Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 01:15
Behavioral task
behavioral1
Sample
816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe
Resource
win7-20241010-en
9 signatures
150 seconds
General
-
Target
816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe
-
Size
3.7MB
-
MD5
e4e25488fbc309a598599b07328b7861
-
SHA1
3bc74d4780b35f828faeba895ab308ce7de225a2
-
SHA256
816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962
-
SHA512
cf531951a0bac8205761d0cdf63bd46f88c4c9b189453b22dc8d541c5438fef53d490b5b03548228d2d6ffbdce8400921ebc77c003e6d7a277116c10935b11f8
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98z:U6XLq/qPPslzKx/dJg1ErmNM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2480-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4124-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3676-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3124-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4028-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3912-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3048-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/840-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3108-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4264-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4340-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3392-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1892-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1696-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2172-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1776-139-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2436-150-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/460-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3584-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2124-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1568-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1032-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3628-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1212-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4448-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4220-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3264-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5020-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4660-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4516-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4004-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2028-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-264-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4616-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2980-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2380-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4620-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3028-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2336-323-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1360-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1568-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2204-350-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5052-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3604-385-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4660-407-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2820-456-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1284-493-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4192-500-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-538-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5020-548-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4000-594-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1360-655-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3728-737-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3924-796-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4644-816-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1136-898-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2908-989-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1980-1029-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1736-1574-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3412-1683-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 