Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 17:45
Behavioral task
behavioral1
Sample
59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe
-
Size
71KB
-
MD5
3211239658f415b2a6e14dada51fe5a5
-
SHA1
958abbc48e8099408bbcb5dbe490069639435bd4
-
SHA256
59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734
-
SHA512
9ff168e8488bd110b3d03a24858416e1d116befe32ad1294c53d421a1e3d92c97611f1ea803d29e9c5fa9c59658e451f734d3d8a8917675cd608075b0af01448
-
SSDEEP
1536:zvQBeOGtrYS3srx93UBWfwC6Ggnouy8iT4+IJPkffW2Vl4zQ3yN:zhOmTsF93UYfwC6GIoutiTm5kfuGCN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/1920-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1056-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1892-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2432-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4944-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2972-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/944-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4252-50-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3160-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/800-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2124-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3772-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1484-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3636-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4860-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2308-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4516-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-115-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1756-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3592-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4824-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4544-158-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2028-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3484-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2376-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4640-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5032-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1052-186-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4788-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1824-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3580-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2632-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1404-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1524-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4472-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1896-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1892-230-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/376-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/244-240-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1332-247-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3028-262-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2124-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2000-278-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4088-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3040-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3180-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1920-369-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4904-372-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1580-387-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2124-404-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2960-447-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1784-478-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3552-497-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4528-504-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2600-539-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1292-628-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/740-667-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2172-868-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2936-964-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3812-991-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1920 