Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 00:58
Behavioral task
behavioral1
Sample
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe
Resource
win7-20240903-en
General
-
Target
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe
-
Size
3.7MB
-
MD5
df91e4cb2641e6f6407d353c896a1240
-
SHA1
3bb95ac3507c572ef33a20ab097e830d53ea5728
-
SHA256
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3
-
SHA512
1c8533b10da63bae82c91b91f83c3465b1aaeee79846678734e21eced7cfff122d3e04eeda9d5144ac6cdd576dcab917a2e8dbcd1413276bc3d7ff329b6f475a
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98o:U6XLq/qPPslzKx/dJg1ErmNF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4804-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3732-13-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1868-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3864-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/704-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4552-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1952-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3964-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5036-60-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2596-71-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1576-81-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4628-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2688-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4448-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3208-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/808-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4768-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3416-144-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-150-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2408-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3524-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/744-179-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3724-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4516-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4812-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3916-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1100-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2092-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4132-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3740-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/344-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4920-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3328-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4188-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/348-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4080-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4356-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3660-297-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3652-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3852-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4436-315-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2556-331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2444-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5084-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-355-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4516-359-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2792-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5036-397-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3216-428-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1844-438-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4924-448-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4844-503-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1420-541-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1104-563-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4772-609-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2944-613-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2972-767-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2776-813-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-928-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2544-1013-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4424-1119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4188-1742-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
tbhhhn.exevvdvp.exettnhhb.exevddvp.exe7pjjj.exefxxffff.exefxfxrrl.exe5bthhb.exe5hnnhh.exefllfllr.exe3vjjd.exerxxxxfx.exe1xlfrrl.exepdjvp.exenhbhbh.exe9tnhbb.exexfxxxrr.exe7pvvp.exe7jjdj.exeflrlffx.exerrxxflr.exehhnnnn.exe1nbttt.exepppvd.exefxxxxlf.exelrlfffx.exellllllr.exennhhhn.exennnnnt.exeddjdp.exeppvdd.exe3xrllrr.exelxlrrxx.exellrxfxf.exetntnnn.exebhhnnt.exehhtnnt.exennbbhh.exenbhhtb.exepvjjj.exevdjdd.exedvddj.exevdddv.exevjpjj.exellflxrr.exelllfxxr.exe1xrrlff.exehhttnt.exe3nhbtt.exejjppj.exepjpjj.exedddvv.exedjppj.exe1jjdd.exe3xfxxxx.exeppdvv.exejppjd.exevpddj.exeddjpj.exeppddv.exe5pddv.exe9nttnt.exehtttth.exehtbhnn.exepid Process 5116 tbhhhn.exe 3732 vvdvp.exe 1868 ttnhhb.exe 3864 vddvp.exe 704 7pjjj.exe 4552 fxxffff.exe 1952 fxfxrrl.exe 3964 5bthhb.exe 924 5hnnhh.exe 5036 fllfllr.exe 4036 3vjjd.exe 2596 rxxxxfx.exe 1576 1xlfrrl.exe 3252 pdjvp.exe 4628 nhbhbh.exe 2688 9tnhbb.exe 4448 xfxxxrr.exe 3208 7pvvp.exe 2944 7jjdj.exe 4784 flrlffx.exe 808 rrxxflr.exe 4508 hhnnnn.exe 4768 1nbttt.exe 3416 pppvd.exe 2700 fxxxxlf.exe 3224 lrlfffx.exe 2408 llllllr.exe 3524 nnhhhn.exe 2556 nnnnnt.exe 744 ddjdp.exe 3736 ppvdd.exe 3724 3xrllrr.exe 4516 lxlrrxx.exe 3504 llrxfxf.exe 2580 tntnnn.exe 4812 bhhnnt.exe 3916 hhtnnt.exe 1696 nnbbhh.exe 4552 nbhhtb.exe 1100 pvjjj.exe 2092 vdjdd.exe 4132 dvddj.exe 4144 vdddv.exe 3740 vjpjj.exe 1568 llflxrr.exe 404 lllfxxr.exe 468 1xrrlff.exe 4412 hhttnt.exe 344 3nhbtt.exe 4920 jjppj.exe 3328 pjpjj.exe 4188 dddvv.exe 396 djppj.exe 2716 1jjdd.exe 1844 3xfxxxx.exe 3144 ppdvv.exe 348 jppjd.exe 2164 vpddj.exe 4080 ddjpj.exe 1528 ppddv.exe 3700 5pddv.exe 3872 9nttnt.exe 4356 htttth.exe 3660 htbhnn.exe -
Processes:
resource yara_rule behavioral2/memory/4804-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b15-3.dat upx behavioral2/memory/4804-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5116-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3732-13-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b78-11.dat upx behavioral2/files/0x000a000000023b7a-14.dat upx behavioral2/memory/1868-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7b-22.dat upx behavioral2/memory/3864-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0032000000023b75-28.dat upx behavioral2/memory/704-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7c-36.dat upx behavioral2/files/0x000a000000023b7e-39.dat upx behavioral2/memory/4552-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7f-48.dat upx behavioral2/memory/1952-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b80-53.dat upx behavioral2/memory/3964-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b81-59.dat upx behavioral2/memory/5036-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b82-63.dat upx behavioral2/files/0x000a000000023b84-68.dat upx behavioral2/memory/2596-71-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b85-74.dat upx behavioral2/files/0x000a000000023b86-79.dat