4124 vvjdj.exe 3676 jjdvj.exe 3124 hhttbb.exe 4028 vjpjd.exe 3048 rlrrlfr.exe 3912 nnnhhb.exe 840 jdjpd.exe 3108 lrrxlfr.exe 4264 xffrlxr.exe 3148 frffxrx.exe 4340 lfxlfrf.exe 2980 tbbhtn.exe 3392 djvpj.exe 4564 hnnbnh.exe 4376 5bhtnn.exe 1892 djdvj.exe 2312 djjvp.exe 2068 xxrxlxl.exe 2896 rrxxrxx.exe 1696 lxxxrrl.exe 2172 jvjjd.exe 4756 bbhbtb.exe 1680 nhhhbb.exe 1776 dvjdv.exe 2436 xfrlfff.exe 4036 tnttnn.exe 460 ppvvv.exe 3584 1bnhhh.exe 3672 xfffflf.exe 2124 fxfxrrl.exe 2520 bhtttn.exe 1568 lxlfxrl.exe 1032 3vpjj.exe 3628 lrlllxx.exe 2076 vjjdd.exe 2016 vjppd.exe 1212 xlrllff.exe 4860 rllrrxx.exe 4448 pdjdv.exe 4220 jvdvp.exe 5052 rrrlfxl.exe 3264 flrlffx.exe 5020 7ffxllx.exe 4528 flrlfxr.exe 320 dvpjj.exe 1980 pdjvp.exe 4592 tntnhb.exe 3852 nhhttb.exe 4660 thhbbb.exe 4516 flllrxx.exe 2944 frxlfxr.exe 4004 vvppv.exe 2028 jpjjd.exe 3148 jdppv.exe 4972 dpvdp.exe 4616 thnnhb.exe 2980 tbbnbt.exe 1856 htbnnb.exe 2768 5rlxlrf.exe 3776 frfxlfr.exe 4376 vvvjd.exe 1524 pdpjv.exe 2380 hhhhbn.exe 3924 htnbtn.exe -
resource yara_rule behavioral2/memory/2480-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2480-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023c8b-3.dat upx behavioral2/files/0x0007000000023c94-9.dat upx behavioral2/memory/4124-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c95-13.dat upx behavioral2/memory/3676-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c96-21.dat upx behavioral2/memory/3124-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4028-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c97-27.dat upx behavioral2/files/0x0007000000023c98-33.dat upx behavioral2/memory/3912-37-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3048-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c99-42.dat upx behavioral2/files/0x0007000000023c9a-45.dat upx behavioral2/memory/840-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9b-51.dat upx behavioral2/memory/3108-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9c-60.dat upx behavioral2/memory/4264-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9d-63.dat upx behavioral2/memory/3148-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2980-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4340-72-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9e-70.dat upx behavioral2/files/0x0007000000023c9f-78.dat upx behavioral2/memory/4564-85-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3392-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca0-82.dat upx behavioral2/files/0x0007000000023ca1-89.dat upx behavioral2/memory/1892-96-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca2-94.dat upx behavioral2/files/0x0007000000023ca3-100.dat upx behavioral2/files/0x0007000000023ca4-104.dat upx behavioral2/files/0x0007000000023ca5-110.dat upx behavioral2/files/0x0007000000023ca6-115.dat upx behavioral2/files/0x0007000000023ca7-122.dat upx behavioral2/memory/1696-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca9-126.dat upx behavioral2/memory/2172-128-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023caa-131.dat upx behavioral2/memory/1776-139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cab-137.dat upx behavioral2/files/0x0007000000023cac-143.dat upx behavioral2/memory/2436-150-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cad-148.dat upx behavioral2/files/0x0007000000023cae-153.dat upx behavioral2/memory/4036-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/460-157-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023caf-162.dat upx behavioral2/files/0x0007000000023cb0-165.dat upx behavioral2/memory/3584-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-172.dat upx