Executes dropped EXE
PID:560 -
\??\c:\7flllrr.exec:\7flllrr.exe30⤵
- Executes dropped EXE
PID:2432 -
\??\c:\6004260.exec:\6004260.exe31⤵
- Executes dropped EXE
PID:2068 -
\??\c:\648028.exec:\648028.exe32⤵
- Executes dropped EXE
PID:3036 -
\??\c:\04062.exec:\04062.exe33⤵
- Executes dropped EXE
PID:2284 -
\??\c:\04228.exec:\04228.exe34⤵
- Executes dropped EXE
PID:2452 -
\??\c:\hbntnn.exec:\hbntnn.exe35⤵
- Executes dropped EXE
PID:2188 -
\??\c:\3fllrrf.exec:\3fllrrf.exe36⤵
- Executes dropped EXE
PID:2652 -
\??\c:\lxxxflf.exec:\lxxxflf.exe37⤵
- Executes dropped EXE
PID:2820 -
\??\c:\00464.exec:\00464.exe38⤵
- Executes dropped EXE
PID:2752 -
\??\c:\vdvdv.exec:\vdvdv.exe39⤵
- Executes dropped EXE
PID:1596 -
\??\c:\pjjjp.exec:\pjjjp.exe40⤵
- Executes dropped EXE
PID:2784 -
\??\c:\fxlrrfl.exec:\fxlrrfl.exe41⤵
- Executes dropped EXE
PID:2212 -
\??\c:\486262.exec:\486262.exe42⤵
- Executes dropped EXE
PID:2724 -
\??\c:\60406.exec:\60406.exe43⤵
- Executes dropped EXE
PID:3056 -
\??\c:\rrfrxfr.exec:\rrfrxfr.exe44⤵
- Executes dropped EXE
PID:2596 -
\??\c:\k24400.exec:\k24400.exe45⤵
- Executes dropped EXE
PID:3016 -
\??\c:\w86240.exec:\w86240.exe46⤵
- Executes dropped EXE
PID:2616 -
\??\c:\jdppd.exec:\jdppd.exe47⤵
- Executes dropped EXE
PID:3024 -
\??\c:\604444.exec:\604444.exe48⤵
- Executes dropped EXE
PID:2600 -
\??\c:\ddppd.exec:\ddppd.exe49⤵
- Executes dropped EXE
PID:1360 -
\??\c:\hbntbb.exec:\hbntbb.exe50⤵
- Executes dropped EXE
PID:1944 -
\??\c:\tnntbt.exec:\tnntbt.exe51⤵
- Executes dropped EXE
PID:736 -
\??\c:\3hnntt.exec:\3hnntt.exe52⤵
- Executes dropped EXE
PID:292 -
\??\c:\0464828.exec:\0464828.exe53⤵
- Executes dropped EXE
PID:884 -
\??\c:\484404.exec:\484404.exe54⤵
- Executes dropped EXE
PID:1640 -
\??\c:\nhtntb.exec:\nhtntb.exe55⤵
- Executes dropped EXE
PID:1904 -
\??\c:\hbnntb.exec:\hbnntb.exe56⤵
- Executes dropped EXE
PID:2844 -
\??\c:\0428602.exec:\0428602.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364 -
\??\c:\nhtbhn.exec:\nhtbhn.exe58⤵
- Executes dropped EXE
PID:2112 -
\??\c:\g8468.exec:\g8468.exe59⤵
- Executes dropped EXE
PID:2044 -
\??\c:\86828.exec:\86828.exe60⤵
- Executes dropped EXE
PID:2148 -
\??\c:\3pjvp.exec:\3pjvp.exe61⤵
- Executes dropped EXE
PID:2892 -
\??\c:\s2068.exec:\s2068.exe62⤵
- Executes dropped EXE
PID:1372 -
\??\c:\rlflrlx.exec:\rlflrlx.exe63⤵
- Executes dropped EXE
PID:1860 -
\??\c:\864022.exec:\864022.exe64⤵
- Executes dropped EXE
PID:1704 -
\??\c:\6806406.exec:\6806406.exe65⤵
- Executes dropped EXE
PID:840 -
\??\c:\ffffrrf.exec:\ffffrrf.exe66⤵PID:1508
-