upx behavioral2/memory/1576-81-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b87-85.dat upx behavioral2/memory/3252-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b88-91.dat upx behavioral2/memory/4628-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b89-97.dat upx behavioral2/memory/2688-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4448-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8a-105.dat upx behavioral2/files/0x000a000000023b8b-110.dat upx behavioral2/memory/2944-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3208-112-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8c-116.dat upx behavioral2/files/0x000a000000023b8e-121.dat upx behavioral2/files/0x000a000000023b8f-126.dat upx behavioral2/memory/808-128-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b90-132.dat upx behavioral2/files/0x000a000000023b91-137.dat upx behavioral2/memory/4768-138-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b92-142.dat upx behavioral2/memory/3416-144-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2700-150-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b93-148.dat upx behavioral2/files/0x000a000000023b94-154.dat upx behavioral2/files/0x000a000000023b95-160.dat upx behavioral2/memory/2408-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b96-165.dat upx behavioral2/memory/3524-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b97-171.dat upx behavioral2/files/0x000a000000023b98-177.dat upx behavioral2/memory/744-179-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b9a-183.dat upx behavioral2/memory/3724-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4516-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4812-202-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3916-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1100-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2092-219-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
xfrrrfx.exevdvpp.exedvppj.exevpvpj.exe5ppjj.exe1btbtt.exexxfxrrr.exe9tbbbh.exejpppp.exetbhhhn.exedjppj.exeflffxrx.exebtnhbb.exerlfxlfx.exelflrrrr.exepddvv.exefxflfxx.exe7jvvj.exehnnnnt.exe7hhhbh.exetbtbnn.exexfxrrlf.exeppppp.exelllffrx.exexxfrfxl.exebntnnb.exetttbbb.exe1jjdd.exe3nhhhh.exejddvj.exefxrflxx.exevpjjd.exe5xrxrrl.exexlfxllf.exetnnhhb.exevpjjp.exethbbbn.exefxffxxl.exefrrlffx.exe7htbnt.exeddppp.exefrxxxxf.exeflxxrrx.exevjvpj.exe7ddvv.exevdddv.exebtbbtt.exedvddv.exebnnntb.exelfllllf.exelfxxrxf.exepjppp.exexfxllrx.exehhnnnn.exefflffff.exe1nhhbb.exelfrffrx.exe7rxrllf.exelflflfl.exehhbhtt.exe9flffff.exejdvdv.exejvpjd.exe5xxxrxr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1btbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flffxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxflfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxrrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrflxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xrxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxffxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7htbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxllrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9flffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xxxrxr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exetbhhhn.exevvdvp.exettnhhb.exevddvp.exe7pjjj.exefxxffff.exefxfxrrl.exe5bthhb.exe5hnnhh.exefllfllr.exe3vjjd.exerxxxxfx.exe1xlfrrl.exepdjvp.exenhbhbh.exe9tnhbb.exexfxxxrr.exe7pvvp.exe7jjdj.exeflrlffx.exerrxxflr.exedescription pid Process procid_target PID 4804 wrote to memory of 5116 4804 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 83 PID 4804 wrote