Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 00:58
Behavioral task
behavioral1
Sample
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe
Resource
win7-20240903-en
9 signatures
120 seconds
General
-
Target
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe
-
Size
3.7MB
-
MD5
df91e4cb2641e6f6407d353c896a1240
-
SHA1
3bb95ac3507c572ef33a20ab097e830d53ea5728
-
SHA256
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3
-
SHA512
1c8533b10da63bae82c91b91f83c3465b1aaeee79846678734e21eced7cfff122d3e04eeda9d5144ac6cdd576dcab917a2e8dbcd1413276bc3d7ff329b6f475a
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98o:U6XLq/qPPslzKx/dJg1ErmNF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral1/memory/1972-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1884-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1992-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1992-28-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2352-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1992-26-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2964-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2724-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2892-77-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2756-83-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2680-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2644-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/480-114-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/656-123-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1284-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1156-165-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-180-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2752-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2944-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/444-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2520-227-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2520-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1064-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1956-301-0x0000000000260000-0x0000000000287000-memory.dmp family_blackmoon behavioral1/memory/1956-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2020-330-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1428-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2224-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2980-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2784-374-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2732-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2600-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2276-413-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2848-420-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/588-440-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/588-458-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2264-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2264-479-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1660-486-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/3044-487-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2656-500-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2656-501-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1044-508-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1536-516-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/492-523-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/492-542-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2104-590-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2980-652-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1936-714-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1988-832-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/960-839-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2268-846-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2404-852-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2968-860-0x0000000000430000-0x0000000000457000-memory.dmp family_blackmoon