Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 05:19
Behavioral task
behavioral1
Sample
025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe
Resource
win7-20240903-en
General
-
Target
025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe
-
Size
127KB
-
MD5
37087dfa868e04dc799d9f2ec998c28b
-
SHA1
c7513b127e2d1e57dad4c55ad114a498e454bd05
-
SHA256
025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6
-
SHA512
17ad5981bf0611528a2dd0f9f8dd01bd2c454a62704e81eabb371123ee48dd4a495111d3efaeeffb471434b66ba5fb70c752ba0af9d2905fdf7847d4b3e627fa
-
SSDEEP
3072:chOmTsF93UYfwC6GIout5pi8rY9AABa1JePQKN1hJCJ2owWT:ccm4FmowdHoS5ddW7Y6XJCJ9T
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2204-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2168-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4088-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2324-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1832-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/624-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1920-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3936-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3216-62-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2688-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/312-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4304-81-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4336-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2852-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4712-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2368-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3020-110-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3168-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2492-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3040-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1700-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/520-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4452-168-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4348-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2184-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/776-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4180-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1820-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3424-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/636-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3940-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2204-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3948-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1192-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4904-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4560-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1832-282-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3956-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1060-298-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2980-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2404-318-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4756-337-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4448-341-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/384-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3784-365-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3268-369-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1372-397-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3952-425-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/220-444-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1196-473-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3836-485-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-543-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4040-562-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/764-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2672-590-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2460-648-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2672-769-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/928-932-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-969-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1952-1366-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3080-1436-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3040-1558-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
