Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe
Resource
win7-20240903-en
General
-
Target
3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe
-
Size
453KB
-
MD5
542c948758cf875109247f384721b7c0
-
SHA1
d117411c1089314e74f126272acf398a7c45401b
-
SHA256
3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7
-
SHA512
4a3168a14eb2bb2b540935ef10b0261a1a75c5f981a39a531675c2506deac53a571fa1bcb0909b46c6c4a9fa594fdb38bcc481f6afc04f13ee3d10231c873126
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeX:q7Tc2NYHUrAwfMp3CDX
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 40 IoCs
Processes:
resource yara_rule behavioral1/memory/3068-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2848-9-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2748-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2336-38-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2640-58-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2836-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/580-87-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2148-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2148-95-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2240-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1884-207-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1900-226-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1060-236-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2564-268-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1984-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2964-401-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2284-414-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1004-476-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2656-506-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2896-575-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1284-482-0x00000000002C0000-0x00000000002EA000-memory.dmp family_blackmoon behavioral1/memory/2232-462-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1064-442-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1888-380-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2652-339-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2192-294-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1060-234-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/308-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2136-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2136-179-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1160-162-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/2960-143-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/3008-134-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3024-116-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3024-113-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/804-77-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2424-693-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2880-719-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1364-736-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2368-863-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
xrfflfl.exebtnntb.exetnbbnh.exerrxflrl.exe5hhnbh.exe3llrxxf.exe5ntthh.exeddppv.exe9lxrxxf.exe7htthb.exejdjpv.exebnhnnb.exe7ddvd.exe7frflxl.exe3btttb.exepjddp.exerlfrlrf.exe3nnbtb.exefrrrxrf.exe1rfrrlr.exethtbhh.exejdjjj.exefxlllrr.exetnhntb.exe9pdvp.exefrlrxxl.exejjjdd.exexlrrfff.exe3thhhn.exejpjvd.exebbhhnt.exehtnhhh.exe1jvvd.exellflrxr.exebthntt.exehhbttn.exellrrxfl.exerfxfllr.exe9hhtbb.exepjdjv.exellxfrxr.exebbbtnt.exe7bthhb.exevvdvj.exexxrrrxl.exexrrxrxr.exenbbbnt.exe5pvpv.exe5vpvd.exefxffrxf.exe5bbnth.exetnhnhn.exejvdpj.exefxxlflf.exenthbtt.exe7jdjp.exepvjvp.exerlfrflx.exebnttnb.exeppppj.exepjppd.exelrlrffl.exenbbnbh.exe3pjvj.exepid Process 3068 xrfflfl.exe 