Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 10:24
Behavioral task
behavioral1
Sample
7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe
Resource
win7-20240903-en
General
-
Target
7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe
-
Size
3.7MB
-
MD5
6b042ecf7c29ad15534621096520cab6
-
SHA1
a0e7ae80322f62f7fb7c13daf17fa7f4bf2fa401
-
SHA256
7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799
-
SHA512
b63817abac66a103cdc10149b2ff62a63a8ec86325e8d2b19936fa375292156a5899298e857cbd4dd4b811ee81ce70383087c26a31b222b51d6cb230fe25cc02
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98o:U6XLq/qPPslzKx/dJg1ErmNl
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
Processes:
resource yara_rule behavioral2/memory/2724-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2432-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1812-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/316-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2136-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4512-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4932-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/412-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3708-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5072-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2524-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3856-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2236-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4480-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3068-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1616-123-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1032-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3500-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3316-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2060-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2868-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3544-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/812-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/392-186-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3800-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3760-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2392-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4620-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4448-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/596-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1672-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4868-242-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1468-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/184-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/552-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2524-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3420-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/336-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/716-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/740-307-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3680-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3864-321-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1760-341-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/440-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3996-397-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1480-428-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3536-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2872-469-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1960-473-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5088-492-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/232-502-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2920-515-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4252-561-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1488-622-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-659-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4368-690-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4060-943-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1988-1079-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/184-1089-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4536-1165-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2324-2066-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
nbnnnb.exenbtthn.exetntttb.exejdvdv.exettbnnh.exevjvvj.exellffxxx.exexfllflf.exeffxxrfr.exerlrrflr.exe7ppjv.exelfrrrrr.exexxlrrxx.exebbnhhn.exebthntt.exerlrrrff.exelrxxlll.exevdppj.exevppjv.exevjjpp.exevvppj.exerrllffl.exebbtbhh.exelrxxxrf.exepdjpp.exedjjjj.exebntttb.exexffrfrx.exetthnnn.exexrrxflf.exeddjvd.exefrlrxxr.exexflllll.exexxllffx.exevpvpp.exejdvvd.exelllfxrl.exeffrxflr.exellxxxrr.exerlffflr.exexxxxrxx.exexrrlllf.exetnbbtt.exethbbtb.exetnttnn.exejvvpd.exedppjj.exedpdpj.exejjjdv.exe7pjdv.exeffxfxxl.exexrrxflr.exerrrxrrr.exefrflxfr.exebtthbh.exethtnnn.exepjdvj.exexrxlllf.exelrxlxrr.exebtbttt.exe7thbnn.exebbhhnt.exejpvdd.exevppjd.exepid Process 2432 nbnnnb.exe 316 nbtthn.exe 1812 tntttb.exe 2136 jdvdv.exe 4512 ttbnnh.exe 412 vjvvj.exe 4932 llffxxx.exe 3708 xfllflf.exe 5072 ffxxrfr.exe 3856 rlrrflr.exe 2524 7ppjv.exe 3848 lfrrrrr.exe 2248 xxlrrxx.exe 2236 bbnhhn.exe 4480 bthntt.exe 3488 rlrrrff.exe 3068 lrxxlll.exe 2624 vdppj.exe 2904 vppjv.exe 1616 vjjpp.exe 1032 vvppj.exe 3500 rrllffl.exe 3316 bbtbhh.exe 1592 lrxxxrf.exe 232 pdjpp.exe 2060 djjjj.exe 3980 bntttb.exe 2868 xffrfrx.exe 3544 tthnnn.exe 812 xrrxflf.exe 392 ddjvd.exe 3800 frlrxxr.exe 1684 xflllll.exe 4748 xxllffx.exe 540 vpvpp.exe 3760 jdvvd.exe 4316 lllfxrl.exe 2392 ffrxflr.exe 4620 llxxxrr.exe 4448 rlffflr.exe 596 xxxxrxx.exe 4456 xrrlllf.exe 1672 tnbbtt.exe 2924 thbbtb.exe 1520 tnttnn.exe 3124 jvvpd.exe 4868 dppjj.exe 2360 dpdpj.exe 1468 jjjdv.exe 1988 7pjdv.exe 184 ffxfxxl.exe 660 xrrxflr.exe 4200 rrrxrrr.exe 552 frflxfr.exe 2524 btthbh.exe 3420 thtnnn.exe 368 pjdvj.exe 2856 xrxlllf.exe 4816 lrxlxrr.exe 4812 btbttt.exe 336 7thbnn.exe 716 bbhhnt.exe 3172 jpvdd.exe 4476 vppjd.exe -
Processes:
resource yara_rule behavioral2/memory/2724-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2724-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b60-6.dat upx behavioral2/files/0x000a000000023b68-9.dat upx behavioral2/memory/2432-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b65-13.dat upx behavioral2/memory/1812-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/316-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b69-23.dat upx behavioral2/memory/2136-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6b-28.dat upx behavioral2/memory/2136-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4512-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6c-36.dat upx behavioral2/files/0x000a000000023b6d-41.dat upx behavioral2/memory/4932-44-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/412-43-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6e-47.dat upx behavioral2/files/0x000a000000023b6f-52.dat upx behavioral2/memory/3708-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b70-60.dat upx behavioral2/memory/5072-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b71-64.dat