to memory of 5116 4804 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 83 PID 4804 wrote to memory of 5116 4804 4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe 83 PID 5116 wrote to memory of 3732 5116 tbhhhn.exe 84 PID 5116 wrote to memory of 3732 5116 tbhhhn.exe 84 PID 5116 wrote to memory of 3732 5116 tbhhhn.exe 84 PID 3732 wrote to memory of 1868 3732 vvdvp.exe 85 PID 3732 wrote to memory of 1868 3732 vvdvp.exe 85 PID 3732 wrote to memory of 1868 3732 vvdvp.exe 85 PID 1868 wrote to memory of 3864 1868 ttnhhb.exe 86 PID 1868 wrote to memory of 3864 1868 ttnhhb.exe 86 PID 1868 wrote to memory of 3864 1868 ttnhhb.exe 86 PID 3864 wrote to memory of 704 3864 vddvp.exe 87 PID 3864 wrote to memory of 704 3864 vddvp.exe 87 PID 3864 wrote to memory of 704 3864 vddvp.exe 87 PID 704 wrote to memory of 4552 704 7pjjj.exe 88 PID 704 wrote to memory of 4552 704 7pjjj.exe 88 PID 704 wrote to memory of 4552 704 7pjjj.exe 88 PID 4552 wrote to memory of 1952 4552 fxxffff.exe 89 PID 4552 wrote to memory of 1952 4552 fxxffff.exe 89 PID 4552 wrote to memory of 1952 4552 fxxffff.exe 89 PID 1952 wrote to memory of 3964 1952 fxfxrrl.exe 90 PID 1952 wrote to memory of 3964 1952 fxfxrrl.exe 90 PID 1952 wrote to memory of 3964 1952 fxfxrrl.exe 90 PID 3964 wrote to memory of 924 3964 5bthhb.exe 91 PID 3964 wrote to memory of 924 3964 5bthhb.exe 91 PID 3964 wrote to memory of 924 3964 5bthhb.exe 91 PID 924 wrote to memory of 5036 924 5hnnhh.exe 94 PID 924 wrote to memory of 5036 924 5hnnhh.exe 94 PID 924 wrote to memory of 5036 924 5hnnhh.exe 94 PID 5036 wrote to memory of 4036 5036 fllfllr.exe 95 PID 5036 wrote to memory of 4036 5036 fllfllr.exe 95 PID 5036 wrote to memory of 4036 5036 fllfllr.exe 95 PID 4036 wrote to memory of 2596 4036 3vjjd.exe 97 PID 4036 wrote to memory of 2596 4036 3vjjd.exe 97 PID 4036 wrote to memory of 2596 4036 3vjjd.exe 97 PID 2596 wrote to memory of 1576 2596 rxxxxfx.exe 99 PID 2596 wrote to memory of 1576 2596 rxxxxfx.exe 99 PID 2596 wrote to memory of 1576 2596 rxxxxfx.exe 99 PID 1576 wrote to memory of 3252 1576 1xlfrrl.exe 100 PID 1576 wrote to memory of 3252 1576 1xlfrrl.exe 100 PID 1576 wrote to memory of 3252 1576 1xlfrrl.exe 100 PID 3252 wrote to memory of 4628 3252 pdjvp.exe 101 PID 3252 wrote to memory of 4628 3252 pdjvp.exe 101 PID 3252 wrote to memory of 4628 3252 pdjvp.exe 101 PID 4628 wrote to memory of 2688 4628 nhbhbh.exe 102 PID 4628 wrote to memory of 2688 4628 nhbhbh.exe 102 PID 4628 wrote to memory of 2688 4628 nhbhbh.exe 102 PID 2688 wrote to memory of 4448 2688 9tnhbb.exe 103 PID 2688 wrote to memory of 4448 2688 9tnhbb.exe 103 PID 2688 wrote to memory of 4448 2688 9tnhbb.exe 103 PID 4448 wrote to memory of 3208 4448 xfxxxrr.exe 104 PID 4448 wrote to memory of 3208 4448 xfxxxrr.exe 104 PID 4448 wrote to memory of 3208 4448 xfxxxrr.exe 104 PID 3208 wrote to memory of 2944 3208 7pvvp.exe 105 PID 3208 wrote to memory of 2944 3208 7pvvp.exe 105 PID 3208 wrote to memory of 2944 3208 7pvvp.exe 105 PID 2944 wrote to memory of 4784 2944 7jjdj.exe 106 PID 2944 wrote to memory of 4784 2944 7jjdj.exe 106 PID 2944 wrote to memory of 4784 2944 7jjdj.exe 106 PID 4784 wrote to memory of 808 4784 flrlffx.exe 109 PID 4784 wrote to memory of 808 4784 flrlffx.exe 109 PID 4784 wrote to memory of 808 4784 flrlffx.exe 109 PID 808 wrote to memory of 4508 808 rrxxflr.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe"C:\Users\Admin\AppData\Local\Temp\4dc18a9b310d946be0fa0c776d8f19228acddd8dfe550f40bf831c73815c25d3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\tbhhhn.exec:\tbhhhn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\vvdvp.exec:\vvdvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\ttnhhb.exec:\ttnhhb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