2748 btnntb.exe 2336 tnbbnh.exe 2836 rrxflrl.exe 2640 5hhnbh.exe 2420 3llrxxf.exe 804 5ntthh.exe 580 ddppv.exe 2148 9lxrxxf.exe 2512 7htthb.exe 3024 jdjpv.exe 2976 bnhnnb.exe 3008 7ddvd.exe 2960 7frflxl.exe 2240 3btttb.exe 1160 pjddp.exe 1064 rlfrlrf.exe 2136 3nnbtb.exe 2556 frrrxrf.exe 308 1rfrrlr.exe 1884 thtbhh.exe 1608 jdjjj.exe 1900 fxlllrr.exe 1060 tnhntb.exe 1604 9pdvp.exe 2120 frlrxxl.exe 1616 jjjdd.exe 2564 xlrrfff.exe 2180 3thhhn.exe 1872 jpjvd.exe 2192 bbhhnt.exe 1700 htnhhh.exe 3004 1jvvd.exe 2796 llflrxr.exe 2764 bthntt.exe 2760 hhbttn.exe 1984 llrrxfl.exe 2652 rfxfllr.exe 2312 9hhtbb.exe 1920 pjdjv.exe 2988 llxfrxr.exe 2916 bbbtnt.exe 2532 7bthhb.exe 1888 vvdvj.exe 2956 xxrrrxl.exe 2676 xrrxrxr.exe 2964 nbbbnt.exe 2968 5pvpv.exe 2284 5vpvd.exe 2864 fxffrxf.exe 2948 5bbnth.exe 2264 tnhnhn.exe 1064 jvdpj.exe 1500 fxxlflf.exe 2940 nthbtt.exe 2232 7jdjp.exe 2172 pvjvp.exe 1004 rlfrflx.exe 1284 bnttnb.exe 1516 ppppj.exe 288 pjppd.exe 2216 lrlrffl.exe 2656 nbbnbh.exe 2800 3pjvj.exe -
Processes:
resource yara_rule behavioral1/memory/3068-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2848-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2336-28-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2748-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2336-38-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-58-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2836-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/580-87-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2148-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2240-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1884-207-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1900-226-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1060-236-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1984-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2988-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1888-373-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2956-381-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2964-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2284-414-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1284-477-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1004-476-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2656-506-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1584-544-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2896-575-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2232-462-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1064-442-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1888-380-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2652-339-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2192-294-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/308-199-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2136-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3008-134-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3024-116-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/804-77-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2424-693-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2880-719-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1108-720-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1364-736-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1872-800-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3004-825-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3020-838-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2368-863-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2940-980-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9dddj.exexrlrffr.exebbnbtt.exexxffxxr.exerlrxfff.exe7bthhb.exehtntbh.exe9xxfrxr.exe9jvvv.exelxrrrrx.exerfrllll.exejddpv.exerlllrlf.exenbnhtb.exelfflrfr.exejdjpp.exefflfrxl.exetnbhtb.exebnttnb.exefxrrxxr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bthhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xxfrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnttnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrxxr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exexrfflfl.exebtnntb.exetnbbnh.exerrxflrl.exe5hhnbh.exe3llrxxf.exe5ntthh.exeddppv.exe9lxrxxf.exe7htthb.exejdjpv.exebnhnnb.exe7ddvd.exe7frflxl.exe3btttb.exedescription