8248480.exe 1892 rlllffx.exe 2432 dvjvj.exe 4944 thnnbb.exe 2972 rlrflfl.exe 2476 pdpvd.exe 944 g2486.exe 2800 pdvpd.exe 4252 g2860.exe 3160 u048266.exe 800 htbtnn.exe 2124 tbhntn.exe 3772 862622.exe 1484 608822.exe 3636 fxxrxrx.exe 4860 040048.exe 1436 08080.exe 2308 4682220.exe 4516 bthbtt.exe 2384 tnbthh.exe 3612 pjjjp.exe 468 rrxlfxr.exe 4840 jjpjp.exe 1116 0422464.exe 2440 824004.exe 1756 0000444.exe 1104 k68266.exe 4792 7rllflr.exe 4080 c022444.exe 3592 o068664.exe 4824 0226660.exe 4820 rfffxxx.exe 4544 824804.exe 936 nhbnhb.exe 2028 xrrfllf.exe 2752 nbbthh.exe 3484 hnhhnt.exe 2712 9tnhhh.exe 2376 6886826.exe 3812 42886.exe 2172 28086.exe 4640 3pjvp.exe 5032 200826.exe 1052 ffllrlf.exe 4788 k46086.exe 1824 i442660.exe 4368 22602.exe 620 vpjdv.exe 1340 hhnbhb.exe 2056 lxlrfxl.exe 3580 02482.exe 2632 2828820.exe 4476 48066.exe 3908 jpvvd.exe 1404 tnthbh.exe 4248 9tnntt.exe 1524 484866.exe 4472 e28484.exe 2400 6244882.exe 1896 xxfxrrl.exe 1892 ppvpv.exe 1136 04604.exe 1020 862648.exe 376 xlxrlfl.exe -
resource yara_rule behavioral2/memory/1056-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023ca7-3.dat upx behavioral2/memory/1920-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1056-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023caa-9.dat upx behavioral2/memory/1892-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cae-15.dat upx behavioral2/files/0x0007000000023cb0-18.dat upx behavioral2/memory/2432-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-23.dat upx behavioral2/memory/4944-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb2-29.dat upx behavioral2/memory/2476-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2972-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb3-35.dat upx behavioral2/memory/2476-37-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb4-39.dat upx behavioral2/memory/944-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb5-44.dat upx behavioral2/files/0x0007000000023cb6-48.dat upx behavioral2/memory/4252-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3160-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb7-53.dat upx behavioral2/memory/800-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb8-58.dat upx behavioral2/files/0x0007000000023cb9-64.dat upx behavioral2/memory/2124-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cba-68.dat upx behavioral2/memory/3772-69-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbb-73.dat upx behavioral2/memory/1484-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbc-78.dat upx behavioral2/files/0x0007000000023cbd-83.dat upx behavioral2/memory/3636-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4860-85-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbe-88.dat upx behavioral2/files/0x0007000000023cbf-92.dat upx behavioral2/memory/2308-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc0-97.dat upx behavioral2/memory/4516-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc1-102.dat upx behavioral2/files/0x0007000000023cc2-106.dat upx behavioral2/files/0x0007000000023cc3-110.dat upx behavioral2/files/0x0007000000023cc4-114.dat upx behavioral2/memory/4840-115-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc5-119.dat upx behavioral2/files/0x0008000000023cab-123.dat upx behavioral2/memory/1756-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc6-128.dat upx behavioral2/files/0x0007000000023cc7-132.dat upx behavioral2/memory/4792-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc8-137.dat upx behavioral2/files/0x0007000000023cc9-141.dat upx