behavioral2/files/0x0007000000023cb2-179.dat upx behavioral2/memory/2124-178-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb3-184.dat upx behavioral2/memory/1568-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1032-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3628-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1212-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4448-213-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4220-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3264-223-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frflxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lfxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrlxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1frlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rlxllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrflfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lrfxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxlxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxrxlx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4124 2480 816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe 83 PID 2480 wrote to memory of 4124 2480 816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe 83 PID 2480 wrote to memory of 4124 2480 816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe 83 PID 4124 wrote to memory of 3676 4124 vvjdj.exe 84 PID 4124 wrote to memory of 3676 4124 vvjdj.exe 84 PID 4124 wrote to memory of 3676 4124 vvjdj.exe 84 PID 3676 wrote to memory of 3124 3676 jjdvj.exe 85 PID 3676 wrote to memory of 3124 3676 jjdvj.exe 85 PID 3676 wrote to memory of 3124 3676 jjdvj.exe 85 PID 3124 wrote to memory of 4028 3124 hhttbb.exe 86 PID 3124 wrote to memory of 4028 3124 hhttbb.exe 86 PID 3124 wrote to memory of 4028 3124 hhttbb.exe 86 PID 4028 wrote to memory of 3048 4028 vjpjd.exe 87 PID 4028 wrote to memory of 3048 4028 vjpjd.exe 87 PID 4028 wrote to memory of 3048 4028 vjpjd.exe 87 PID 3048 wrote to memory of 3912 3048 rlrrlfr.exe 88 PID 3048 wrote to memory of 3912 3048 rlrrlfr.exe 88 PID 3048 wrote to memory of 3912 3048 rlrrlfr.exe 88 PID 3912 wrote to memory of 840 3912 nnnhhb.exe 89 PID 3912 wrote to memory of 840 3912 nnnhhb.exe 89 PID 3912 wrote to memory of 840 3912 nnnhhb.exe 89 PID 840 wrote to memory of 3108 840 jdjpd.exe 90 PID 840 wrote to memory of 3108 840 jdjpd.exe 90 PID 840 wrote to memory of 3108 840 jdjpd.exe 90 PID 3108 wrote to memory of 4264 3108 lrrxlfr.exe 91 PID 3108 wrote to memory of 4264 3108 lrrxlfr.exe 91 PID 3108 wrote to memory of 4264 3108 lrrxlfr.exe 91 PID 4264 wrote to memory of 3148 4264 xffrlxr.exe 143 PID 4264 wrote to memory of 3148 4264 xffrlxr.exe 143 PID 4264 wrote to memory of 3148 4264 xffrlxr.exe 143 PID 3148 wrote to memory of 4340 3148 frffxrx.exe 93 PID 3148 wrote to memory of 4340 3148 frffxrx.exe 93 PID 3148 wrote to memory of 4340 3148 frffxrx.exe 93 PID 4340 wrote to memory of 2980 4340 lfxlfrf.exe 146 PID 4340 wrote to memory of 2980 4340 lfxlfrf.exe 146 PID 4340 wrote to memory of 2980 4340 lfxlfrf.exe 146 PID 2980 wrote to memory of 3392 2980 tbbhtn.exe 95 PID 2980 wrote to memory of 3392 2980 tbbhtn.exe 95 PID 2980 wrote to memory of 3392 2980 tbbhtn.exe 95 PID 3392 wrote to memory of 4564 3392 djvpj.exe 96 PID 3392 wrote to memory of 4564 3392 djvpj.exe 96 PID 3392 wrote to memory of 4564 3392 djvpj.exe 96 PID 4564 wrote to memory of 4376 4564 hnnbnh.exe 150 PID 4564 wrote to memory of 4376 4564 hnnbnh.exe 150 PID 4564 wrote to memory of 4376 4564 hnnbnh.exe 150 PID 4376 wrote to memory of 1892 4376 5bhtnn.exe 100 PID 4376 wrote to memory of 1892 4376 5bhtnn.exe 100 PID 4376 wrote to memory of 1892 4376 5bhtnn.exe 100 PID 1892 wrote to memory of 2312 1892 djdvj.exe 101 PID 1892 wrote to memory of 2312 1892 djdvj.exe 101 PID 1892 wrote to memory of 2312 1892 djdvj.exe 101 PID 2312 wrote to memory of 2068 2312 djjvp.exe 102 PID 2312 wrote to memory of 2068 2312 djjvp.exe 102 PID 2312 wrote to memory of 