upx behavioral2/memory/2524-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3856-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b72-72.dat upx behavioral2/files/0x000a000000023b73-76.dat upx behavioral2/files/0x000a000000023b74-81.dat upx behavioral2/memory/2236-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b75-88.dat upx behavioral2/files/0x000a000000023b77-92.dat upx behavioral2/memory/4480-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b78-98.dat upx behavioral2/memory/3068-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b79-104.dat upx behavioral2/files/0x000a000000023b7a-110.dat upx behavioral2/files/0x000a000000023b7b-114.dat upx behavioral2/memory/2904-116-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7c-120.dat upx behavioral2/memory/1616-123-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7d-126.dat upx behavioral2/memory/1032-129-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7e-132.dat upx behavioral2/memory/3500-134-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7f-139.dat upx behavioral2/memory/3316-140-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b81-146.dat upx behavioral2/files/0x000a000000023b82-149.dat upx behavioral2/files/0x000a000000023b83-154.dat upx behavioral2/memory/2060-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b84-160.dat upx behavioral2/memory/2868-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b85-165.dat upx behavioral2/memory/3544-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b86-173.dat upx behavioral2/files/0x000a000000023b87-177.dat upx behavioral2/memory/812-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b88-183.dat upx behavioral2/memory/392-186-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3800-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3760-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2392-210-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4620-214-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4448-218-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7thbnn.exeppjpp.exerrllffl.exennhbnh.exedjjpv.exevjvvv.exerllfxxx.exe7ffxrrl.exehhbhbh.exefflffxx.exepvjjd.exepjvpp.exevjddj.exennnhhh.exevjppd.exelrfxrrl.exehbnntt.exejdpjj.exevvppj.exebnhhtt.exejvddp.exeddjdv.exe1hnhbb.exeththnt.exexrxlllf.exelxfrllf.exe5jppj.exetnttnn.exehthbtt.exetttttt.exettttnt.exenbhhbb.exehhhbhb.exejjddj.exe9pjjp.exeddpjj.exexxxxrxr.exedpppv.exenbttbh.exe9jvpj.exe5dppd.exexrxxrll.exenbbbhn.exedjjjj.exefllllrr.exevppjd.exejvdvp.exethbhtt.exethnhnn.exepvvdd.exebthntt.exevpppj.exejjpdd.exelxlxrrl.exettbbbb.exevpdjj.exe9bbtnn.exeppjvj.exehnnnnt.exenhnhbb.exerxrlffx.exenthhhn.exexlrlffx.exevppjv.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ffxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ththnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exenbnnnb.exenbtthn.exetntttb.exejdvdv.exettbnnh.exevjvvj.exellffxxx.exexfllflf.exeffxxrfr.exerlrrflr.exe7ppjv.exelfrrrrr.exexxlrrxx.exebbnhhn.exebthntt.exerlrrrff.exelrxxlll.exevdppj.exevppjv.exevjjpp.exevvppj.exedescription pid Process procid_target PID 2724 wrote to memory of 2432 2724 7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe 82 PID 2724 wrote to memory of 2432 2724 7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe 82 PID 2724 wrote to memory of 2432 2724 7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe 82 PID 2432 wrote to memory of 316 2432 nbnnnb.exe 83 PID 2432 wrote to memory of 316 2432 nbnnnb.exe 83 PID 2432 wrote to memory of 316 2432 