Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 03:34
Behavioral task
behavioral1
Sample
a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe
Resource
win7-20240903-en
9 signatures
120 seconds
General
-
Target
a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe
-
Size
3.7MB
-
MD5
3b5de5314bda17b61c165f037e1ae993
-
SHA1
a217afe3d4c1431596806af7a7b772b8c1373955
-
SHA256
a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2
-
SHA512
9b7487899ba3b6fe8ecbe34c5ab29c8a622d5f58aaf813264642a191308b7ef11be028e22db43370f6a4ac7f09235189c7d1ecca081edb4324fa6fe58a25ba6d
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98w:U6XLq/qPPslzKx/dJg1ErmNP
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2652-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1064-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/408-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/836-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1728-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4124-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/64-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/324-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2188-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5024-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1252-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3360-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3960-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4496-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4900-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4948-115-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/688-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1080-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1688-143-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4844-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3748-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4260-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4316-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4376-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/648-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1980-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2208-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3028-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3216-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3264-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5076-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2088-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1672-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3712-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4940-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4900-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3248-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5100-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1080-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/464-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/60-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1864-335-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1788-339-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3184-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1728-372-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4112-376-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3216-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2956-417-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3588-433-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/688-464-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4120-468-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4352-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1896-482-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1628-534-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4400-562-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3772-578-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3044-585-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2744-694-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4412-731-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4372-807-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/436-886-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4652-959-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1064 