228044.exehhhttt.exexxllrlx.exe240444.exeq40266.exe6082822.exebtbhhb.exe480060.exe4086664.exejdjjd.exefllrxxf.exe4802284.exehhnbnn.exedjdpv.exe884882.exe402888.exe2244444.exem2444.exevjdvp.exedjpjp.exexxrrxxx.exe62060.exe2806262.exenbhhbb.exe26666.exebthhhn.exejjddd.exerflxlfx.exe408086.exe84000.exehbnnbb.exebbntnn.exe46448.exe40200.exennbtth.exe7rrrlxr.exe600004.exejvjvd.exefflxrll.exe26600.exexxfllff.exejvdvp.exe468822.exevpjdv.exe7jppj.exettnnnn.exe088882.exerlfxrrr.exettnhbh.exe00284.exe06682.exefffxflr.exe446664.exe6608080.exevpjdv.exe8448226.exejdjdd.exetntthh.exexxxxxxr.exebnhhhh.exe7vjjj.exe842624.exe882086.exe82600.exepid Process 2904 228044.exe 2168 hhhttt.exe 4088 xxllrlx.exe 2324 240444.exe 1832 q40266.exe 1920 6082822.exe 624 btbhhb.exe 3936 480060.exe 4468 4086664.exe 3216 jdjjd.exe 2688 fllrxxf.exe 312 4802284.exe 4304 hhnbnn.exe 4336 djdpv.exe 2852 884882.exe 4712 402888.exe 2368 2244444.exe 3020 m2444.exe 2492 vjdvp.exe 3168 djpjp.exe 3040 xxrrxxx.exe 2784 62060.exe 1700 2806262.exe 4592 nbhhbb.exe 2176 26666.exe 3432 bthhhn.exe 520 jjddd.exe 3016 rflxlfx.exe 4452 408086.exe 4348 84000.exe 4688 hbnnbb.exe 2184 bbntnn.exe 776 46448.exe 4180 40200.exe 1820 nnbtth.exe 3424 7rrrlxr.exe 636 600004.exe 2148 jvjvd.exe 3292 fflxrll.exe 228 26600.exe 1980 xxfllff.exe 2676 jvdvp.exe 3940 468822.exe 3396 vpjdv.exe 1964 7jppj.exe 3332 ttnnnn.exe 848 088882.exe 4680 rlfxrrr.exe 3860 ttnhbh.exe 4388 00284.exe 3672 06682.exe 2204 fffxflr.exe 2044 446664.exe 2504 6608080.exe 3948 vpjdv.exe 1192 8448226.exe 4904 jdjdd.exe 4560 tntthh.exe 3836 xxxxxxr.exe 1832 bnhhhh.exe 3956 7vjjj.exe 4344 842624.exe 2088 882086.exe 4616 82600.exe -
Processes:
resource yara_rule behavioral2/memory/2204-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000d000000023b8f-3.dat upx behavioral2/memory/2204-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7a-11.dat upx behavioral2/memory/2904-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7b-13.dat upx behavioral2/memory/2168-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7c-21.dat upx behavioral2/memory/4088-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7d-27.dat upx behavioral2/memory/2324-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1832-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7e-33.dat upx behavioral2/files/0x0007000000023c80-44.dat upx behavioral2/memory/624-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7f-41.dat upx behavioral2/memory/1920-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3936-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c81-50.dat upx behavioral2/files/0x0007000000023c82-55.dat upx behavioral2/files/0x0007000000023c83-60.dat upx behavioral2/memory/3216-62-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2688-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c84-69.dat upx behavioral2/memory/312-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c85-75.dat upx behavioral2/memory/4304-81-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c86-80.dat upx behavioral2/files/0x0007000000023c87-84.dat upx behavioral2/memory/4336-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c88-90.dat upx behavioral2/memory/2852-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c89-96.dat upx behavioral2/memory/4712-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2368-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8a-102.dat upx behavioral2/files/0x0007000000023c8b-108.dat upx behavioral2/memory/3020-110-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8c-114.dat upx behavioral2/memory/3168-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2492-116-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c77-121.dat upx behavioral2/files/0x0007000000023c8e-128.dat upx behavioral2/memory/3040-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8f-132.dat upx behavioral2/files/0x0007000000023c90-137.dat upx behavioral2/memory/1700-140-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c91-143.dat upx behavioral2/memory/2176-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c92-148.dat upx behavioral2/files/0x0007000000023c93-153.dat