nbnnnb.exe 83 PID 316 wrote to memory of 1812 316 nbtthn.exe 84 PID 316 wrote to memory of 1812 316 nbtthn.exe 84 PID 316 wrote to memory of 1812 316 nbtthn.exe 84 PID 1812 wrote to memory of 2136 1812 tntttb.exe 85 PID 1812 wrote to memory of 2136 1812 tntttb.exe 85 PID 1812 wrote to memory of 2136 1812 tntttb.exe 85 PID 2136 wrote to memory of 4512 2136 jdvdv.exe 86 PID 2136 wrote to memory of 4512 2136 jdvdv.exe 86 PID 2136 wrote to memory of 4512 2136 jdvdv.exe 86 PID 4512 wrote to memory of 412 4512 ttbnnh.exe 87 PID 4512 wrote to memory of 412 4512 ttbnnh.exe 87 PID 4512 wrote to memory of 412 4512 ttbnnh.exe 87 PID 412 wrote to memory of 4932 412 vjvvj.exe 88 PID 412 wrote to memory of 4932 412 vjvvj.exe 88 PID 412 wrote to memory of 4932 412 vjvvj.exe 88 PID 4932 wrote to memory of 3708 4932 llffxxx.exe 89 PID 4932 wrote to memory of 3708 4932 llffxxx.exe 89 PID 4932 wrote to memory of 3708 4932 llffxxx.exe 89 PID 3708 wrote to memory of 5072 3708 xfllflf.exe 90 PID 3708 wrote to memory of 5072 3708 xfllflf.exe 90 PID 3708 wrote to memory of 5072 3708 xfllflf.exe 90 PID 5072 wrote to memory of 3856 5072 ffxxrfr.exe 91 PID 5072 wrote to memory of 3856 5072 ffxxrfr.exe 91 PID 5072 wrote to memory of 3856 5072 ffxxrfr.exe 91 PID 3856 wrote to memory of 2524 3856 rlrrflr.exe 92 PID 3856 wrote to memory of 2524 3856 rlrrflr.exe 92 PID 3856 wrote to memory of 2524 3856 rlrrflr.exe 92 PID 2524 wrote to memory of 3848 2524 7ppjv.exe 93 PID 2524 wrote to memory of 3848 2524 7ppjv.exe 93 PID 2524 wrote to memory of 3848 2524 7ppjv.exe 93 PID 3848 wrote to memory of 2248 3848 lfrrrrr.exe 94 PID 3848 wrote to memory of 2248 3848 lfrrrrr.exe 94 PID 3848 wrote to memory of 2248 3848 lfrrrrr.exe 94 PID 2248 wrote to memory of 2236 2248 xxlrrxx.exe 95 PID 2248 wrote to memory of 2236 2248 xxlrrxx.exe 95 PID 2248 wrote to memory of 2236 2248 xxlrrxx.exe 95 PID 2236 wrote to memory of 4480 2236 bbnhhn.exe 98 PID 2236 wrote to memory of 4480 2236 bbnhhn.exe 98 PID 2236 wrote to memory of 4480 2236 bbnhhn.exe 98 PID 4480 wrote to memory of 3488 4480 bthntt.exe 100 PID 4480 wrote to memory of 3488 4480 bthntt.exe 100 PID 4480 wrote to memory of 3488 4480 bthntt.exe 100 PID 3488 wrote to memory of 3068 3488 rlrrrff.exe 102 PID 3488 wrote to memory of 3068 3488 rlrrrff.exe 102 PID 3488 wrote to memory of 3068 3488 rlrrrff.exe 102 PID 3068 wrote to memory of 2624 3068 lrxxlll.exe 103 PID 3068 wrote to memory of 2624 3068 lrxxlll.exe 103 PID 3068 wrote to memory of 2624 3068 lrxxlll.exe 103 PID 2624 wrote to memory of 2904 2624 vdppj.exe 104 PID 2624 wrote to memory of 2904 2624 vdppj.exe 104 PID 2624 wrote to memory of 2904 2624 vdppj.exe 104 PID 2904 wrote to memory of 1616 2904 vppjv.exe 105 PID 2904 wrote to memory of 1616 2904 vppjv.exe 105 PID 2904 wrote to memory of 1616 2904 vppjv.exe 105 PID 1616 wrote to memory of 1032 1616 vjjpp.exe 106 PID 1616 wrote to memory of 1032 1616 vjjpp.exe 106 PID 1616 wrote to memory of 1032 1616 vjjpp.exe 106 PID 1032 wrote to memory of 3500 1032 vvppj.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe"C:\Users\Admin\AppData\Local\Temp\7971881855b6c6c2ac99fc9ac82def577ee578345d4f24e043e9415661bbc799.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\nbnnnb.exec:\nbnnnb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\nbtthn.exec:\nbtthn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\tntttb.exec:\tntttb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\jdvdv.exec:\jdvdv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\ttbnnh.exec:\ttbnnh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