hhtntt.exe 836 hnnnth.exe 408 tnbbtt.exe 3912 hhhhhh.exe 1728 pvjpp.exe 4124 1vppj.exe 64 hnttbt.exe 324 jvdvj.exe 1320 tnbtbb.exe 2188 1vjdv.exe 4084 vjjjp.exe 5024 bttnnh.exe 1252 nhhbtn.exe 3360 xxxlfrr.exe 3312 pjpjd.exe 3960 pjdvd.exe 4496 pjdvv.exe 4900 3nhtht.exe 4948 xrffxxx.exe 688 nbhbbt.exe 4600 rrlxrxf.exe 2624 7xfrfxr.exe 1080 hnttht.exe 1688 hbbbbb.exe 4844 3tnbtn.exe 60 5vvpj.exe 3744 nnbttt.exe 3748 frfxrlf.exe 4260 xrffxxl.exe 4316 bttthb.exe 4376 llffxxr.exe 1572 xllffxx.exe 2708 9lrlrxf.exe 648 rflxrll.exe 964 1xxlfxr.exe 1980 5fxrlrr.exe 2208 xflfllx.exe 4420 xxrlllf.exe 3028 xrrlfff.exe 1576 1xxlxrf.exe 3216 jvdvv.exe 4924 dvddv.exe 3264 pjjvp.exe 3648 dvvpp.exe 5076 9ppdv.exe 2004 3tthtt.exe 2576 nhtnhh.exe 4444 9bbnhn.exe 3608 ttnbhh.exe 4764 xllrrll.exe 2088 frfffll.exe 1672 7ffxlfr.exe 4036 5vpdp.exe 3712 7jdpd.exe 1456 ppvpp.exe 4488 vjppj.exe 1052 7pvjv.exe 4940 7vdvv.exe 4900 tnbtnn.exe 3248 hhtntn.exe 3056 hbbtnh.exe 5100 dpjdv.exe 1240 vdvvv.exe 688 ntnnhh.exe -
resource yara_rule behavioral2/memory/2652-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c82-2.dat upx behavioral2/memory/2652-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c86-9.dat upx behavioral2/memory/1064-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c87-13.dat upx behavioral2/memory/408-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/836-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c83-23.dat upx behavioral2/files/0x0007000000023c89-29.dat upx behavioral2/files/0x0007000000023c8a-32.dat upx behavioral2/memory/1728-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8b-39.dat upx behavioral2/memory/4124-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8c-44.dat upx behavioral2/memory/64-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/324-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8d-50.dat upx behavioral2/files/0x0007000000023c8e-56.dat upx behavioral2/files/0x0007000000023c8f-61.dat upx behavioral2/memory/2188-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c91-67.dat upx behavioral2/memory/5024-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c92-74.dat upx behavioral2/memory/1252-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c93-79.dat upx behavioral2/memory/3360-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c94-85.dat upx behavioral2/files/0x0007000000023c95-90.dat upx behavioral2/memory/3960-92-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c96-96.dat upx behavioral2/files/0x0007000000023c97-100.dat upx behavioral2/memory/4496-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c98-107.dat upx behavioral2/memory/4900-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9a-113.dat upx behavioral2/memory/4948-115-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9b-119.dat upx behavioral2/memory/688-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9c-125.dat upx behavioral2/files/0x0007000000023c9d-130.dat upx behavioral2/files/0x0007000000023c9e-138.dat upx behavioral2/memory/1080-137-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9f-141.dat upx behavioral2/memory/4844-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1688-143-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4844-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca0-150.dat upx behavioral2/files/0x0007000000023ca1-154.dat upx behavioral2/files/0x0007000000023ca2-159.dat upx behavioral2/files/0x0007000000023ca4-164.dat upx