behavioral1/memory/904-867-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2416-874-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1992-899-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2852-925-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2640-951-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2664-1036-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2452-1133-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2888-1182-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1884 1nhhnn.exe 1992 1jppj.exe 2352 fxrxlrf.exe 2964 dpjpj.exe 2724 3hnnbt.exe 2712 jdpvd.exe 2892 rrffrfr.exe 2756 1lxllxr.exe 2680 fxrflxx.exe 2644 ppvjv.exe 2276 fxllrrx.exe 480 rlrrxfr.exe 656 hbhbtb.exe 1760 tnnbnb.exe 776 vpddj.exe 1284 rlxrxfl.exe 1156 vvdpj.exe 1456 jpdvp.exe 2752 jvdvd.exe 2284 ppjpd.exe 2956 9rfflfr.exe 2944 vvjpj.exe 444 5hbbnb.exe 2520 bnbbtn.exe 868 bthbhb.exe 768 rlxrffl.exe 2080 rlffrxf.exe 3000 9dppd.exe 1064 tthtnn.exe 3008 ffrrrfx.exe 2208 9dppp.exe 1956 dvddd.exe 2104 fflrfrr.exe 1584 jjvdj.exe 3024 3pppp.exe 2020 vvdpp.exe 2348 tntnnt.exe 1428 nhnthn.exe 2224 nhntbh.exe 2964 nbhhbb.exe 2980 llrfrxl.exe 2784 1dppd.exe 2732 9vjpd.exe 2568 btnbhh.exe 1808 nnhtnh.exe 2600 xrrfxlr.exe 2688 vpddp.exe 2276 nnhtbb.exe 2832 3btbnt.exe 2848 xrfrxff.exe 2100 ddvpp.exe 588 dvpjp.exe 1164 hhbnbb.exe 1152 nbttht.exe 1804 lrrfrrl.exe 1660 5lxlxlr.exe 2808 vdppd.exe 2264 jdjpv.exe 2448 hhbhbb.exe 3044 btntbb.exe 2656 fxlrxxl.exe 1044 5xlrxlx.exe 1536 ppjjd.exe 492 dpddj.exe -
resource yara_rule behavioral1/memory/1972-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000012117-8.dat upx behavioral1/memory/1972-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1884-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d06-19.dat upx behavioral1/memory/1884-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1992-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d0e-29.dat upx behavioral1/memory/2352-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d21-40.dat upx behavioral1/files/0x0008000000016c9d-49.dat upx behavioral1/memory/2964-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2724-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d31-59.dat upx behavioral1/files/0x0007000000016d3a-68.dat upx behavioral1/memory/2892-69-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2352-67-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0007000000016d42-78.dat upx behavioral1/memory/2892-77-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016d5e-87.dat upx behavioral1/memory/2680-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d64-96.dat upx behavioral1/memory/2644-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186ea-103.dat upx behavioral1/files/0x00050000000186ee-113.dat upx behavioral1/memory/480-114-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186fd-121.dat upx behavioral1/memory/656-123-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018728-130.dat upx behavioral1/files/0x000500000001873d-139.dat upx behavioral1/files/0x0005000000018784-147.dat upx behavioral1/files/0x000500000001878f-157.dat upx behavioral1/memory/1284-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000187a5-166.dat upx behavioral1/memory/1156-165-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000019023-177.dat upx behavioral1/files/0x000500000001925e-186.dat upx behavioral1/memory/2752-185-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019261-194.dat upx behavioral1/files/0x0005000000019282-202.dat upx behavioral1/memory/2944-213-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019334-212.dat upx behavioral1/files/0x0005000000019350-223.dat upx behavioral1/memory/444-222-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000193b4-233.dat upx behavioral1/memory/2520-232-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000193c2-241.dat upx behavioral1/files/0x00050000000193e1-250.dat upx behavioral1/memory/3000-260-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001941e-261.dat upx behavioral1/memory/2080-258-0x00000000002A0000-0x00000000002C7000-memory.dmp upx behavioral1/memory/3000-267-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0005000000019427-270.dat