\??\c:\vjvvj.exec:\vjvvj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
\??\c:\llffxxx.exec:\llffxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
\??\c:\xfllflf.exec:\xfllflf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\ffxxrfr.exec:\ffxxrfr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\rlrrflr.exec:\rlrrflr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\7ppjv.exec:\7ppjv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\lfrrrrr.exec:\lfrrrrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
\??\c:\xxlrrxx.exec:\xxlrrxx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\bbnhhn.exec:\bbnhhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\bthntt.exec:\bthntt.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
\??\c:\rlrrrff.exec:\rlrrrff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\lrxxlll.exec:\lrxxlll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\vdppj.exec:\vdppj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\vppjv.exec:\vppjv.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\vjjpp.exec:\vjjpp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\vvppj.exec:\vvppj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\rrllffl.exec:\rrllffl.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500 -
\??\c:\bbtbhh.exec:\bbtbhh.exe24⤵
- Executes dropped EXE
PID:3316 -
\??\c:\lrxxxrf.exec:\lrxxxrf.exe25⤵
- Executes dropped EXE
PID:1592 -
\??\c:\pdjpp.exec:\pdjpp.exe26⤵
- Executes dropped EXE
PID:232 -
\??\c:\djjjj.exec:\djjjj.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060 -
\??\c:\bntttb.exec:\bntttb.exe28⤵
- Executes dropped EXE
PID:3980 -
\??\c:\xffrfrx.exec:\xffrfrx.exe29⤵
- Executes dropped EXE
PID:2868 -
\??\c:\tthnnn.exec:\tthnnn.exe30⤵
- Executes dropped EXE
PID:3544 -
\??\c:\xrrxflf.exec:\xrrxflf.exe31⤵
- Executes dropped EXE
PID:812 -
\??\c:\ddjvd.exec:\ddjvd.exe32⤵
- Executes dropped EXE
PID:392 -
\??\c:\frlrxxr.exec:\frlrxxr.exe33⤵
- Executes dropped EXE
PID:3800 -
\??\c:\xflllll.exec:\xflllll.exe34⤵
- Executes dropped EXE
PID:1684 -
\??\c:\xxllffx.exec:\xxllffx.exe35⤵
- Executes dropped EXE
PID:4748 -
\??\c:\vpvpp.exec:\vpvpp.exe36⤵
- Executes dropped EXE
PID:540 -
\??\c:\jdvvd.exec:\jdvvd.exe37⤵
- Executes dropped EXE
PID:3760 -
\??\c:\lllfxrl.exec:\lllfxrl.exe38⤵
- Executes dropped EXE
PID:4316 -
\??\c:\ffrxflr.exec:\ffrxflr.exe39⤵
- Executes dropped EXE
PID:2392 -
\??\c:\llxxxrr.exec:\llxxxrr.exe40⤵
- Executes dropped EXE
PID:4620 -
\??\c:\rlffflr.exec:\rlffflr.exe41⤵
- Executes dropped EXE
PID:4448 -
\??\c:\xxxxrxx.exec:\xxxxrxx.exe42⤵
- Executes dropped EXE
PID:596 -
\??\c:\xrrlllf.exec:\xrrlllf.exe43⤵
- Executes dropped EXE
PID:4456 -
\??\c:\tnbbtt.exec:\tnbbtt.exe44⤵
- Executes dropped EXE
PID:1672 -
\??\c:\thbbtb.exec:\thbbtb.exe45⤵
- Executes dropped EXE
PID:2924 -
\??\c:\tnttnn.exec:\tnttnn.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1520 -
\??\c:\jvvpd.exec:\jvvpd.exe47⤵
- Executes dropped EXE
PID:3124 -
\??\c:\dppjj.exec:\dppjj.exe48⤵
- Executes dropped EXE
PID:4868 -
\??\c:\dpdpj.exec:\dpdpj.exe49⤵
- Executes dropped EXE
PID:2360 -
\??\c:\jjjdv.exec:\jjjdv.exe50⤵
- Executes dropped EXE
PID:1468 -
\??\c:\7pjdv.exec:\7pjdv.exe51⤵
- Executes dropped EXE
PID:1988 -
\??\c:\ffxfxxl.exec:\ffxfxxl.exe52⤵
- Executes dropped EXE
PID:184 -
\??\c:\xrrxflr.exec:\xrrxflr.exe53⤵
- Executes dropped EXE
PID:660 -
\??\c:\rrrxrrr.exec:\rrrxrrr.exe54⤵
- Executes dropped EXE
PID:4200 -
\??\c:\frflxfr.exec:\frflxfr.exe55⤵
- Executes dropped EXE
PID:552 -
\??\c:\btthbh.exec:\btthbh.exe56⤵