upx behavioral2/memory/520-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4452-168-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c96-170.dat upx behavioral2/memory/4348-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c97-176.dat upx behavioral2/files/0x0007000000023c98-182.dat upx behavioral2/files/0x0007000000023c95-166.dat upx behavioral2/files/0x0007000000023c94-159.dat upx behavioral2/memory/2184-187-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/776-191-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4180-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1820-199-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3424-203-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bbntnn.exe04222.exe3jjjd.exe088260.exe8800460.exe26480.exe664064.exexfllflf.exenthbtn.exe1nnhbt.exexxffrlr.exelxfxxrr.exefllxrrr.exe8200668.exelxrxllx.exejdjdp.exerrlxrfr.exe62066.exefflfffx.exe8024444.exe200868.exe624084.exedvpjd.exei282022.exe820600.exepvjpj.exe4288440.exevjvvv.exe688800.exe868264.exexlxllfl.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8800460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 664064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfllflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8200668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlxrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8024444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i282022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4288440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 868264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxllfl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe228044.exehhhttt.exexxllrlx.exe240444.exeq40266.exe6082822.exebtbhhb.exe480060.exe4086664.exejdjjd.exefllrxxf.exe4802284.exehhnbnn.exedjdpv.exe884882.exe402888.exe2244444.exem2444.exevjdvp.exedjpjp.exexxrrxxx.exedescription pid Process procid_target PID 2204 wrote to memory of 2904 2204 025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe 83 PID 2204 wrote to memory of 2904 2204 025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe 83 PID 2204 wrote to memory of 2904 2204 025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe 83 PID 2904 wrote to memory of 2168 2904 228044.exe 84 PID 2904 wrote to memory of 2168 2904 228044.exe 84 PID 2904 wrote to memory of 2168 2904 228044.exe 84 PID 2168 wrote to memory of 4088 2168 hhhttt.exe 85 PID 2168 wrote to memory of 4088 2168 hhhttt.exe 85 PID 2168 wrote to memory of 4088 2168 hhhttt.exe 85 PID 4088 wrote to memory of 2324 4088 xxllrlx.exe 86 PID 4088 wrote to memory of 2324 4088 xxllrlx.exe 86 PID 4088 wrote to memory of 2324 4088 xxllrlx.exe 86 PID 2324 wrote to memory of 1832 2324 240444.exe 87 PID 2324 wrote to memory of 1832 2324 240444.exe 87 PID 2324 wrote to memory of 1832 2324 240444.exe 87 PID 1832 wrote to memory of 1920 1832 q40266.exe 88 PID 1832 wrote to memory of 1920 1832 q40266.exe 88 PID 1832 wrote to memory of 1920 1832 q40266.exe 88 PID 1920 wrote to memory of 624 1920 6082822.exe 89 PID 1920 wrote to memory of 624 1920 6082822.exe 89 PID 1920 wrote to memory of 624 1920 6082822.exe 89 PID 624 wrote to memory of 3936 624 btbhhb.exe 90 PID 624 wrote to memory of 3936 624 btbhhb.exe 90 PID 624 wrote to memory of 3936 624 btbhhb.exe 90 PID 3936 wrote to memory of 4468 3936 480060.exe 91 PID 3936 wrote to memory of 4468 3936 480060.exe 91 PID 3936 wrote to memory of 4468 3936 480060.exe 91 PID 4468 wrote to memory of 3216 4468 4086664.exe 92 PID 4468 wrote to memory of 3216 4468 4086664.exe 92 PID 4468 wrote to memory of 3216 4468 4086664.exe 92 PID 3216 wrote to memory of 2688 3216 jdjjd.exe 93 PID 3216 wrote to memory of 2688 3216 jdjjd.exe 93 PID 3216 wrote to memory of 2688 3216 jdjjd.exe 93 PID 2688 wrote to memory of 312 2688 fllrxxf.exe 94 PID 2688 wrote to memory of 312 2688 fllrxxf.exe 94 PID 2688 wrote to memory of 312 2688 fllrxxf.exe 94 PID 312 wrote to memory of 4304 312 4802284.exe 95 PID 312 wrote to memory of 4304 312 4802284.exe 95 PID 312 wrote to memory of 4304 312 4802284.exe 95 PID 4304 wrote to memory of 4336 4304 hhnbnn.exe 96 PID 4304 wrote to memory of 4336 4304 hhnbnn.exe 96 PID 4304 wrote to memory of 4336 4304 hhnbnn.exe 