pid Process procid_target PID 2848 wrote to memory of 3068 2848 3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe 30 PID 2848 wrote to memory of 3068 2848 3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe 30 PID 2848 wrote to memory of 3068 2848 3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe 30 PID 2848 wrote to memory of 3068 2848 3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe 30 PID 3068 wrote to memory of 2748 3068 xrfflfl.exe 100 PID 3068 wrote to memory of 2748 3068 xrfflfl.exe 100 PID 3068 wrote to memory of 2748 3068 xrfflfl.exe 100 PID 3068 wrote to memory of 2748 3068 xrfflfl.exe 100 PID 2748 wrote to memory of 2336 2748 btnntb.exe 32 PID 2748 wrote to memory of 2336 2748 btnntb.exe 32 PID 2748 wrote to memory of 2336 2748 btnntb.exe 32 PID 2748 wrote to memory of 2336 2748 btnntb.exe 32 PID 2336 wrote to memory of 2836 2336 tnbbnh.exe 33 PID 2336 wrote to memory of 2836 2336 tnbbnh.exe 33 PID 2336 wrote to memory of 2836 2336 tnbbnh.exe 33 PID 2336 wrote to memory of 2836 2336 tnbbnh.exe 33 PID 2836 wrote to memory of 2640 2836 rrxflrl.exe 34 PID 2836 wrote to memory of 2640 2836 rrxflrl.exe 34 PID 2836 wrote to memory of 2640 2836 rrxflrl.exe 34 PID 2836 wrote to memory of 2640 2836 rrxflrl.exe 34 PID 2640 wrote to memory of 2420 2640 5hhnbh.exe 35 PID 2640 wrote to memory of 2420 2640 5hhnbh.exe 35 PID 2640 wrote to memory of 2420 2640 5hhnbh.exe 35 PID 2640 wrote to memory of 2420 2640 5hhnbh.exe 35 PID 2420 wrote to memory of 804 2420 3llrxxf.exe 36 PID 2420 wrote to memory of 804 2420 3llrxxf.exe 36 PID 2420 wrote to memory of 804 2420 3llrxxf.exe 36 PID 2420 wrote to memory of 804 2420 3llrxxf.exe 36 PID 804 wrote to memory of 580 804 5ntthh.exe 37 PID 804 wrote to memory of 580 804 5ntthh.exe 37 PID 804 wrote to memory of 580 804 5ntthh.exe 37 PID 804 wrote to memory of 580 804 5ntthh.exe 37 PID 580 wrote to memory of 2148 580 ddppv.exe 38 PID 580 wrote to memory of 2148 580 ddppv.exe 38 PID 580 wrote to memory of 2148 580 ddppv.exe 38 PID 580 wrote to memory of 2148 580 ddppv.exe 38 PID 2148 wrote to memory of 2512 2148 9lxrxxf.exe 39 PID 2148 wrote to memory of 2512 2148 9lxrxxf.exe 39 PID 2148 wrote to memory of 2512 2148 9lxrxxf.exe 39 PID 2148 wrote to memory of 2512 2148 9lxrxxf.exe 39 PID 2512 wrote to memory of 3024 2512 7htthb.exe 40 PID 2512 wrote to memory of 3024 2512 7htthb.exe 40 PID 2512 wrote to memory of 3024 2512 7htthb.exe 40 PID 2512 wrote to memory of 3024 2512 7htthb.exe 40 PID 3024 wrote to memory of 2976 3024 jdjpv.exe 41 PID 3024 wrote to memory of 2976 3024 jdjpv.exe 41 PID 3024 wrote to memory of 2976 3024 jdjpv.exe 41 PID 3024 wrote to memory of 2976 3024 jdjpv.exe 41 PID 2976 wrote to memory of 3008 2976 bnhnnb.exe 42 PID 2976 wrote to memory of 3008 2976 bnhnnb.exe 42 PID 2976 wrote to memory of 3008 2976 bnhnnb.exe 42 PID 2976 wrote to memory of 3008 2976 bnhnnb.exe 42 PID 3008 wrote to memory of 2960 3008 7ddvd.exe 43 PID 3008 wrote to memory of 2960 3008 7ddvd.exe 43 PID 3008 wrote to memory of 2960 3008 7ddvd.exe 43 PID 3008 wrote to memory of 2960 3008 7ddvd.exe 43 PID 2960 wrote to memory of 2240 2960 7frflxl.exe 44 PID 2960 wrote to memory of 2240 2960 7frflxl.exe 44 PID 2960 wrote to memory of 2240 2960 