upx behavioral1/memory/1064-271-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019431-278.dat upx behavioral1/files/0x0005000000019441-286.dat upx behavioral1/files/0x000500000001944f-294.dat upx behavioral1/memory/1956-301-0x0000000000260000-0x0000000000287000-memory.dmp upx behavioral1/memory/1956-304-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2020-330-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2348-333-0x0000000000430000-0x0000000000457000-memory.dmp upx behavioral1/memory/1428-344-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2224-345-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2224-352-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxlfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rfffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ththhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrfflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxlfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbthhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1frxrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btthtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1frxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrxlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxflfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hbbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xlrflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbnnb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1884 1972 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 30 PID 1972 wrote to memory of 1884 1972 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 30 PID 1972 wrote to memory of 1884 1972 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 30 PID 1972 wrote to memory of 1884 1972 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 30 PID 1884 wrote to memory of 1992 1884 1nhhnn.exe 31 PID 1884 wrote to memory of 1992 1884 1nhhnn.exe 31 PID 1884 wrote to memory of 1992 1884 1nhhnn.exe 31 PID 1884 wrote to memory of 1992 1884 1nhhnn.exe 31 PID 1992 wrote to memory of 2352 1992 1jppj.exe 32 PID 1992 wrote to memory of 2352 1992 1jppj.exe 32 PID 1992 wrote to memory of 2352 1992 1jppj.exe 32 PID 1992 wrote to memory of 2352 1992 1jppj.exe 32 PID 2352 wrote to memory of 2964 2352 fxrxlrf.exe 33 PID 2352 wrote to memory of 2964 2352 fxrxlrf.exe 33 PID 2352 wrote to memory of 2964 2352 fxrxlrf.exe 33 PID 2352 wrote to memory of 2964 2352 fxrxlrf.exe 33 PID 2964 wrote to memory of 2724 2964 dpjpj.exe 34 PID 2964 wrote to memory of 2724 2964 dpjpj.exe 34 PID 2964 wrote to memory of 2724 2964 dpjpj.exe 34 PID 2964 wrote to memory of 2724 2964 dpjpj.exe 34 PID 2724 wrote to memory of 2712 2724 3hnnbt.exe 35 PID 2724 wrote to memory of 2712 2724 3hnnbt.exe 35 PID 2724 wrote to memory of 2712 2724 3hnnbt.exe 35 PID 2724 wrote to memory of 2712 2724 3hnnbt.exe 35 PID 2712 wrote to memory of 2892 2712 jdpvd.exe 36 PID 2712 wrote to memory of 2892 2712 jdpvd.exe 36 PID 2712 wrote to memory of 2892 2712 jdpvd.exe 36 PID 2712 wrote to memory of 2892 2712 jdpvd.exe 36 PID 2892 wrote to memory of 2756 2892 rrffrfr.exe 37 PID 2892 wrote to memory of 2756 2892 rrffrfr.exe 37 PID 2892 wrote to memory of 2756 2892 rrffrfr.exe 37 PID 2892 wrote to memory of 2756 2892 rrffrfr.exe 37 PID 2756 wrote to memory of 2680 2756 1lxllxr.exe 38 PID 2756 wrote to memory of 2680 2756 1lxllxr.exe 38 PID 2756 wrote to memory of 2680 2756 1lxllxr.exe 38 PID 2756 wrote to memory of 2680 2756 1lxllxr.exe 38 PID 2680 wrote to memory of 2644 2680 fxrflxx.exe 39 PID 2680 wrote to memory of 2644 2680 fxrflxx.exe 39 PID 2680 wrote to memory of 2644 2680 fxrflxx.exe 39 PID 2680 wrote to memory of 2644 2680 fxrflxx.exe 39 PID 2644 wrote to memory of 2276 2644 ppvjv.exe 40 PID 2644 wrote to memory of 2276 2644 ppvjv.exe 40 PID 2644 wrote to memory of 2276 2644 ppvjv.exe 40 PID 2644 wrote to memory of 2276 2644 ppvjv.exe 40 PID 2276 wrote to memory of 480 2276 fxllrrx.exe 41 PID 2276 wrote to memory of 480 2276 fxllrrx.exe 41 PID 2276 wrote to memory of 480 2276 fxllrrx.exe 41 PID 2276 