behavioral2/memory/3748-166-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4260-173-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4316-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca7-171.dat upx behavioral2/files/0x0007000000023ca8-177.dat upx behavioral2/files/0x0007000000023ca9-185.dat upx behavioral2/memory/4376-184-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/648-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1980-202-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2208-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3028-213-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3216-220-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3264-227-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xxllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfxxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1btnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnntn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1064 2652 a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe 83 PID 2652 wrote to memory of 1064 2652 a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe 83 PID 2652 wrote to memory of 1064 2652 a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe 83 PID 1064 wrote to memory of 836 1064 hhtntt.exe 84 PID 1064 wrote to memory of 836 1064 hhtntt.exe 84 PID 1064 wrote to memory of 836 1064 hhtntt.exe 84 PID 836 wrote to memory of 408 836 hnnnth.exe 85 PID 836 wrote to memory of 408 836 hnnnth.exe 85 PID 836 wrote to memory of 408 836 hnnnth.exe 85 PID 408 wrote to memory of 3912 408 tnbbtt.exe 86 PID 408 wrote to memory of 3912 408 tnbbtt.exe 86 PID 408 wrote to memory of 3912 408 tnbbtt.exe 86 PID 3912 wrote to memory of 1728 3912 hhhhhh.exe 87 PID 3912 wrote to memory of 1728 3912 hhhhhh.exe 87 PID 3912 wrote to memory of 1728 3912 hhhhhh.exe 87 PID 1728 wrote to memory of 4124 1728 pvjpp.exe 88 PID 1728 wrote to memory of 4124 1728 pvjpp.exe 88 PID 1728 wrote to memory of 4124 1728 pvjpp.exe 88 PID 4124 wrote to memory of 64 4124 1vppj.exe 89 PID 4124 wrote to memory of 64 4124 1vppj.exe 89 PID 4124 wrote to memory of 64 4124 1vppj.exe 89 PID 64 wrote to memory of 324 64 hnttbt.exe 90 PID 64 wrote to memory of 324 64 hnttbt.exe 90 PID 64 wrote to memory of 324 64 hnttbt.exe 90 PID 324 wrote to memory of 1320 324 jvdvj.exe 93 PID 324 wrote to memory of 1320 324 jvdvj.exe 93 PID 324 wrote to memory of 1320 324 jvdvj.exe 93 PID 1320 wrote to memory of 2188 1320 tnbtbb.exe 94 PID 1320 wrote to memory of 2188 1320 tnbtbb.exe 94 PID 1320 wrote to memory of 2188 1320 tnbtbb.exe 94 PID 2188 wrote to memory of 4084 2188 1vjdv.exe 95 PID 2188 wrote to memory of 4084 2188 1vjdv.exe 95 PID 2188 wrote to memory of 4084 2188 1vjdv.exe 95 PID 4084 wrote to memory of 5024 4084 vjjjp.exe 97 PID 4084 wrote to memory of 5024 4084 vjjjp.exe 97 PID 4084 wrote to memory of 5024 4084 vjjjp.exe 97 PID 5024 wrote to memory of 1252 5024 bttnnh.exe 98 PID 5024 wrote to memory of 1252 5024 bttnnh.exe 98 PID 5024 wrote to memory of 1252 5024 bttnnh.exe 98 PID 1252 wrote to memory of 3360 1252 nhhbtn.exe 100 PID 1252 wrote to memory of 3360 1252 nhhbtn.exe 100 PID 1252 wrote to memory of 3360 1252 nhhbtn.exe 100 PID 3360 wrote to memory of 3312 3360 xxxlfrr.exe 101 PID 3360 wrote to memory of 3312 3360 xxxlfrr.exe 101 PID 3360 wrote to memory of 3312 3360 xxxlfrr.exe 101 PID 3312 wrote to memory of 3960 3312 pjpjd.exe 102 PID 3312 wrote to memory of 3960 3312 pjpjd.exe 102 PID 3312 wrote to memory of 3960 3312 pjpjd.exe 102 PID 3960 wrote to memory of 4496 3960 pjdvd.exe 103 PID 3960 wrote to memory of 4496 3960 pjdvd.exe 103 PID 3960 wrote to memory of 4496 3960 pjdvd.exe 103 PID 4496 wrote to memory of 4900 4496 pjdvv.exe 104 PID 4496 wrote to memory of 4900 4496 pjdvv.exe 104 PID 4496 wrote to memory of 4900 4496 pjdvv.exe 104 PID 4900 wrote to memory of 4948 4900 3nhtht.exe 105 PID 4900 wrote to memory of 4948 4900 3nhtht.exe 105 PID 4900 wrote to memory of 4948 4900 3nhtht.exe 105 PID 4948 wrote to memory of 688 4948 xrffxxx.exe 109 PID 4948 wrote to memory of 688 4948 xrffxxx.exe 109 PID 4948 wrote to memory of 688 4948 xrffxxx.exe 109 PID 688 wrote to memory of 4600 688 nbhbbt.exe 110 PID 688 wrote to memory of 4600 688 nbhbbt.exe 110 PID 688 wrote to memory of 4600 688 nbhbbt.exe 110 PID 4600 wrote to memory of 2624 4600 rrlxrxf.