7frflxl.exe 44 PID 2960 wrote to memory of 2240 2960 7frflxl.exe 44 PID 2240 wrote to memory of 1160 2240 3btttb.exe 45 PID 2240 wrote to memory of 1160 2240 3btttb.exe 45 PID 2240 wrote to memory of 1160 2240 3btttb.exe 45 PID 2240 wrote to memory of 1160 2240 3btttb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe"C:\Users\Admin\AppData\Local\Temp\3793aa821907cf6c0720a05728ab3969904c8e2eb9eac41c60338a0811af5af7N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\xrfflfl.exec:\xrfflfl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\btnntb.exec:\btnntb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\tnbbnh.exec:\tnbbnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\rrxflrl.exec:\rrxflrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\5hhnbh.exec:\5hhnbh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\3llrxxf.exec:\3llrxxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\5ntthh.exec:\5ntthh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
\??\c:\ddppv.exec:\ddppv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:580 -
\??\c:\9lxrxxf.exec:\9lxrxxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\7htthb.exec:\7htthb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\jdjpv.exec:\jdjpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\bnhnnb.exec:\bnhnnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\7ddvd.exec:\7ddvd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\7frflxl.exec:\7frflxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\3btttb.exec:\3btttb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\pjddp.exec:\pjddp.exe17⤵
- Executes dropped EXE
PID:1160 -
\??\c:\rlfrlrf.exec:\rlfrlrf.exe18⤵
- Executes dropped EXE
PID:1064 -
\??\c:\3nnbtb.exec:\3nnbtb.exe19⤵
- Executes dropped EXE
PID:2136 -
\??\c:\frrrxrf.exec:\frrrxrf.exe20⤵
- Executes dropped EXE
PID:2556 -
\??\c:\1rfrrlr.exec:\1rfrrlr.exe21⤵
- Executes dropped EXE
PID:308 -
\??\c:\thtbhh.exec:\thtbhh.exe22⤵
- Executes dropped EXE
PID:1884 -
\??\c:\jdjjj.exec:\jdjjj.exe23⤵
- Executes dropped EXE
PID:1608 -
\??\c:\fxlllrr.exec:\fxlllrr.exe24⤵
- Executes dropped EXE
PID:1900 -
\??\c:\tnhntb.exec:\tnhntb.exe25⤵
- Executes dropped EXE
PID:1060 -
\??\c:\9pdvp.exec:\9pdvp.exe26⤵
- Executes dropped EXE
PID:1604 -
\??\c:\frlrxxl.exec:\frlrxxl.exe27⤵
- Executes dropped EXE
PID:2120 -
\??\c:\jjjdd.exec:\jjjdd.exe28⤵
- Executes dropped EXE
PID:1616 -
\??\c:\xlrrfff.exec:\xlrrfff.exe29⤵
- Executes dropped EXE
PID:2564 -
\??\c:\3thhhn.exec:\3thhhn.exe30⤵
- Executes dropped EXE
PID:2180 -
\??\c:\jpjvd.exec:\jpjvd.exe31⤵
- Executes dropped EXE
PID:1872 -
\??\c:\bbhhnt.exec:\bbhhnt.exe32⤵
- Executes dropped EXE
PID:2192 -
\??\c:\htnhhh.exec:\htnhhh.exe33⤵
- Executes dropped EXE
PID:1700 -
\??\c:\1jvvd.exec:\1jvvd.exe34⤵
- Executes dropped EXE
PID:3004 -
\??\c:\llflrxr.exec:\llflrxr.exe35⤵
- Executes dropped EXE
PID:2796 -
\??\c:\bthntt.exec:\bthntt.exe36⤵
- Executes dropped EXE
PID:2764 -
\??\c:\hhbttn.exec:\hhbttn.exe37⤵
- Executes dropped EXE
PID:2760 -
\??\c:\llrrxfl.exec:\llrrxfl.exe38⤵
- Executes dropped EXE
PID:1984 -
\??\c:\rfxfllr.exec:\rfxfllr.exe39⤵
- Executes dropped EXE
PID:2652 -
\??\c:\9hhtbb.exec:\9hhtbb.exe40⤵
- Executes dropped EXE
PID:2312 -
\??\c:\pjdjv.exec:\pjdjv.exe41⤵
- Executes dropped EXE
PID:1920 -
\??\c:\llxfrxr.exec:\llxfrxr.exe42⤵
- Executes dropped EXE
PID:2988 -
\??\c:\bbbtnt.exec:\bbbtnt.exe43⤵
- Executes dropped EXE
PID:2916 -
\??\c:\7bthhb.exec:\7bthhb.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532 -
\??\c:\vvdvj.exec:\vvdvj.exe45⤵
- Executes dropped EXE
PID:1888 -
\??\c:\xxrrrxl.exec:\xxrrrxl.exe46⤵
- Executes dropped EXE
PID:2956 -
\??\c:\xrrxrxr.exec:\xrrxrxr.exe47⤵
- Executes dropped EXE
PID:2676 -
\??\c:\nbbbnt.exec:\nbbbnt.exe48⤵
- Executes dropped EXE
PID:2964 -