96 PID 4336 wrote to memory of 2852 4336 djdpv.exe 97 PID 4336 wrote to memory of 2852 4336 djdpv.exe 97 PID 4336 wrote to memory of 2852 4336 djdpv.exe 97 PID 2852 wrote to memory of 4712 2852 884882.exe 98 PID 2852 wrote to memory of 4712 2852 884882.exe 98 PID 2852 wrote to memory of 4712 2852 884882.exe 98 PID 4712 wrote to memory of 2368 4712 402888.exe 99 PID 4712 wrote to memory of 2368 4712 402888.exe 99 PID 4712 wrote to memory of 2368 4712 402888.exe 99 PID 2368 wrote to memory of 3020 2368 2244444.exe 100 PID 2368 wrote to memory of 3020 2368 2244444.exe 100 PID 2368 wrote to memory of 3020 2368 2244444.exe 100 PID 3020 wrote to memory of 2492 3020 m2444.exe 101 PID 3020 wrote to memory of 2492 3020 m2444.exe 101 PID 3020 wrote to memory of 2492 3020 m2444.exe 101 PID 2492 wrote to memory of 3168 2492 vjdvp.exe 102 PID 2492 wrote to memory of 3168 2492 vjdvp.exe 102 PID 2492 wrote to memory of 3168 2492 vjdvp.exe 102 PID 3168 wrote to memory of 3040 3168 djpjp.exe 103 PID 3168 wrote to memory of 3040 3168 djpjp.exe 103 PID 3168 wrote to memory of 3040 3168 djpjp.exe 103 PID 3040 wrote to memory of 2784 3040 xxrrxxx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe"C:\Users\Admin\AppData\Local\Temp\025363a853d4fd548ae83c95ae4e3dbac9d16b04e2ec92126363cb9fd83568c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\228044.exec:\228044.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\hhhttt.exec:\hhhttt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\xxllrlx.exec:\xxllrlx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\240444.exec:\240444.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\q40266.exec:\q40266.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\6082822.exec:\6082822.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\btbhhb.exec:\btbhhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
\??\c:\480060.exec:\480060.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\4086664.exec:\4086664.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
\??\c:\jdjjd.exec:\jdjjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\fllrxxf.exec:\fllrxxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\4802284.exec:\4802284.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
\??\c:\hhnbnn.exec:\hhnbnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
\??\c:\djdpv.exec:\djdpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
\??\c:\884882.exec:\884882.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\402888.exec:\402888.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
\??\c:\2244444.exec:\2244444.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\m2444.exec:\m2444.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vjdvp.exec:\vjdvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\djpjp.exec:\djpjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\xxrrxxx.exec:\xxrrxxx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\62060.exec:\62060.exe23⤵
- Executes dropped EXE
PID:2784 -
\??\c:\2806262.exec:\2806262.exe24⤵
- Executes dropped EXE
PID:1700 -
\??\c:\nbhhbb.exec:\nbhhbb.exe25⤵
- Executes dropped EXE
PID:4592 -
\??\c:\26666.exec:\26666.exe26⤵
- Executes dropped EXE
PID:2176 -
\??\c:\bthhhn.exec:\bthhhn.exe27⤵
- Executes dropped EXE
PID:3432 -
\??\c:\jjddd.exec:\jjddd.exe28⤵
- Executes dropped EXE
PID:520 -
\??\c:\rflxlfx.exec:\rflxlfx.exe29⤵
- Executes dropped EXE
PID:3016 -
\??\c:\408086.exec:\408086.exe30⤵
- Executes dropped EXE
PID:4452 -
\??\c:\84000.exec:\84000.exe31⤵
- Executes dropped EXE
PID:4348 -
\??\c:\hbnnbb.exec:\hbnnbb.exe32⤵
- Executes dropped EXE
PID:4688 -
\??\c:\bbntnn.exec:\bbntnn.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184 -
\??\c:\46448.exec:\46448.exe34⤵
- Executes dropped EXE
PID:776 -
\??\c:\40200.exec:\40200.exe35⤵
- Executes dropped EXE
PID:4180 -
\??\c:\nnbtth.exec:\nnbtth.exe36⤵
- Executes dropped EXE
PID:1820 -
\??\c:\7rrrlxr.exec:\7rrrlxr.exe37⤵
- Executes dropped EXE
PID:3424 -
\??\c:\600004.exec:\600004.exe38⤵
- Executes dropped EXE
PID:636 -
\??\c:\jvjvd.exec:\jvjvd.exe39⤵
- Executes dropped EXE
PID:2148 -
\??\c:\fflxrll.exec:\fflxrll.exe40⤵
- Executes dropped EXE
PID:3292 -
\??\c:\26600.exec:\26600.exe41⤵
- Executes dropped EXE
PID:228 -
\??\c:\xxfllff.exec:\xxfllff.exe42⤵