wrote to memory of 480 2276 fxllrrx.exe 41 PID 480 wrote to memory of 656 480 rlrrxfr.exe 42 PID 480 wrote to memory of 656 480 rlrrxfr.exe 42 PID 480 wrote to memory of 656 480 rlrrxfr.exe 42 PID 480 wrote to memory of 656 480 rlrrxfr.exe 42 PID 656 wrote to memory of 1760 656 hbhbtb.exe 43 PID 656 wrote to memory of 1760 656 hbhbtb.exe 43 PID 656 wrote to memory of 1760 656 hbhbtb.exe 43 PID 656 wrote to memory of 1760 656 hbhbtb.exe 43 PID 1760 wrote to memory of 776 1760 tnnbnb.exe 44 PID 1760 wrote to memory of 776 1760 tnnbnb.exe 44 PID 1760 wrote to memory of 776 1760 tnnbnb.exe 44 PID 1760 wrote to memory of 776 1760 tnnbnb.exe 44 PID 776 wrote to memory of 1284 776 vpddj.exe 45 PID 776 wrote to memory of 1284 776 vpddj.exe 45 PID 776 wrote to memory of 1284 776 vpddj.exe 45 PID 776 wrote to memory of 1284 776 vpddj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe"C:\Users\Admin\AppData\Local\Temp\4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\1nhhnn.exec:\1nhhnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\1jppj.exec:\1jppj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\fxrxlrf.exec:\fxrxlrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\dpjpj.exec:\dpjpj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\3hnnbt.exec:\3hnnbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\jdpvd.exec:\jdpvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\rrffrfr.exec:\rrffrfr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\1lxllxr.exec:\1lxllxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\fxrflxx.exec:\fxrflxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\ppvjv.exec:\ppvjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\fxllrrx.exec:\fxllrrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\rlrrxfr.exec:\rlrrxfr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:480 -
\??\c:\hbhbtb.exec:\hbhbtb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\tnnbnb.exec:\tnnbnb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\vpddj.exec:\vpddj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\rlxrxfl.exec:\rlxrxfl.exe17⤵
- Executes dropped EXE
PID:1284 -
\??\c:\vvdpj.exec:\vvdpj.exe18⤵
- Executes dropped EXE
PID:1156 -
\??\c:\jpdvp.exec:\jpdvp.exe19⤵
- Executes dropped EXE
PID:1456 -
\??\c:\jvdvd.exec:\jvdvd.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752 -
\??\c:\ppjpd.exec:\ppjpd.exe21⤵
- Executes dropped EXE
PID:2284 -
\??\c:\9rfflfr.exec:\9rfflfr.exe22⤵
- Executes dropped EXE
PID:2956 -
\??\c:\vvjpj.exec:\vvjpj.exe23⤵
- Executes dropped EXE
PID:2944 -
\??\c:\5hbbnb.exec:\5hbbnb.exe24⤵
- Executes dropped EXE
PID:444 -
\??\c:\bnbbtn.exec:\bnbbtn.exe25⤵
- Executes dropped EXE
PID:2520 -
\??\c:\bthbhb.exec:\bthbhb.exe26⤵
- Executes dropped EXE
PID:868 -
\??\c:\rlxrffl.exec:\rlxrffl.exe27⤵
- Executes dropped EXE
PID:768 -
\??\c:\rlffrxf.exec:\rlffrxf.exe28⤵
- Executes dropped EXE
PID:2080 -
\??\c:\9dppd.exec:\9dppd.exe29⤵
- Executes dropped EXE
PID:3000 -
\??\c:\tthtnn.exec:\tthtnn.exe30⤵
- Executes dropped EXE
PID:1064 -
\??\c:\ffrrrfx.exec:\ffrrrfx.exe31⤵
- Executes dropped EXE
PID:3008 -
\??\c:\9dppp.exec:\9dppp.exe32⤵
- Executes dropped EXE
PID:2208 -
\??\c:\dvddd.exec:\dvddd.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1956 -
\??\c:\fflrfrr.exec:\fflrfrr.exe34⤵
- Executes dropped EXE
PID:2104 -
\??\c:\jjvdj.exec:\jjvdj.exe35⤵
- Executes dropped EXE
PID:1584 -
\??\c:\3pppp.exec:\3pppp.exe36⤵
- Executes dropped EXE
PID:3024 -
\??\c:\vvdpp.exec:\vvdpp.exe37⤵
- Executes dropped EXE
PID:2020 -
\??\c:\tntnnt.exec:\tntnnt.exe38⤵
- Executes dropped EXE
PID:2348 -
\??\c:\nhnthn.exec:\nhnthn.exe39⤵
- Executes dropped EXE
PID:1428 -
\??\c:\nhntbh.exec:\nhntbh.exe40⤵
- Executes dropped EXE
PID:2224 -
\??\c:\nbhhbb.exec:\nbhhbb.exe41⤵
- Executes dropped EXE
PID:2964 -
\??\c:\llrfrxl.exec:\llrfrxl.exe42⤵
- Executes dropped EXE
PID:2980 -
\??\c:\1dppd.exec:\1dppd.exe43⤵
- Executes dropped EXE
PID:2784 -
\??\c:\9vjpd.exec:\9vjpd.exe44⤵
- Executes dropped EXE
PID:2732 -
\??\c:\btnbhh.exec:\btnbhh.exe45⤵
- Executes dropped EXE
PID:2568 -
\??\c:\nnhtnh.exec:\nnhtnh.exe46⤵