behavioral2/files/0x0007000000023cca-145.dat upx behavioral2/memory/3592-147-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4824-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccc-151.dat upx behavioral2/memory/4824-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4544-158-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2028-164-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3484-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2376-173-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4640-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5032-183-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m8606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u466088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4466840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4288822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2660000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1920 1056 59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe 83 PID 1056 wrote to memory of 1920 1056 59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe 83 PID 1056 wrote to memory of 1920 1056 59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe 83 PID 1920 wrote to memory of 1892 1920 8248480.exe 84 PID 1920 wrote to memory of 1892 1920 8248480.exe 84 PID 1920 wrote to memory of 1892 1920 8248480.exe 84 PID 1892 wrote to memory of 2432 1892 rlllffx.exe 85 PID 1892 wrote to memory of 2432 1892 rlllffx.exe 85 PID 1892 wrote to memory of 2432 1892 rlllffx.exe 85 PID 2432 wrote to memory of 4944 2432 dvjvj.exe 86 PID 2432 wrote to memory of 4944 2432 dvjvj.exe 86 PID 2432 wrote to memory of 4944 2432 dvjvj.exe 86 PID 4944 wrote to memory of 2972 4944 thnnbb.exe 87 PID 4944 wrote to memory of 2972 4944 thnnbb.exe 87 PID 4944 wrote to memory of 2972 4944 thnnbb.exe 87 PID 2972 wrote to memory of 2476 2972 rlrflfl.exe 88 PID 2972 wrote to memory of 2476 2972 rlrflfl.exe 88 PID 2972 wrote to memory of 2476 2972 rlrflfl.exe 88 PID 2476 wrote to memory of 944 2476 pdpvd.exe 89 PID 2476 wrote to memory of 944 2476 pdpvd.exe 89 PID 2476 wrote to memory of 944 2476 pdpvd.exe 89 PID 944 wrote to memory of 2800 944 g2486.exe 90 PID 944 wrote to memory of 2800 944 g2486.exe 90 PID 944 wrote to memory of 2800 944 g2486.exe 90 PID 2800 wrote to memory of 4252 2800 pdvpd.exe 91 PID 2800 wrote to memory of 4252 2800 pdvpd.exe 91 PID 2800 wrote to memory of 4252 2800 pdvpd.exe 91 PID 4252 wrote to memory of 3160 4252 g2860.exe 92 PID 4252 wrote to memory of 3160 4252 g2860.exe 92 PID 4252 wrote to memory of 3160 4252 g2860.exe 92 PID 3160 wrote to memory of 800 3160 u048266.exe 93 PID 3160 wrote to memory of 800 3160 u048266.exe 93 PID 3160 wrote to memory of 800 3160 u048266.exe 93 PID 800 wrote to memory of 2124 800 htbtnn.exe 94 PID 800 wrote to memory of 2124 800 htbtnn.exe 94 PID 800 wrote to memory of 2124 800 htbtnn.exe 94 PID 2124 wrote to memory of 3772 2124 tbhntn.exe 95 PID 2124 wrote to memory of 3772 2124 tbhntn.exe 95 PID 2124 wrote to memory of 3772 2124 tbhntn.exe 95 PID 3772 wrote to memory of 1484 3772 862622.exe 96 PID 3772 wrote to memory of 1484 3772 862622.exe 96 PID 3772 wrote to memory of 1484 3772 862622.exe 96 PID 1484 wrote to memory of 3636 1484 608822.exe 97 PID 1484 wrote to memory of 3636 1484 608822.exe 97 PID 1484 wrote to memory of 3636 1484 608822.exe 97 PID 3636 wrote to memory of 4860 3636 fxxrxrx.exe 98 PID 3636 wrote to memory of 4860 3636 fxxrxrx.exe 98 PID 3636 wrote to memory of 4860 3636 fxxrxrx.exe 98 PID 4860 wrote to memory of 1436 4860 040048.exe 99 PID 4860 wrote to memory of 1436 4860 040048.exe 99 PID 4860 wrote to memory of 1436 4860 040048.exe 99 PID 1436 wrote to memory of 2308 1436 08080.exe 100 PID 1436 wrote to memory of 2308 1436 08080.exe 100 PID 1436 wrote to memory of 2308 1436 08080.exe 100 PID 2308 wrote to memory of 4516 2308 4682220.exe 101 PID 2308 wrote to memory of 4516 2308 4682220.exe 101 PID 2308 wrote to memory of 4516 2308 4682220.exe 101 PID 4516 wrote to memory of 2384 4516 bthbtt.exe 102 PID 4516 wrote to memory of 2384 4516 bthbtt.exe 102 PID 4516 wrote to memory of 2384 4516 bthbtt.exe 102 PID 2384 wrote to memory of 3612 2384 tnbthh.exe 103 PID 2384 wrote to memory of 3612 2384 tnbthh.exe 103 PID 2384 wrote to memory of 3612 2384 tnbthh.exe 103 PID 3612 wrote to memory of 468 3612 pjjjp.