\??\c:\bbntht.exec:\bbntht.exe67⤵PID:1536
-
\??\c:\g4246.exec:\g4246.exe68⤵PID:1380
-
\??\c:\42064.exec:\42064.exe69⤵PID:1740
-
\??\c:\7jjvp.exec:\7jjvp.exe70⤵PID:1972
-
\??\c:\tthhth.exec:\tthhth.exe71⤵PID:1912
-
\??\c:\8022840.exec:\8022840.exe72⤵PID:2480
-
\??\c:\64062.exec:\64062.exe73⤵PID:2460
-
\??\c:\26846.exec:\26846.exe74⤵PID:2624
-
\??\c:\nnbbtt.exec:\nnbbtt.exe75⤵PID:2056
-
\??\c:\2062406.exec:\2062406.exe76⤵PID:2456
-
\??\c:\5pvdj.exec:\5pvdj.exe77⤵PID:2088
-
\??\c:\hbttnn.exec:\hbttnn.exe78⤵PID:2900
-
\??\c:\i044662.exec:\i044662.exe79⤵PID:2924
-
\??\c:\rrlxlxl.exec:\rrlxlxl.exe80⤵PID:2668
-
\??\c:\tthhtb.exec:\tthhtb.exe81⤵PID:1588
-
\??\c:\26446.exec:\26446.exe82⤵PID:2152
-
\??\c:\xlxxllx.exec:\xlxxllx.exe83⤵PID:2212
-
\??\c:\5nnttb.exec:\5nnttb.exe84⤵PID:2908
-
\??\c:\g8668.exec:\g8668.exe85⤵PID:2884
-
\??\c:\480688.exec:\480688.exe86⤵PID:2540
-
\??\c:\424466.exec:\424466.exe87⤵PID:2556
-
\??\c:\c422402.exec:\c422402.exe88⤵PID:3008
-
\??\c:\s0808.exec:\s0808.exe89⤵PID:2716
-
\??\c:\a8662.exec:\a8662.exe90⤵PID:2616
-
\??\c:\fxlrffr.exec:\fxlrffr.exe91⤵PID:300
-
\??\c:\4828062.exec:\4828062.exe92⤵PID:3024
-
\??\c:\7vdjj.exec:\7vdjj.exe93⤵PID:1300
-
\??\c:\00466.exec:\00466.exe94⤵PID:2084
-
\??\c:\0862480.exec:\0862480.exe95⤵PID:2776
-
\??\c:\6406262.exec:\6406262.exe96⤵PID:484
-
\??\c:\i684662.exec:\i684662.exe97⤵PID:1048
-
\??\c:\k86662.exec:\k86662.exe98⤵PID:2632
-
\??\c:\0866440.exec:\0866440.exe99⤵PID:2888
-
\??\c:\8244228.exec:\8244228.exe100⤵PID:2864
-
\??\c:\dvpjv.exec:\dvpjv.exe101⤵PID:1240
-
\??\c:\3djdd.exec:\3djdd.exe102⤵PID:1708
-
\??\c:\pjvpd.exec:\pjvpd.exe103⤵PID:2096
-
\??\c:\6488062.exec:\6488062.exe104⤵PID:2044
-
\??\c:\pdjpv.exec:\pdjpv.exe105⤵PID:2936
-
\??\c:\60280.exec:\60280.exe106⤵PID:1936
-
\??\c:\0862884.exec:\0862884.exe107⤵PID:1312
-
\??\c:\8022840.exec:\8022840.exe108⤵PID:1860
-
\??\c:\lfxlffr.exec:\lfxlffr.exe109⤵PID:1704
-
\??\c:\o688846.exec:\o688846.exe110⤵PID:864
-
\??\c:\jdddj.exec:\jdddj.exe111⤵PID:2388
-
\??\c:\o424662.exec:\o424662.exe112⤵PID:1536
-
\??\c:\pdvvj.exec:\pdvvj.exe113⤵PID:2092
-
\??\c:\k68828.exec:\k68828.exe114⤵PID:1740
-
\??\c:\202628.exec:\202628.exe115⤵PID:2500
-
\??\c:\242244.exec:\242244.exe116⤵PID:3036
-
\??\c:\20806.exec:\20806.exe117⤵PID:1856
-
\??\c:\04244.exec:\04244.exe118⤵PID:2240
-
\??\c:\lxrlfff.exec:\lxrlfff.exe119⤵PID:1484
-
\??\c:\u862840.exec:\u862840.exe120⤵PID:2188
-
\??\c:\rfxlllf.exec:\rfxlllf.exe121⤵PID:2692
-
\??\c:\08068.exec:\08068.exe122⤵PID:2288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-