\??\c:\vddvp.exec:\vddvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\7pjjj.exec:\7pjjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
\??\c:\fxxffff.exec:\fxxffff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
\??\c:\fxfxrrl.exec:\fxfxrrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\5bthhb.exec:\5bthhb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\5hnnhh.exec:\5hnnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:924 -
\??\c:\fllfllr.exec:\fllfllr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
\??\c:\3vjjd.exec:\3vjjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
\??\c:\rxxxxfx.exec:\rxxxxfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\1xlfrrl.exec:\1xlfrrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\pdjvp.exec:\pdjvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\nhbhbh.exec:\nhbhbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\9tnhbb.exec:\9tnhbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\xfxxxrr.exec:\xfxxxrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\7pvvp.exec:\7pvvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\7jjdj.exec:\7jjdj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\flrlffx.exec:\flrlffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\rrxxflr.exec:\rrxxflr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
\??\c:\hhnnnn.exec:\hhnnnn.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4508 -
\??\c:\1nbttt.exec:\1nbttt.exe24⤵
- Executes dropped EXE
PID:4768 -
\??\c:\pppvd.exec:\pppvd.exe25⤵
- Executes dropped EXE
PID:3416 -
\??\c:\fxxxxlf.exec:\fxxxxlf.exe26⤵
- Executes dropped EXE
PID:2700 -
\??\c:\lrlfffx.exec:\lrlfffx.exe27⤵
- Executes dropped EXE
PID:3224 -
\??\c:\llllllr.exec:\llllllr.exe28⤵
- Executes dropped EXE
PID:2408 -
\??\c:\nnhhhn.exec:\nnhhhn.exe29⤵
- Executes dropped EXE
PID:3524 -
\??\c:\nnnnnt.exec:\nnnnnt.exe30⤵
- Executes dropped EXE
PID:2556 -
\??\c:\ddjdp.exec:\ddjdp.exe31⤵
- Executes dropped EXE
PID:744 -
\??\c:\ppvdd.exec:\ppvdd.exe32⤵
- Executes dropped EXE
PID:3736 -
\??\c:\3xrllrr.exec:\3xrllrr.exe33⤵
- Executes dropped EXE
PID:3724 -
\??\c:\lxlrrxx.exec:\lxlrrxx.exe34⤵
- Executes dropped EXE
PID:4516 -
\??\c:\llrxfxf.exec:\llrxfxf.exe35⤵
- Executes dropped EXE
PID:3504 -
\??\c:\tntnnn.exec:\tntnnn.exe36⤵
- Executes dropped EXE
PID:2580 -
\??\c:\bhhnnt.exec:\bhhnnt.exe37⤵
- Executes dropped EXE
PID:4812 -
\??\c:\hhtnnt.exec:\hhtnnt.exe38⤵
- Executes dropped EXE
PID:3916 -
\??\c:\nnbbhh.exec:\nnbbhh.exe39⤵
- Executes dropped EXE
PID:1696 -
\??\c:\nbhhtb.exec:\nbhhtb.exe40⤵
- Executes dropped EXE
PID:4552 -
\??\c:\pvjjj.exec:\pvjjj.exe41⤵
- Executes dropped EXE
PID:1100 -
\??\c:\vdjdd.exec:\vdjdd.exe42⤵
- Executes dropped EXE
PID:2092 -
\??\c:\dvddj.exec:\dvddj.exe43⤵
- Executes dropped EXE
PID:4132 -
\??\c:\vdddv.exec:\vdddv.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4144 -
\??\c:\vjpjj.exec:\vjpjj.exe45⤵
- Executes dropped EXE
PID:3740 -
\??\c:\llflxrr.exec:\llflxrr.exe46⤵
- Executes dropped EXE
PID:1568 -
\??\c:\lllfxxr.exec:\lllfxxr.exe47⤵
- Executes dropped EXE
PID:404 -
\??\c:\1xrrlff.exec:\1xrrlff.exe48⤵
- Executes dropped EXE
PID:468 -
\??\c:\hhttnt.exec:\hhttnt.exe49⤵
- Executes dropped EXE
PID:4412 -
\??\c:\3nhbtt.exec:\3nhbtt.exe50⤵
- Executes dropped EXE
PID:344 -
\??\c:\jjppj.exec:\jjppj.exe51⤵
- Executes dropped EXE
PID:4920 -
\??\c:\pjpjj.exec:\pjpjj.exe52⤵
- Executes dropped EXE
PID:3328 -
\??\c:\dddvv.exec:\dddvv.exe53⤵
- Executes dropped EXE
PID:4188 -