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe"C:\Users\Admin\AppData\Local\Temp\59b453f73a829ef3b14d307c36f75ed4d7812f5035c358a780369d8b766ea734.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\8248480.exec:\8248480.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\rlllffx.exec:\rlllffx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\dvjvj.exec:\dvjvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\thnnbb.exec:\thnnbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\rlrflfl.exec:\rlrflfl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\pdpvd.exec:\pdpvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\g2486.exec:\g2486.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
\??\c:\pdvpd.exec:\pdvpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\g2860.exec:\g2860.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\u048266.exec:\u048266.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\htbtnn.exec:\htbtnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
\??\c:\tbhntn.exec:\tbhntn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\862622.exec:\862622.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\608822.exec:\608822.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
\??\c:\fxxrxrx.exec:\fxxrxrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\040048.exec:\040048.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\08080.exec:\08080.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\4682220.exec:\4682220.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\bthbtt.exec:\bthbtt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\tnbthh.exec:\tnbthh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\pjjjp.exec:\pjjjp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\rrxlfxr.exec:\rrxlfxr.exe23⤵
- Executes dropped EXE
PID:468 -
\??\c:\jjpjp.exec:\jjpjp.exe24⤵
- Executes dropped EXE
PID:4840 -
\??\c:\0422464.exec:\0422464.exe25⤵
- Executes dropped EXE
PID:1116 -
\??\c:\824004.exec:\824004.exe26⤵
- Executes dropped EXE
PID:2440 -
\??\c:\0000444.exec:\0000444.exe27⤵
- Executes dropped EXE
PID:1756 -
\??\c:\k68266.exec:\k68266.exe28⤵
- Executes dropped EXE
PID:1104 -
\??\c:\7rllflr.exec:\7rllflr.exe29⤵
- Executes dropped EXE
PID:4792 -
\??\c:\c022444.exec:\c022444.exe30⤵
- Executes dropped EXE
PID:4080 -
\??\c:\o068664.exec:\o068664.exe31⤵
- Executes dropped EXE
PID:3592 -
\??\c:\0226660.exec:\0226660.exe32⤵
- Executes dropped EXE
PID:4824 -
\??\c:\rfffxxx.exec:\rfffxxx.exe33⤵
- Executes dropped EXE
PID:4820 -
\??\c:\824804.exec:\824804.exe34⤵
- Executes dropped EXE
PID:4544 -
\??\c:\nhbnhb.exec:\nhbnhb.exe35⤵
- Executes dropped EXE
PID:936 -
\??\c:\xrrfllf.exec:\xrrfllf.exe36⤵
- Executes dropped EXE
PID:2028 -
\??\c:\nbbthh.exec:\nbbthh.exe37⤵
- Executes dropped EXE
PID:2752 -
\??\c:\hnhhnt.exec:\hnhhnt.exe38⤵
- Executes dropped EXE
PID:3484 -
\??\c:\9tnhhh.exec:\9tnhhh.exe39⤵
- Executes dropped EXE
PID:2712 -
\??\c:\6886826.exec:\6886826.exe40⤵
- Executes dropped EXE
PID:2376 -
\??\c:\42886.exec:\42886.exe41⤵
- Executes dropped EXE
PID:3812 -
\??\c:\28086.exec:\28086.exe42⤵
- Executes dropped EXE
PID:2172 -
\??\c:\3pjvp.exec:\3pjvp.exe43⤵
- Executes dropped EXE
PID:4640 -
\??\c:\200826.exec:\200826.exe44⤵
- Executes dropped EXE
PID:5032 -
\??\c:\ffllrlf.exec:\ffllrlf.exe45⤵
- Executes dropped EXE
PID:1052 -
\??\c:\k46086.exec:\k46086.exe46⤵
- Executes dropped EXE
PID:4788 -