2068 2312 djjvp.exe 102 PID 2068 wrote to memory of 2896 2068 xxrxlxl.exe 155 PID 2068 wrote to memory of 2896 2068 xxrxlxl.exe 155 PID 2068 wrote to memory of 2896 2068 xxrxlxl.exe 155 PID 2896 wrote to memory of 1696 2896 rrxxrxx.exe 104 PID 2896 wrote to memory of 1696 2896 rrxxrxx.exe 104 PID 2896 wrote to memory of 1696 2896 rrxxrxx.exe 104 PID 1696 wrote to memory of 2172 1696 lxxxrrl.exe 105 PID 1696 wrote to memory of 2172 1696 lxxxrrl.exe 105 PID 1696 wrote to memory of 2172 1696 lxxxrrl.exe 105 PID 2172 wrote to memory of 4756 2172 jvjjd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe"C:\Users\Admin\AppData\Local\Temp\816cf026b79a8709e2b6f032c67ceb77eecfc31a6bf8e47951af040da2270962.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\vvjdj.exec:\vvjdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
\??\c:\jjdvj.exec:\jjdvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\hhttbb.exec:\hhttbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\vjpjd.exec:\vjpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\rlrrlfr.exec:\rlrrlfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\nnnhhb.exec:\nnnhhb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
\??\c:\jdjpd.exec:\jdjpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\lrrxlfr.exec:\lrrxlfr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
\??\c:\xffrlxr.exec:\xffrlxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\frffxrx.exec:\frffxrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\lfxlfrf.exec:\lfxlfrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\tbbhtn.exec:\tbbhtn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\djvpj.exec:\djvpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
\??\c:\hnnbnh.exec:\hnnbnh.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\5bhtnn.exec:\5bhtnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\djdvj.exec:\djdvj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\djjvp.exec:\djjvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\xxrxlxl.exec:\xxrxlxl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\rrxxrxx.exec:\rrxxrxx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\lxxxrrl.exec:\lxxxrrl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\jvjjd.exec:\jvjjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\bbhbtb.exec:\bbhbtb.exe23⤵
- Executes dropped EXE
PID:4756 -
\??\c:\nhhhbb.exec:\nhhhbb.exe24⤵
- Executes dropped EXE
PID:1680 -
\??\c:\dvjdv.exec:\dvjdv.exe25⤵
- Executes dropped EXE
PID:1776 -
\??\c:\xfrlfff.exec:\xfrlfff.exe26⤵
- Executes dropped EXE
PID:2436 -
\??\c:\tnttnn.exec:\tnttnn.exe27⤵
- Executes dropped EXE
PID:4036 -
\??\c:\ppvvv.exec:\ppvvv.exe28⤵
- Executes dropped EXE
PID:460 -
\??\c:\1bnhhh.exec:\1bnhhh.exe29⤵
- Executes dropped EXE
PID:3584 -
\??\c:\xfffflf.exec:\xfffflf.exe30⤵
- Executes dropped EXE
PID:3672 -
\??\c:\fxfxrrl.exec:\fxfxrrl.exe31⤵
- Executes dropped EXE
PID:2124 -
\??\c:\bhtttn.exec:\bhtttn.exe32⤵
- Executes dropped EXE
PID:2520 -
\??\c:\lxlfxrl.exec:\lxlfxrl.exe33⤵
- Executes dropped EXE
PID:1568 -
\??\c:\3vpjj.exec:\3vpjj.exe34⤵
- Executes dropped EXE
PID:1032 -
\??\c:\lrlllxx.exec:\lrlllxx.exe35⤵
- Executes dropped EXE
PID:3628 -
\??\c:\vjjdd.exec:\vjjdd.exe36⤵
- Executes dropped EXE
PID:2076 -
\??\c:\vjppd.exec:\vjppd.exe37⤵
- Executes dropped EXE
PID:2016 -
\??\c:\xlrllff.exec:\xlrllff.exe38⤵
- Executes dropped EXE
PID:1212 -
\??\c:\rllrrxx.exec:\rllrrxx.exe39⤵
- Executes dropped EXE
PID:4860 -
\??\c:\pdjdv.exec:\pdjdv.exe40⤵
- Executes dropped EXE
PID:4448 -
\??\c:\jvdvp.exec:\jvdvp.exe41⤵
- Executes dropped EXE
PID:4220 -
\??\c:\rrrlfxl.exec:\rrrlfxl.exe42⤵
- Executes dropped EXE
PID:5052 -
\??\c:\flrlffx.exec:\flrlffx.exe43⤵
- Executes dropped EXE
PID:3264 -
\??\c:\7ffxllx.exec:\7ffxllx.exe44⤵
- Executes dropped EXE
PID:5020 -
\??\c:\flrlfxr.exec:\flrlfxr.exe45⤵
- Executes dropped EXE
PID:4528 -
\??\c:\dvpjj.exec:\dvpjj.exe46⤵
- Executes dropped EXE
PID:320 -
\??\c:\pdjvp.exec:\pdjvp.exe47⤵
- Executes dropped EXE