- Executes dropped EXE
PID:1808 -
\??\c:\xrrfxlr.exec:\xrrfxlr.exe47⤵
- Executes dropped EXE
PID:2600 -
\??\c:\vpddp.exec:\vpddp.exe48⤵
- Executes dropped EXE
PID:2688 -
\??\c:\nnhtbb.exec:\nnhtbb.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276 -
\??\c:\3btbnt.exec:\3btbnt.exe50⤵
- Executes dropped EXE
PID:2832 -
\??\c:\xrfrxff.exec:\xrfrxff.exe51⤵
- Executes dropped EXE
PID:2848 -
\??\c:\ddvpp.exec:\ddvpp.exe52⤵
- Executes dropped EXE
PID:2100 -
\??\c:\dvpjp.exec:\dvpjp.exe53⤵
- Executes dropped EXE
PID:588 -
\??\c:\hhbnbb.exec:\hhbnbb.exe54⤵
- Executes dropped EXE
PID:1164 -
\??\c:\nbttht.exec:\nbttht.exe55⤵
- Executes dropped EXE
PID:1152 -
\??\c:\lrrfrrl.exec:\lrrfrrl.exe56⤵
- Executes dropped EXE
PID:1804 -
\??\c:\5lxlxlr.exec:\5lxlxlr.exe57⤵
- Executes dropped EXE
PID:1660 -
\??\c:\vdppd.exec:\vdppd.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2808 -
\??\c:\jdjpv.exec:\jdjpv.exe59⤵
- Executes dropped EXE
PID:2264 -
\??\c:\hhbhbb.exec:\hhbhbb.exe60⤵
- Executes dropped EXE
PID:2448 -
\??\c:\btntbb.exec:\btntbb.exe61⤵
- Executes dropped EXE
PID:3044 -
\??\c:\fxlrxxl.exec:\fxlrxxl.exe62⤵
- Executes dropped EXE
PID:2656 -
\??\c:\5xlrxlx.exec:\5xlrxlx.exe63⤵
- Executes dropped EXE
PID:1044 -
\??\c:\ppjjd.exec:\ppjjd.exe64⤵
- Executes dropped EXE
PID:1536 -
\??\c:\dpddj.exec:\dpddj.exe65⤵
- Executes dropped EXE
PID:492 -
\??\c:\9hbbtb.exec:\9hbbtb.exe66⤵PID:1812
-
\??\c:\nnhbnt.exec:\nnhbnt.exe67⤵PID:1012
-
\??\c:\xrrrflr.exec:\xrrrflr.exe68⤵PID:1652
-
\??\c:\rrxlrxr.exec:\rrxlrxr.exe69⤵PID:2080
-
\??\c:\rlxflxf.exec:\rlxflxf.exe70⤵PID:1988
-
\??\c:\rxrlrxx.exec:\rxrlrxx.exe71⤵PID:1868
-
\??\c:\pjvdp.exec:\pjvdp.exe72⤵PID:3012
-
\??\c:\bbtbtb.exec:\bbtbtb.exe73⤵PID:1996
-
\??\c:\7fflrrf.exec:\7fflrrf.exe74⤵PID:1744
-
\??\c:\lfxrrrf.exec:\lfxrrrf.exe75⤵PID:2076
-
\??\c:\3pppv.exec:\3pppv.exe76⤵PID:2124
-
\??\c:\dpdpp.exec:\dpdpp.exe77⤵PID:2104
-
\??\c:\1hnthh.exec:\1hnthh.exe78⤵PID:1584
-
\??\c:\ffrflxl.exec:\ffrflxl.exe79⤵PID:3036
-
\??\c:\3rffrlr.exec:\3rffrlr.exe80⤵PID:1992
-
\??\c:\jdvdd.exec:\jdvdd.exe81⤵PID:2652
-
\??\c:\bthhnt.exec:\bthhnt.exe82⤵PID:2336
-
\??\c:\3fxxrxf.exec:\3fxxrxf.exe83⤵PID:2660
-
\??\c:\lllrllx.exec:\lllrllx.exe84⤵PID:2852
-
\??\c:\vvpdp.exec:\vvpdp.exe85⤵PID:2972
-
\??\c:\bbtthb.exec:\bbtthb.exe86⤵PID:2980
-
\??\c:\hnnbth.exec:\hnnbth.exe87⤵PID:2784
-
\??\c:\3xxrflx.exec:\3xxrflx.exe88⤵PID:2732
-
\??\c:\3xrlflx.exec:\3xrlflx.exe89⤵PID:1244
-
\??\c:\fxflrfl.exec:\fxflrfl.exe90⤵PID:2624
-
\??\c:\5vpdp.exec:\5vpdp.exe91⤵PID:1820
-
\??\c:\ttnnbh.exec:\ttnnbh.exe92⤵PID:3060
-
\??\c:\ffxfrrf.exec:\ffxfrrf.exe93⤵PID:2556
-
\??\c:\xllfxrr.exec:\xllfxrr.exe94⤵PID:1264
-
\??\c:\3jjpd.exec:\3jjpd.exe95⤵PID:596
-
\??\c:\thbnnt.exec:\thbnnt.exe96⤵PID:1348
-
\??\c:\3bthnt.exec:\3bthnt.exe97⤵PID:1936
-
\??\c:\ffxfrxl.exec:\ffxfrxl.exe98⤵PID:1412
-
\??\c:\jdvvj.exec:\jdvvj.exe99⤵PID:2324
-
\??\c:\tnbbnn.exec:\tnbbnn.exe100⤵PID:2936
-
\??\c:\tbbnhb.exec:\tbbnhb.exe101⤵PID:372
-
\??\c:\9fxfffr.exec:\9fxfffr.exe102⤵PID:2148
-
\??\c:\pjvdj.exec:\pjvdj.exe103⤵PID:2140
-
\??\c:\3dppd.exec:\3dppd.exe104⤵PID:2284
-
\??\c:\ttnthn.exec:\ttnthn.exe105⤵PID:2448
-
\??\c:\3rrxlrx.exec:\3rrxlrx.exe106⤵PID:2256
-
\??\c:\ppvpd.exec:\ppvpd.exe107⤵PID:1876
-
\??\c:\jddpd.exec:\jddpd.exe108⤵
- System Location Discovery: System Language Discovery
PID:444 -
\??\c:\htbthb.exec:\htbthb.exe109⤵PID:1496
-
\??\c:\5tbnnt.exec:\5tbnnt.exe110⤵PID:1352
-
\??\c:\xrllxff.exec:\xrllxff.exe111⤵PID:1692
-
\??\c:\1rrrflx.exec:\1rrrflx.exe112⤵PID:1672
-
\??\c:\pdjdd.exec:\pdjdd.exe113⤵PID:960
-
\??\c:\btbnhh.exec:\btbnhh.exe114⤵PID:560
-
\??\c:\nbbtbn.exec:\nbbtbn.exe115⤵PID:696
-
\??\c:\rlfrxrf.exec:\rlfrxrf.exe116⤵PID:1988
-
\??\c:\dvvpj.exec:\dvvpj.exe117⤵PID:2268
-
\??\c:\jjddp.exec:\jjddp.exe118⤵PID:2404
-
\??\c:\hbttbh.exec:\hbttbh.exe119⤵
- System Location Discovery: System Language Discovery
PID:2968 -
\??\c:\llfrlrr.exec:\llfrlrr.exe120⤵PID:904
-
\??\c:\xxxlfrl.exec:\xxxlfrl.exe121⤵
- System Location Discovery: System Language Discovery
PID:2416 -
\??\c:\vpjpv.exec:\vpjpv.exe122⤵PID:2104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-