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe"C:\Users\Admin\AppData\Local\Temp\a951342a5d04079eed620275f28bbe7f8c34f08ef689bcfe31403633c3f403b2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\hhtntt.exec:\hhtntt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\hnnnth.exec:\hnnnth.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
\??\c:\tnbbtt.exec:\tnbbtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
\??\c:\hhhhhh.exec:\hhhhhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
\??\c:\pvjpp.exec:\pvjpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\1vppj.exec:\1vppj.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
\??\c:\hnttbt.exec:\hnttbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\jvdvj.exec:\jvdvj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
\??\c:\tnbtbb.exec:\tnbtbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
\??\c:\1vjdv.exec:\1vjdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\vjjjp.exec:\vjjjp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\bttnnh.exec:\bttnnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\nhhbtn.exec:\nhhbtn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\xxxlfrr.exec:\xxxlfrr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
\??\c:\pjpjd.exec:\pjpjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\pjdvd.exec:\pjdvd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\pjdvv.exec:\pjdvv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\3nhtht.exec:\3nhtht.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\xrffxxx.exec:\xrffxxx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
\??\c:\nbhbbt.exec:\nbhbbt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\rrlxrxf.exec:\rrlxrxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\7xfrfxr.exec:\7xfrfxr.exe23⤵
- Executes dropped EXE
PID:2624 -
\??\c:\hnttht.exec:\hnttht.exe24⤵
- Executes dropped EXE
PID:1080 -
\??\c:\hbbbbb.exec:\hbbbbb.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1688 -
\??\c:\3tnbtn.exec:\3tnbtn.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4844 -
\??\c:\5vvpj.exec:\5vvpj.exe27⤵
- Executes dropped EXE
PID:60 -
\??\c:\nnbttt.exec:\nnbttt.exe28⤵
- Executes dropped EXE
PID:3744 -
\??\c:\frfxrlf.exec:\frfxrlf.exe29⤵
- Executes dropped EXE
PID:3748 -
\??\c:\xrffxxl.exec:\xrffxxl.exe30⤵
- Executes dropped EXE
PID:4260 -
\??\c:\bttthb.exec:\bttthb.exe31⤵
- Executes dropped EXE
PID:4316 -
\??\c:\llffxxr.exec:\llffxxr.exe32⤵
- Executes dropped EXE
PID:4376 -
\??\c:\xllffxx.exec:\xllffxx.exe33⤵
- Executes dropped EXE
PID:1572 -
\??\c:\9lrlrxf.exec:\9lrlrxf.exe34⤵
- Executes dropped EXE
PID:2708 -
\??\c:\rflxrll.exec:\rflxrll.exe35⤵
- Executes dropped EXE
PID:648 -
\??\c:\1xxlfxr.exec:\1xxlfxr.exe36⤵
- Executes dropped EXE
PID:964 -
\??\c:\5fxrlrr.exec:\5fxrlrr.exe37⤵
- Executes dropped EXE
PID:1980 -
\??\c:\xflfllx.exec:\xflfllx.exe38⤵
- Executes dropped EXE
PID:2208 -
\??\c:\xxrlllf.exec:\xxrlllf.exe39⤵
- Executes dropped EXE
PID:4420 -
\??\c:\xrrlfff.exec:\xrrlfff.exe40⤵
- Executes dropped EXE
PID:3028 -
\??\c:\1xxlxrf.exec:\1xxlxrf.exe41⤵
- Executes dropped EXE
PID:1576 -
\??\c:\jvdvv.exec:\jvdvv.exe42⤵
- Executes dropped EXE
PID:3216 -
\??\c:\dvddv.exec:\dvddv.exe43⤵
- Executes dropped EXE
PID:4924 -
\??\c:\pjjvp.exec:\pjjvp.exe44⤵
- Executes dropped EXE
PID:3264 -
\??\c:\dvvpp.exec:\dvvpp.exe45⤵
- Executes dropped EXE
PID:3648 -
\??\c:\9ppdv.exec:\9ppdv.exe46⤵
- Executes dropped EXE
PID:5076 -
\??\c:\3tthtt.exec:\3tthtt.exe47⤵
- Executes dropped EXE
PID:2004 -
\??\c:\nhtnhh.exec:\nhtnhh.exe48⤵
- Executes dropped EXE
PID:2576 -
\??\c:\9bbnhn.exec:\9bbnhn.exe49⤵
- Executes dropped EXE
PID:4444 -