\??\c:\5pvpv.exec:\5pvpv.exe49⤵
- Executes dropped EXE
PID:2968 -
\??\c:\5vpvd.exec:\5vpvd.exe50⤵
- Executes dropped EXE
PID:2284 -
\??\c:\fxffrxf.exec:\fxffrxf.exe51⤵
- Executes dropped EXE
PID:2864 -
\??\c:\5bbnth.exec:\5bbnth.exe52⤵
- Executes dropped EXE
PID:2948 -
\??\c:\tnhnhn.exec:\tnhnhn.exe53⤵
- Executes dropped EXE
PID:2264 -
\??\c:\jvdpj.exec:\jvdpj.exe54⤵
- Executes dropped EXE
PID:1064 -
\??\c:\fxxlflf.exec:\fxxlflf.exe55⤵
- Executes dropped EXE
PID:1500 -
\??\c:\nthbtt.exec:\nthbtt.exe56⤵
- Executes dropped EXE
PID:2940 -
\??\c:\7jdjp.exec:\7jdjp.exe57⤵
- Executes dropped EXE
PID:2232 -
\??\c:\pvjvp.exec:\pvjvp.exe58⤵
- Executes dropped EXE
PID:2172 -
\??\c:\rlfrflx.exec:\rlfrflx.exe59⤵
- Executes dropped EXE
PID:1004 -
\??\c:\bnttnb.exec:\bnttnb.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
\??\c:\ppppj.exec:\ppppj.exe61⤵
- Executes dropped EXE
PID:1516 -
\??\c:\pjppd.exec:\pjppd.exe62⤵
- Executes dropped EXE
PID:288 -
\??\c:\lrlrffl.exec:\lrlrffl.exe63⤵
- Executes dropped EXE
PID:2216 -
\??\c:\nbbnbh.exec:\nbbnbh.exe64⤵
- Executes dropped EXE
PID:2656 -
\??\c:\3pjvj.exec:\3pjvj.exe65⤵
- Executes dropped EXE
PID:2800 -
\??\c:\vvvjp.exec:\vvvjp.exe66⤵PID:2000
-
\??\c:\lfxxxxl.exec:\lfxxxxl.exe67⤵PID:2164
-
\??\c:\hbtbnt.exec:\hbtbnt.exe68⤵PID:2356
-
\??\c:\djpvd.exec:\djpvd.exe69⤵PID:2824
-
\??\c:\1dvdd.exec:\1dvdd.exe70⤵PID:1584
-
\??\c:\fxrxflf.exec:\fxrxflf.exe71⤵PID:2720
-
\??\c:\bthhnt.exec:\bthhnt.exe72⤵PID:2748
-
\??\c:\btntbb.exec:\btntbb.exe73⤵PID:2816
-
\??\c:\jjdjv.exec:\jjdjv.exe74⤵PID:2896
-
\??\c:\xrlrrxr.exec:\xrlrrxr.exe75⤵PID:2588
-
\??\c:\rllxfff.exec:\rllxfff.exe76⤵PID:2660
-
\??\c:\nhnnnt.exec:\nhnnnt.exe77⤵PID:2744
-
\??\c:\7ntbbb.exec:\7ntbbb.exe78⤵PID:2368
-
\??\c:\jjpvv.exec:\jjpvv.exe79⤵PID:560
-
\??\c:\rxllrxl.exec:\rxllrxl.exe80⤵PID:1480
-
\??\c:\jjddp.exec:\jjddp.exe81⤵PID:2184
-
\??\c:\xxffllr.exec:\xxffllr.exe82⤵PID:696
-
\??\c:\nntbhn.exec:\nntbhn.exe83⤵PID:596
-
\??\c:\7ppdp.exec:\7ppdp.exe84⤵PID:1228
-
\??\c:\lrffrrx.exec:\lrffrrx.exe85⤵PID:3036
-
\??\c:\lfrrfrr.exec:\lfrrfrr.exe86⤵PID:2572
-
\??\c:\nhtbhn.exec:\nhtbhn.exe87⤵PID:2956
-
\??\c:\1vpdd.exec:\1vpdd.exe88⤵PID:2676
-
\??\c:\xrlfffl.exec:\xrlfffl.exe89⤵PID:2876
-
\??\c:\1lxfrxr.exec:\1lxfrxr.exe90⤵PID:2960
-
\??\c:\1nhnbh.exec:\1nhnbh.exe91⤵PID:1424
-
\??\c:\9lfrxxl.exec:\9lfrxxl.exe92⤵PID:2864
-
\??\c:\7ntbnt.exec:\7ntbnt.exe93⤵PID:2424
-
\??\c:\xrrxlxr.exec:\xrrxlxr.exe94⤵PID:2628
-
\??\c:\btbbbt.exec:\btbbbt.exe95⤵PID:2792
-
\??\c:\3dvdd.exec:\3dvdd.exe96⤵PID:1156
-
\??\c:\rxxfxrl.exec:\rxxfxrl.exe97⤵PID:2880
-
\??\c:\tttbtt.exec:\tttbtt.exe98⤵PID:1108
-
\??\c:\pppvp.exec:\pppvp.exe99⤵PID:1420
-
\??\c:\frfxxxf.exec:\frfxxxf.exe100⤵PID:1364
-
\??\c:\htbntt.exec:\htbntt.exe101⤵PID:2952
-
\??\c:\jpddj.exec:\jpddj.exe102⤵PID:1060
-
\??\c:\1frrxfl.exec:\1frrxfl.exe103⤵PID:2496
-
\??\c:\nbttnh.exec:\nbttnh.exe104⤵PID:1548
-
\??\c:\dpjdj.exec:\dpjdj.exe105⤵PID:2100
-
\??\c:\pdppd.exec:\pdppd.exe106⤵PID:996
-
\??\c:\3rfxrfr.exec:\3rfxrfr.exe107⤵PID:1376
-
\??\c:\3hbhnn.exec:\3hbhnn.exe108⤵PID:1724
-
\??\c:\vvppd.exec:\vvppd.exe109⤵PID:2164
-
\??\c:\jdpjp.exec:\jdpjp.exe110⤵PID:1872
-
\??\c:\rllfffr.exec:\rllfffr.exe111⤵PID:1308
-
\??\c:\nbhbhh.exec:\nbhbhh.exe112⤵PID:2672
-
\??\c:\djvpv.exec:\djvpv.exe113⤵PID:1700
-
\??\c:\jjddv.exec:\jjddv.exe114⤵PID:3004
-
\??\c:\xlfrxrf.exec:\xlfrxrf.exe115⤵PID:3064
-
\??\c:\bbbhhh.exec:\bbbhhh.exe116⤵PID:3020
-
\??\c:\ppjjv.exec:\ppjjv.exe117⤵PID:2752
-
\??\c:\tbbnbt.exec:\tbbnbt.exe118⤵PID:2756
-
\??\c:\5vjpp.exec:\5vjpp.exe119⤵PID:1328
-
\??\c:\lfflrfr.exec:\lfflrfr.exe120⤵
- System Location Discovery: System Language Discovery
PID:2368 -
\??\c:\fxlxffr.exec:\fxlxffr.exe121⤵PID:2312
-
\??\c:\ttnnbn.exec:\ttnnbn.exe122⤵PID:1480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-