\??\c:\i442660.exec:\i442660.exe47⤵
- Executes dropped EXE
PID:1824 -
\??\c:\22602.exec:\22602.exe48⤵
- Executes dropped EXE
PID:4368 -
\??\c:\vpjdv.exec:\vpjdv.exe49⤵
- Executes dropped EXE
PID:620 -
\??\c:\hhnbhb.exec:\hhnbhb.exe50⤵
- Executes dropped EXE
PID:1340 -
\??\c:\lxlrfxl.exec:\lxlrfxl.exe51⤵
- Executes dropped EXE
PID:2056 -
\??\c:\02482.exec:\02482.exe52⤵
- Executes dropped EXE
PID:3580 -
\??\c:\2828820.exec:\2828820.exe53⤵
- Executes dropped EXE
PID:2632 -
\??\c:\48066.exec:\48066.exe54⤵
- Executes dropped EXE
PID:4476 -
\??\c:\jpvvd.exec:\jpvvd.exe55⤵
- Executes dropped EXE
PID:3908 -
\??\c:\tnthbh.exec:\tnthbh.exe56⤵
- Executes dropped EXE
PID:1404 -
\??\c:\9tnntt.exec:\9tnntt.exe57⤵
- Executes dropped EXE
PID:4248 -
\??\c:\484866.exec:\484866.exe58⤵
- Executes dropped EXE
PID:1524 -
\??\c:\e28484.exec:\e28484.exe59⤵
- Executes dropped EXE
PID:4472 -
\??\c:\6244882.exec:\6244882.exe60⤵
- Executes dropped EXE
PID:2400 -
\??\c:\xxfxrrl.exec:\xxfxrrl.exe61⤵
- Executes dropped EXE
PID:1896 -
\??\c:\ppvpv.exec:\ppvpv.exe62⤵
- Executes dropped EXE
PID:1892 -
\??\c:\04604.exec:\04604.exe63⤵
- Executes dropped EXE
PID:1136 -
\??\c:\862648.exec:\862648.exe64⤵
- Executes dropped EXE
PID:1020 -
\??\c:\xlxrlfl.exec:\xlxrlfl.exe65⤵
- Executes dropped EXE
PID:376 -
\??\c:\0484220.exec:\0484220.exe66⤵PID:244
-
\??\c:\0626660.exec:\0626660.exe67⤵PID:2972
-
\??\c:\tnhbnb.exec:\tnhbnb.exe68⤵PID:4060
-
\??\c:\8804608.exec:\8804608.exe69⤵PID:1332
-
\??\c:\vpjjv.exec:\vpjjv.exe70⤵PID:4712
-
\??\c:\662648.exec:\662648.exe71⤵PID:1764
-
\??\c:\bhhbnh.exec:\bhhbnh.exe72⤵PID:4796
-
\??\c:\fllrffx.exec:\fllrffx.exe73⤵PID:3744
-
\??\c:\tbbhbb.exec:\tbbhbb.exe74⤵PID:3160
-
\??\c:\jdvjv.exec:\jdvjv.exe75⤵PID:1100
-
\??\c:\7frlrlf.exec:\7frlrlf.exe76⤵PID:3028
-
\??\c:\624826.exec:\624826.exe77⤵PID:2124
-
\??\c:\jvpjj.exec:\jvpjj.exe78⤵PID:2448
-
\??\c:\pvpjd.exec:\pvpjd.exe79⤵PID:1444
-
\??\c:\8860820.exec:\8860820.exe80⤵PID:3352
-
\??\c:\40222.exec:\40222.exe81⤵PID:1196
-
\??\c:\264208.exec:\264208.exe82⤵PID:3112
-
\??\c:\420444.exec:\420444.exe83⤵PID:2000
-
\??\c:\6246868.exec:\6246868.exe84⤵PID:2016
-
\??\c:\6460202.exec:\6460202.exe85⤵PID:4508
-
\??\c:\rlxrffx.exec:\rlxrffx.exe86⤵PID:4088
-
\??\c:\hbhhhn.exec:\hbhhhn.exe87⤵PID:4816
-
\??\c:\084040.exec:\084040.exe88⤵PID:1932
-
\??\c:\vpdpd.exec:\vpdpd.exe89⤵PID:3612
-
\??\c:\422204.exec:\422204.exe90⤵PID:4932
-
\??\c:\jdvpv.exec:\jdvpv.exe91⤵PID:3784
-
\??\c:\tbthnn.exec:\tbthnn.exe92⤵PID:2996
-
\??\c:\60026.exec:\60026.exe93⤵PID:3288
-
\??\c:\pppjv.exec:\pppjv.exe94⤵PID:4052
-
\??\c:\20446.exec:\20446.exe95⤵PID:3264
-
\??\c:\448826.exec:\448826.exe96⤵PID:4588
-
\??\c:\824226.exec:\824226.exe97⤵PID:1104
-
\??\c:\240088.exec:\240088.exe98⤵PID:848
-
\??\c:\xrxrfxr.exec:\xrxrfxr.exe99⤵PID:5092
-
\??\c:\464482.exec:\464482.exe100⤵PID:3592
-
\??\c:\tbtnbb.exec:\tbtnbb.exe101⤵PID:4280
-
\??\c:\440482.exec:\440482.exe102⤵PID:4928
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe103⤵PID:4396
-
\??\c:\rfxrlfx.exec:\rfxrlfx.exe104⤵PID:3040
-
\??\c:\pdvpj.exec:\pdvpj.exe105⤵PID:1172
-
\??\c:\bthnnn.exec:\bthnnn.exe106⤵PID:1316
-
\??\c:\pvppj.exec:\pvppj.exe107⤵PID:3608
-
\??\c:\62484.exec:\62484.exe108⤵PID:2752
-
\??\c:\06640.exec:\06640.exe109⤵PID:872
-
\??\c:\5nnbbt.exec:\5nnbbt.exe110⤵PID:4896
-
\??\c:\84046.exec:\84046.exe111⤵PID:2376
-
\??\c:\22260.exec:\22260.exe112⤵PID:3812
-
\??\c:\bttbht.exec:\bttbht.exe113⤵PID:2172
-
\??\c:\8624248.exec:\8624248.exe114⤵PID:1924
-
\??\c:\862600.exec:\862600.exe115⤵PID:3692
-
\??\c:\nnhbnb.exec:\nnhbnb.exe116⤵PID:224
-
\??\c:\08806.exec:\08806.exe117⤵PID:3984
-
\??\c:\820602.exec:\820602.exe118⤵PID:3180
-
\??\c:\6404226.exec:\6404226.exe119⤵PID:1340
-
\??\c:\622086.exec:\622086.exe120⤵PID:4000
-
\??\c:\tnnnbb.exec:\tnnnbb.exe121⤵PID:2424
-
\??\c:\00264.exec:\00264.exe122⤵PID:1624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-