- Executes dropped EXE
PID:1980 -
\??\c:\jvdvp.exec:\jvdvp.exe43⤵
- Executes dropped EXE
PID:2676 -
\??\c:\468822.exec:\468822.exe44⤵
- Executes dropped EXE
PID:3940 -
\??\c:\vpjdv.exec:\vpjdv.exe45⤵
- Executes dropped EXE
PID:3396 -
\??\c:\7jppj.exec:\7jppj.exe46⤵
- Executes dropped EXE
PID:1964 -
\??\c:\ttnnnn.exec:\ttnnnn.exe47⤵
- Executes dropped EXE
PID:3332 -
\??\c:\088882.exec:\088882.exe48⤵
- Executes dropped EXE
PID:848 -
\??\c:\rlfxrrr.exec:\rlfxrrr.exe49⤵
- Executes dropped EXE
PID:4680 -
\??\c:\ttnhbh.exec:\ttnhbh.exe50⤵
- Executes dropped EXE
PID:3860 -
\??\c:\00284.exec:\00284.exe51⤵
- Executes dropped EXE
PID:4388 -
\??\c:\06682.exec:\06682.exe52⤵
- Executes dropped EXE
PID:3672 -
\??\c:\fffxflr.exec:\fffxflr.exe53⤵
- Executes dropped EXE
PID:2204 -
\??\c:\446664.exec:\446664.exe54⤵
- Executes dropped EXE
PID:2044 -
\??\c:\6608080.exec:\6608080.exe55⤵
- Executes dropped EXE
PID:2504 -
\??\c:\vpjdv.exec:\vpjdv.exe56⤵
- Executes dropped EXE
PID:3948 -
\??\c:\8448226.exec:\8448226.exe57⤵
- Executes dropped EXE
PID:1192 -
\??\c:\jdjdd.exec:\jdjdd.exe58⤵
- Executes dropped EXE
PID:4904 -
\??\c:\tntthh.exec:\tntthh.exe59⤵
- Executes dropped EXE
PID:4560 -
\??\c:\xxxxxxr.exec:\xxxxxxr.exe60⤵
- Executes dropped EXE
PID:3836 -
\??\c:\bnhhhh.exec:\bnhhhh.exe61⤵
- Executes dropped EXE
PID:1832 -
\??\c:\7vjjj.exec:\7vjjj.exe62⤵
- Executes dropped EXE
PID:3956 -
\??\c:\842624.exec:\842624.exe63⤵
- Executes dropped EXE
PID:4344 -
\??\c:\882086.exec:\882086.exe64⤵
- Executes dropped EXE
PID:2088 -
\??\c:\82600.exec:\82600.exe65⤵
- Executes dropped EXE
PID:4616 -
\??\c:\pdpdv.exec:\pdpdv.exe66⤵PID:1060
-
\??\c:\pjpjj.exec:\pjpjj.exe67⤵PID:1460
-
\??\c:\nttttn.exec:\nttttn.exe68⤵PID:1924
-
\??\c:\22242.exec:\22242.exe69⤵PID:2328
-
\??\c:\248206.exec:\248206.exe70⤵PID:2980
-
\??\c:\i626000.exec:\i626000.exe71⤵PID:4660
-
\??\c:\2844886.exec:\2844886.exe72⤵PID:2404
-
\??\c:\lxxxffl.exec:\lxxxffl.exe73⤵PID:2468
-
\??\c:\02666.exec:\02666.exe74⤵PID:2852
-
\??\c:\k68266.exec:\k68266.exe75⤵PID:5084
-
\??\c:\a4060.exec:\a4060.exe76⤵PID:2252
-
\??\c:\fffrxrf.exec:\fffrxrf.exe77⤵PID:1736
-
\??\c:\htttnt.exec:\htttnt.exe78⤵PID:4756
-
\??\c:\2864848.exec:\2864848.exe79⤵PID:4448
-
\??\c:\jvdvv.exec:\jvdvv.exe80⤵PID:1188
-
\??\c:\jjvdj.exec:\jjvdj.exe81⤵PID:3168
-
\??\c:\02488.exec:\02488.exe82⤵PID:4620
-
\??\c:\nbtnhn.exec:\nbtnhn.exe83⤵PID:4764
-
\??\c:\q20220.exec:\q20220.exe84⤵PID:1816
-
\??\c:\xxlfrlr.exec:\xxlfrlr.exe85⤵PID:384
-
\??\c:\pjjvj.exec:\pjjvj.exe86⤵PID:3784
-
\??\c:\dddvd.exec:\dddvd.exe87⤵PID:3268
-
\??\c:\nbhnnb.exec:\nbhnnb.exe88⤵PID:2176
-
\??\c:\42824.exec:\42824.exe89⤵PID:1044
-
\??\c:\pdjjd.exec:\pdjjd.exe90⤵PID:1704
-
\??\c:\688800.exec:\688800.exe91⤵
- System Location Discovery: System Language Discovery
PID:2428 -
\??\c:\w46606.exec:\w46606.exe92⤵PID:928
-
\??\c:\468200.exec:\468200.exe93⤵PID:912
-
\??\c:\44448.exec:\44448.exe94⤵PID:2900
-
\??\c:\e06666.exec:\e06666.exe95⤵PID:3084
-
\??\c:\ppjjj.exec:\ppjjj.exe96⤵PID:1372
-
\??\c:\vjddv.exec:\vjddv.exe97⤵PID:4796
-
\??\c:\442244.exec:\442244.exe98⤵PID:60
-
\??\c:\020620.exec:\020620.exe99⤵PID:4316
-
\??\c:\rrfrlrr.exec:\rrfrlrr.exe100⤵PID:3080
-
\??\c:\dvddd.exec:\dvddd.exe101⤵PID:1804
-
\??\c:\42022.exec:\42022.exe102⤵PID:3004
-
\??\c:\3vjvj.exec:\3vjvj.exe103⤵PID:1568
-
\??\c:\040420.exec:\040420.exe104⤵PID:2028
-
\??\c:\040048.exec:\040048.exe105⤵PID:3952
-
\??\c:\w86604.exec:\w86604.exe106⤵PID:1588
-
\??\c:\2606440.exec:\2606440.exe107⤵PID:4996
-
\??\c:\8844448.exec:\8844448.exe108⤵PID:2676
-
\??\c:\0626448.exec:\0626448.exe109⤵PID:3940
-
\??\c:\8860826.exec:\8860826.exe110⤵PID:3396
-
\??\c:\bnbthh.exec:\bnbthh.exe111⤵PID:220
-
\??\c:\jpjdp.exec:\jpjdp.exe112⤵PID:4844
-
\??\c:\a0266.exec:\a0266.exe113⤵PID:848
-
\??\c:\8402660.exec:\8402660.exe114⤵PID:4680
-
\??\c:\5jdjd.exec:\5jdjd.exe115⤵PID:3624
-
\??\c:\9lrllxr.exec:\9lrllxr.exe116⤵PID:4376
-
\??\c:\204826.exec:\204826.exe117⤵PID:4064
-
\??\c:\6044062.exec:\6044062.exe118⤵PID:2760
-
\??\c:\pvjpj.exec:\pvjpj.exe119⤵
- System Location Discovery: System Language Discovery
PID:2044 -
\??\c:\680044.exec:\680044.exe120⤵PID:4444
-
\??\c:\40282.exec:\40282.exe121⤵PID:1196
-
\??\c:\866466.exec:\866466.exe122⤵PID:1240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-