PID:1980 -
\??\c:\tntnhb.exec:\tntnhb.exe48⤵
- Executes dropped EXE
PID:4592 -
\??\c:\nhhttb.exec:\nhhttb.exe49⤵
- Executes dropped EXE
PID:3852 -
\??\c:\thhbbb.exec:\thhbbb.exe50⤵
- Executes dropped EXE
PID:4660 -
\??\c:\flllrxx.exec:\flllrxx.exe51⤵
- Executes dropped EXE
PID:4516 -
\??\c:\frxlfxr.exec:\frxlfxr.exe52⤵
- Executes dropped EXE
PID:2944 -
\??\c:\vvppv.exec:\vvppv.exe53⤵
- Executes dropped EXE
PID:4004 -
\??\c:\jpjjd.exec:\jpjjd.exe54⤵
- Executes dropped EXE
PID:2028 -
\??\c:\jdppv.exec:\jdppv.exe55⤵
- Executes dropped EXE
PID:3148 -
\??\c:\dpvdp.exec:\dpvdp.exe56⤵
- Executes dropped EXE
PID:4972 -
\??\c:\thnnhb.exec:\thnnhb.exe57⤵
- Executes dropped EXE
PID:4616 -
\??\c:\tbbnbt.exec:\tbbnbt.exe58⤵
- Executes dropped EXE
PID:2980 -
\??\c:\htbnnb.exec:\htbnnb.exe59⤵
- Executes dropped EXE
PID:1856 -
\??\c:\5rlxlrf.exec:\5rlxlrf.exe60⤵
- Executes dropped EXE
PID:2768 -
\??\c:\frfxlfr.exec:\frfxlfr.exe61⤵
- Executes dropped EXE
PID:3776 -
\??\c:\vvvjd.exec:\vvvjd.exe62⤵
- Executes dropped EXE
PID:4376 -
\??\c:\pdpjv.exec:\pdpjv.exe63⤵
- Executes dropped EXE
PID:1524 -
\??\c:\hhhhbn.exec:\hhhhbn.exe64⤵
- Executes dropped EXE
PID:2380 -
\??\c:\htnbtn.exec:\htnbtn.exe65⤵
- Executes dropped EXE
PID:3924 -
\??\c:\thhbhh.exec:\thhbhh.exe66⤵PID:4920
-
\??\c:\ffffrxl.exec:\ffffrxl.exe67⤵PID:5104
-
\??\c:\fxxlxrf.exec:\fxxlxrf.exe68⤵PID:2468
-
\??\c:\1rfxllf.exec:\1rfxllf.exe69⤵PID:4620
-
\??\c:\vdjjj.exec:\vdjjj.exe70⤵PID:3028
-
\??\c:\dvjpp.exec:\dvjpp.exe71⤵PID:1532
-
\??\c:\jvvjv.exec:\jvvjv.exe72⤵PID:460
-
\??\c:\hnthbb.exec:\hnthbb.exe73⤵PID:2336
-
\??\c:\tthbtn.exec:\tthbtn.exe74⤵PID:1360
-
\??\c:\nntnbb.exec:\nntnbb.exe75⤵PID:4752
-
\??\c:\htnbnh.exec:\htnbnh.exe76⤵PID:3096
-
\??\c:\lfffxrf.exec:\lfffxrf.exe77⤵PID:2724
-
\??\c:\xrxrrrl.exec:\xrxrrrl.exe78⤵PID:3756
-
\??\c:\tbntnt.exec:\tbntnt.exe79⤵PID:1568
-
\??\c:\lxrfrlx.exec:\lxrfrlx.exe80⤵PID:3220
-
\??\c:\3ppjv.exec:\3ppjv.exe81⤵PID:2204
-
\??\c:\7vjpd.exec:\7vjpd.exe82⤵PID:3508
-
\??\c:\bnbtnb.exec:\bnbtnb.exe83⤵PID:4232
-
\??\c:\xxxrlff.exec:\xxxrlff.exe84⤵PID:2016
-
\??\c:\xlrlxxl.exec:\xlrlxxl.exe85⤵
- System Location Discovery: System Language Discovery
PID:2992 -
\??\c:\lfxlfxr.exec:\lfxlfxr.exe86⤵
- System Location Discovery: System Language Discovery
PID:4860 -
\??\c:\fxxlxrl.exec:\fxxlxrl.exe87⤵PID:4448
-
\??\c:\frfrrff.exec:\frfrrff.exe88⤵PID:4368
-
\??\c:\xxlfllr.exec:\xxlfllr.exe89⤵PID:4252
-
\??\c:\pvvpv.exec:\pvvpv.exe90⤵PID:3676
-
\??\c:\ddjvj.exec:\ddjvj.exe91⤵PID:5052
-
\??\c:\dpjdv.exec:\dpjdv.exe92⤵PID:3604
-
\??\c:\dvpvv.exec:\dvpvv.exe93⤵PID:2240
-
\??\c:\pvdvv.exec:\pvdvv.exe94⤵PID:5092
-
\??\c:\thbthb.exec:\thbthb.exe95⤵PID:3048
-
\??\c:\htbtnh.exec:\htbtnh.exe96⤵PID:3460
-
\??\c:\hnhbnh.exec:\hnhbnh.exe97⤵PID:3912
-
\??\c:\7nnbbt.exec:\7nnbbt.exe98⤵PID:3852
-
\??\c:\lllffxr.exec:\lllffxr.exe99⤵PID:4660
-
\??\c:\rrxrffr.exec:\rrxrffr.exe100⤵PID:4516
-
\??\c:\xrlxllx.exec:\xrlxllx.exe101⤵PID:2944
-
\??\c:\vvdvp.exec:\vvdvp.exe102⤵PID:3152
-
\??\c:\vjvpd.exec:\vjvpd.exe103⤵PID:3984
-
\??\c:\vpjvj.exec:\vpjvj.exe104⤵PID:4280
-
\??\c:\pvdpj.exec:\pvdpj.exe105⤵PID:1656
-
\??\c:\ppppj.exec:\ppppj.exe106⤵PID:4744
-
\??\c:\jjpjp.exec:\jjpjp.exe107⤵PID:544
-
\??\c:\hththt.exec:\hththt.exe108⤵PID:1944
-
\??\c:\hthtnh.exec:\hthtnh.exe109⤵
- System Location Discovery: System Language Discovery
PID:1732 -
\??\c:\bntnnn.exec:\bntnnn.exe110⤵PID:4796
-
\??\c:\bthbth.exec:\bthbth.exe111⤵PID:2908
-
\??\c:\htnhbt.exec:\htnhbt.exe112⤵PID:1132
-
\??\c:\rlfrrlr.exec:\rlfrrlr.exe113⤵PID:3336
-
\??\c:\rlrllfl.exec:\rlrllfl.exe114⤵PID:1736
-
\??\c:\rxlxlxx.exec:\rxlxlxx.exe115⤵PID:2820
-
\??\c:\9frfxrr.exec:\9frfxrr.exe116⤵PID:976
-
\??\c:\xrfrxrx.exec:\xrfrxrx.exe117⤵PID:3436
-
\??\c:\fxffxxr.exec:\fxffxxr.exe118⤵PID:4632
-
\??\c:\rrfxrxr.exec:\rrfxrxr.exe119⤵PID:2468
-
\??\c:\vdpdd.exec:\vdpdd.exe120⤵PID:2404
-
\??\c:\5vjdp.exec:\5vjdp.exe121⤵PID:1384
-
\??\c:\httnnh.exec:\httnnh.exe122⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-