\??\c:\djppj.exec:\djppj.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396 -
\??\c:\1jjdd.exec:\1jjdd.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716 -
\??\c:\3xfxxxx.exec:\3xfxxxx.exe56⤵
- Executes dropped EXE
PID:1844 -
\??\c:\ppdvv.exec:\ppdvv.exe57⤵
- Executes dropped EXE
PID:3144 -
\??\c:\jppjd.exec:\jppjd.exe58⤵
- Executes dropped EXE
PID:348 -
\??\c:\vpddj.exec:\vpddj.exe59⤵
- Executes dropped EXE
PID:2164 -
\??\c:\ddjpj.exec:\ddjpj.exe60⤵
- Executes dropped EXE
PID:4080 -
\??\c:\ppddv.exec:\ppddv.exe61⤵
- Executes dropped EXE
PID:1528 -
\??\c:\5pddv.exec:\5pddv.exe62⤵
- Executes dropped EXE
PID:3700 -
\??\c:\9nttnt.exec:\9nttnt.exe63⤵
- Executes dropped EXE
PID:3872 -
\??\c:\htttth.exec:\htttth.exe64⤵
- Executes dropped EXE
PID:4356 -
\??\c:\htbhnn.exec:\htbhnn.exe65⤵
- Executes dropped EXE
PID:3660 -
\??\c:\ddvpj.exec:\ddvpj.exe66⤵PID:4296
-
\??\c:\ddppj.exec:\ddppj.exe67⤵PID:3652
-
\??\c:\3llrrrr.exec:\3llrrrr.exe68⤵PID:3572
-
\??\c:\lrflfll.exec:\lrflfll.exe69⤵PID:3852
-
\??\c:\djdjj.exec:\djdjj.exe70⤵PID:4436
-
\??\c:\dvdjj.exec:\dvdjj.exe71⤵PID:2028
-
\??\c:\ddjdv.exec:\ddjdv.exe72⤵PID:4424
-
\??\c:\vpddv.exec:\vpddv.exe73⤵PID:4744
-
\??\c:\xxffflr.exec:\xxffflr.exe74⤵PID:3524
-
\??\c:\jjpjp.exec:\jjpjp.exe75⤵PID:2556
-
\??\c:\fxrflxx.exec:\fxrflxx.exe76⤵
- System Location Discovery: System Language Discovery
PID:744 -
\??\c:\lfrffrx.exec:\lfrffrx.exe77⤵
- System Location Discovery: System Language Discovery
PID:2444 -
\??\c:\7lllllr.exec:\7lllllr.exe78⤵PID:784
-
\??\c:\rllffff.exec:\rllffff.exe79⤵PID:3804
-
\??\c:\llfxlfr.exec:\llfxlfr.exe80⤵PID:4704
-
\??\c:\xlxxxfl.exec:\xlxxxfl.exe81⤵PID:5084
-
\??\c:\rlrrlrr.exec:\rlrrlrr.exe82⤵PID:2916
-
\??\c:\hnbntn.exec:\hnbntn.exe83⤵PID:4516
-
\??\c:\5hnnth.exec:\5hnnth.exe84⤵PID:4732
-
\??\c:\ntnhhh.exec:\ntnhhh.exe85⤵PID:2232
-
\??\c:\ddvvd.exec:\ddvvd.exe86⤵PID:1188
-
\??\c:\vpdjp.exec:\vpdjp.exe87⤵PID:516
-
\??\c:\ddjjd.exec:\ddjjd.exe88⤵PID:2236
-
\??\c:\pdpjj.exec:\pdpjj.exe89⤵PID:828
-
\??\c:\1ttnnn.exec:\1ttnnn.exe90⤵PID:2792
-
\??\c:\tntnnt.exec:\tntnnt.exe91⤵PID:4344
-
\??\c:\3nhhhh.exec:\3nhhhh.exe92⤵
- System Location Discovery: System Language Discovery
PID:1520 -
\??\c:\jpppj.exec:\jpppj.exe93⤵PID:1116
-
\??\c:\nnbbhh.exec:\nnbbhh.exe94⤵PID:1104
-
\??\c:\7hbtth.exec:\7hbtth.exe95⤵PID:5036
-
\??\c:\ppvjj.exec:\ppvjj.exe96⤵PID:404
-
\??\c:\jpppd.exec:\jpppd.exe97⤵PID:2596
-
\??\c:\jvvdd.exec:\jvvdd.exe98⤵PID:4952
-
\??\c:\ddppp.exec:\ddppp.exe99⤵
- System Location Discovery: System Language Discovery
PID:2384 -
\??\c:\7vjjj.exec:\7vjjj.exe100⤵PID:688
-
\??\c:\jdddd.exec:\jdddd.exe101⤵PID:4988
-
\??\c:\pvjdd.exec:\pvjdd.exe102⤵PID:1208
-
\??\c:\ntnnnb.exec:\ntnnnb.exe103⤵PID:5072
-
\??\c:\3bhhhh.exec:\3bhhhh.exe104⤵PID:3328
-
\??\c:\hhbhtt.exec:\hhbhtt.exe105⤵
- System Location Discovery: System Language Discovery
PID:3216 -
\??\c:\tntthb.exec:\tntthb.exe106⤵PID:2336
-
\??\c:\tntnhb.exec:\tntnhb.exe107⤵PID:2716
-
\??\c:\pvpjd.exec:\pvpjd.exe108⤵PID:1844
-
\??\c:\vpppv.exec:\vpppv.exe109⤵PID:3144
-
\??\c:\dvvvj.exec:\dvvvj.exe110⤵PID:348
-
\??\c:\7jdvv.exec:\7jdvv.exe111⤵PID:4924
-
\??\c:\jjvvv.exec:\jjvvv.exe112⤵PID:1168
-
\??\c:\hbbtnt.exec:\hbbtnt.exe113⤵PID:700
-
\??\c:\hnhbth.exec:\hnhbth.exe114⤵PID:3700
-
\??\c:\9bbbtn.exec:\9bbbtn.exe115⤵PID:808
-
\??\c:\thhhht.exec:\thhhht.exe116⤵PID:4068
-
\??\c:\nhnhhb.exec:\nhnhhb.exe117⤵PID:4508
-
\??\c:\bnthhb.exec:\bnthhb.exe118⤵PID:1968
-
\??\c:\ttnhhh.exec:\ttnhhh.exe119⤵PID:1624
-
\??\c:\nhnnnb.exec:\nhnnnb.exe120⤵PID:3416
-
\??\c:\nnbthb.exec:\nnbthb.exe121⤵PID:2272
-
\??\c:\tthhtn.exec:\tthhtn.exe122⤵PID:3744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-