\??\c:\ttnbhh.exec:\ttnbhh.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3608 -
\??\c:\xllrrll.exec:\xllrrll.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764 -
\??\c:\frfffll.exec:\frfffll.exe52⤵
- Executes dropped EXE
PID:2088 -
\??\c:\7ffxlfr.exec:\7ffxlfr.exe53⤵
- Executes dropped EXE
PID:1672 -
\??\c:\5vpdp.exec:\5vpdp.exe54⤵
- Executes dropped EXE
PID:4036 -
\??\c:\7jdpd.exec:\7jdpd.exe55⤵
- Executes dropped EXE
PID:3712 -
\??\c:\ppvpp.exec:\ppvpp.exe56⤵
- Executes dropped EXE
PID:1456 -
\??\c:\vjppj.exec:\vjppj.exe57⤵
- Executes dropped EXE
PID:4488 -
\??\c:\7pvjv.exec:\7pvjv.exe58⤵
- Executes dropped EXE
PID:1052 -
\??\c:\7vdvv.exec:\7vdvv.exe59⤵
- Executes dropped EXE
PID:4940 -
\??\c:\tnbtnn.exec:\tnbtnn.exe60⤵
- Executes dropped EXE
PID:4900 -
\??\c:\hhtntn.exec:\hhtntn.exe61⤵
- Executes dropped EXE
PID:3248 -
\??\c:\hbbtnh.exec:\hbbtnh.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
\??\c:\dpjdv.exec:\dpjdv.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100 -
\??\c:\vdvvv.exec:\vdvvv.exe64⤵
- Executes dropped EXE
PID:1240 -
\??\c:\ntnnhh.exec:\ntnnhh.exe65⤵
- Executes dropped EXE
PID:688 -
\??\c:\ddppj.exec:\ddppj.exe66⤵PID:1800
-
\??\c:\ntbttb.exec:\ntbttb.exe67⤵PID:2684
-
\??\c:\bhnhhh.exec:\bhnhhh.exe68⤵PID:1080
-
\??\c:\tbnnbt.exec:\tbnnbt.exe69⤵PID:464
-
\??\c:\btbbbb.exec:\btbbbb.exe70⤵PID:2748
-
\??\c:\7tbnnn.exec:\7tbnnn.exe71⤵PID:2228
-
\??\c:\7rlffff.exec:\7rlffff.exe72⤵PID:60
-
\??\c:\lflrlrl.exec:\lflrlrl.exe73⤵PID:4468
-
\??\c:\rlrrlrr.exec:\rlrrlrr.exe74⤵PID:1632
-
\??\c:\vpvpj.exec:\vpvpj.exe75⤵PID:3196
-
\??\c:\jpjdd.exec:\jpjdd.exe76⤵PID:1864
-
\??\c:\dvddv.exec:\dvddv.exe77⤵PID:1788
-
\??\c:\ddjvv.exec:\ddjvv.exe78⤵
- System Location Discovery: System Language Discovery
PID:3156 -
\??\c:\jdpjj.exec:\jdpjj.exe79⤵PID:740
-
\??\c:\jvvpv.exec:\jvvpv.exe80⤵PID:3924
-
\??\c:\pvvvp.exec:\pvvvp.exe81⤵PID:1180
-
\??\c:\9vjdd.exec:\9vjdd.exe82⤵PID:2380
-
\??\c:\jpddv.exec:\jpddv.exe83⤵
- System Location Discovery: System Language Discovery
PID:2016 -
\??\c:\ppppp.exec:\ppppp.exe84⤵PID:1360
-
\??\c:\5ddvp.exec:\5ddvp.exe85⤵PID:4680
-
\??\c:\3btnbb.exec:\3btnbb.exe86⤵PID:4256
-
\??\c:\hhnhbt.exec:\hhnhbt.exe87⤵PID:3184
-
\??\c:\9hnbhb.exec:\9hnbhb.exe88⤵PID:1728
-
\??\c:\5tbtnn.exec:\5tbtnn.exe89⤵PID:4112
-
\??\c:\tnnhbb.exec:\tnnhbb.exe90⤵PID:3216
-
\??\c:\5bhbth.exec:\5bhbth.exe91⤵PID:3900
-
\??\c:\ddvpp.exec:\ddvpp.exe92⤵PID:4908
-
\??\c:\jdjdv.exec:\jdjdv.exe93⤵PID:4824
-
\??\c:\pvddd.exec:\pvddd.exe94⤵PID:4400
-
\??\c:\dpvpj.exec:\dpvpj.exe95⤵PID:4408
-
\??\c:\vpvpj.exec:\vpvpj.exe96⤵PID:3336
-
\??\c:\vvpvp.exec:\vvpvp.exe97⤵
- System Location Discovery: System Language Discovery
PID:3344 -
\??\c:\vvdvj.exec:\vvdvj.exe98⤵PID:3288
-
\??\c:\ntbhht.exec:\ntbhht.exe99⤵PID:2784
-
\??\c:\9bnbtt.exec:\9bnbtt.exe100⤵PID:2260
-
\??\c:\hhhhhb.exec:\hhhhhb.exe101⤵PID:2704
-
\??\c:\7nttnn.exec:\7nttnn.exe102⤵PID:2956
-
\??\c:\3nnhnh.exec:\3nnhnh.exe103⤵PID:3556
-
\??\c:\hhnhtn.exec:\hhnhtn.exe104⤵
- System Location Discovery: System Language Discovery
PID:3360 -
\??\c:\5nbhbb.exec:\5nbhbb.exe105⤵PID:4664
-
\??\c:\rffxxrr.exec:\rffxxrr.exe106⤵PID:3712
-
\??\c:\lfrxxff.exec:\lfrxxff.exe107⤵PID:3588
-
\??\c:\fflxfxl.exec:\fflxfxl.exe108⤵PID:2672
-
\??\c:\xffrfxl.exec:\xffrfxl.exe109⤵PID:1932
-
\??\c:\9frlffx.exec:\9frlffx.exe110⤵PID:3568
-
\??\c:\3dddj.exec:\3dddj.exe111⤵PID:4568
-
\??\c:\pdpjv.exec:\pdpjv.exe112⤵PID:676
-
\??\c:\ppvpv.exec:\ppvpv.exe113⤵PID:3248
-
\??\c:\jvdvp.exec:\jvdvp.exe114⤵PID:3056
-
\??\c:\jvjdj.exec:\jvjdj.exe115⤵PID:1424
-
\??\c:\btbbtb.exec:\btbbtb.exe116⤵PID:1240
-
\??\c:\hbbnhb.exec:\hbbnhb.exe117⤵PID:688
-
\??\c:\thhhbb.exec:\thhhbb.exe118⤵
- System Location Discovery: System Language Discovery
PID:4120 -
\??\c:\3ffxrrl.exec:\3ffxrrl.exe119⤵PID:4352
-
\??\c:\1lfflrf.exec:\1lfflrf.exe120⤵PID:4132
-
\??\c:\fxfxxrf.exec:\fxfxxrf.exe121⤵PID:1868
-
\??\c:\flfrlfr.exec:\flfrlfr.exe122⤵PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-