- Executes dropped EXE
PID:2524 -
\??\c:\thtnnn.exec:\thtnnn.exe57⤵
- Executes dropped EXE
PID:3420 -
\??\c:\pjdvj.exec:\pjdvj.exe58⤵
- Executes dropped EXE
PID:368 -
\??\c:\xrxlllf.exec:\xrxlllf.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
\??\c:\lrxlxrr.exec:\lrxlxrr.exe60⤵
- Executes dropped EXE
PID:4816 -
\??\c:\btbttt.exec:\btbttt.exe61⤵
- Executes dropped EXE
PID:4812 -
\??\c:\7thbnn.exec:\7thbnn.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:336 -
\??\c:\bbhhnt.exec:\bbhhnt.exe63⤵
- Executes dropped EXE
PID:716 -
\??\c:\jpvdd.exec:\jpvdd.exe64⤵
- Executes dropped EXE
PID:3172 -
\??\c:\vppjd.exec:\vppjd.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4476 -
\??\c:\vvdjd.exec:\vvdjd.exe66⤵PID:1420
-
\??\c:\jvjjj.exec:\jvjjj.exe67⤵PID:1644
-
\??\c:\pjjjj.exec:\pjjjj.exe68⤵PID:740
-
\??\c:\rxlflfl.exec:\rxlflfl.exe69⤵PID:3332
-
\??\c:\rrrrrff.exec:\rrrrrff.exe70⤵PID:3736
-
\??\c:\nhnhhh.exec:\nhnhhh.exe71⤵PID:3680
-
\??\c:\nbhnnh.exec:\nbhnnh.exe72⤵PID:3864
-
\??\c:\bhtttt.exec:\bhtttt.exe73⤵PID:3080
-
\??\c:\hbtbhh.exec:\hbtbhh.exe74⤵PID:636
-
\??\c:\vjpjd.exec:\vjpjd.exe75⤵PID:1120
-
\??\c:\jppjd.exec:\jppjd.exe76⤵PID:3620
-
\??\c:\dvpvv.exec:\dvpvv.exe77⤵PID:5076
-
\??\c:\xrffxff.exec:\xrffxff.exe78⤵PID:1760
-
\??\c:\rllfrfx.exec:\rllfrfx.exe79⤵PID:2788
-
\??\c:\rrfxrrr.exec:\rrfxrrr.exe80⤵PID:3384
-
\??\c:\xrxxrll.exec:\xrxxrll.exe81⤵
- System Location Discovery: System Language Discovery
PID:4004 -
\??\c:\nhtnnt.exec:\nhtnnt.exe82⤵PID:940
-
\??\c:\nbhhhh.exec:\nbhhhh.exe83⤵PID:4368
-
\??\c:\hhnhbb.exec:\hhnhbb.exe84⤵PID:4756
-
\??\c:\btntbh.exec:\btntbh.exe85⤵PID:2808
-
\??\c:\hhbhbh.exec:\hhbhbh.exe86⤵
- System Location Discovery: System Language Discovery
PID:4352 -
\??\c:\jpvvp.exec:\jpvvp.exe87⤵PID:5060
-
\??\c:\hbtthh.exec:\hbtthh.exe88⤵PID:3760
-
\??\c:\ttbbtb.exec:\ttbbtb.exe89⤵PID:1140
-
\??\c:\ttttnt.exec:\ttttnt.exe90⤵
- System Location Discovery: System Language Discovery
PID:4828 -
\??\c:\jjjjj.exec:\jjjjj.exe91⤵PID:440
-
\??\c:\vdjpp.exec:\vdjpp.exe92⤵PID:956
-
\??\c:\jpvvp.exec:\jpvvp.exe93⤵PID:836
-
\??\c:\jpdvd.exec:\jpdvd.exe94⤵PID:1416
-
\??\c:\rrlffxx.exec:\rrlffxx.exe95⤵PID:980
-
\??\c:\lxfrllf.exec:\lxfrllf.exe96⤵
- System Location Discovery: System Language Discovery
PID:3996 -
\??\c:\rrfffff.exec:\rrfffff.exe97⤵PID:3884
-
\??\c:\fflllll.exec:\fflllll.exe98⤵PID:4924
-
\??\c:\xfrrxxl.exec:\xfrrxxl.exe99⤵PID:628
-
\??\c:\fxxlxxx.exec:\fxxlxxx.exe100⤵PID:412
-
\??\c:\hnbtnh.exec:\hnbtnh.exe101⤵PID:4364
-
\??\c:\bnnttt.exec:\bnnttt.exe102⤵PID:3668
-
\??\c:\bbhhbb.exec:\bbhhbb.exe103⤵PID:2932
-
\??\c:\3hbhhn.exec:\3hbhhn.exe104⤵PID:184
-
\??\c:\hthbtt.exec:\hthbtt.exe105⤵PID:3856
-
\??\c:\thtttb.exec:\thtttb.exe106⤵PID:1480
-
\??\c:\bnnnbb.exec:\bnnnbb.exe107⤵PID:3536
-
\??\c:\bbhbbn.exec:\bbhbbn.exe108⤵PID:2092
-
\??\c:\hntnhh.exec:\hntnhh.exe109⤵PID:2704
-
\??\c:\vjddj.exec:\vjddj.exe110⤵
- System Location Discovery: System Language Discovery
PID:5100 -
\??\c:\vvdjv.exec:\vvdjv.exe111⤵PID:3420
-
\??\c:\jvjjd.exec:\jvjjd.exe112⤵PID:2532
-
\??\c:\jdddj.exec:\jdddj.exe113⤵PID:368
-
\??\c:\lrfxrrl.exec:\lrfxrrl.exe114⤵PID:1964
-
\??\c:\jjvpp.exec:\jjvpp.exe115⤵PID:3144
-
\??\c:\rfffflx.exec:\rfffflx.exe116⤵PID:4812
-
\??\c:\xxlxxrr.exec:\xxlxxrr.exe117⤵PID:336
-
\??\c:\jjddp.exec:\jjddp.exe118⤵PID:3424
-
\??\c:\5jvpp.exec:\5jvpp.exe119⤵PID:2872
-
\??\c:\vpppj.exec:\vpppj.exe120⤵
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\xlrrrlf.exec:\xlrrrlf.exe121⤵PID:1420
-
\??\c:\llrrlrl.exec:\llrrlrl.exe122⤵PID:1032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-