Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 08:34
Behavioral task
behavioral1
Sample
2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe
Resource
win7-20240903-en
General
-
Target
2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe
-
Size
3.7MB
-
MD5
e03763091b6d1399381027a081994736
-
SHA1
04b4cdf7141cdd3c287fa601d58eeabf81cf4582
-
SHA256
2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400
-
SHA512
bbd7207889c3a0c4fb4f0143dc51101e3a92d1fe26ed858f6b763d3ec6902ff709ef01ba805114fd9ed55c13984c12bab38e04b8c41dc1fdb26ba2403bec08ca
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98H:U6XLq/qPPslzKx/dJg1ErmNi
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2988-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2996-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2064-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4744-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3616-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3520-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/656-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4936-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1996-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/216-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/336-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4248-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/428-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1616-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4612-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1068-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3052-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/212-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3548-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4724-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4500-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/516-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3912-159-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/392-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4596-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4412-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2564-212-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2728-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2364-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2988-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2132-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3616-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1384-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3060-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3724-270-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1032-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1616-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4676-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4960-310-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1600-329-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4552-345-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3824-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4684-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1660-393-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/556-406-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3092-410-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2344-421-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3264-452-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4252-456-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2328-515-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2172-540-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1592-547-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3260-590-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1080-600-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4956-647-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4080-693-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2056-780-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3668-919-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2012-1210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1844-1265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2740-1278-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2996 thbbtb.exe 2064 3bhnnt.exe 4744 nnnnnt.exe 3616 bnhnbn.exe 3520 bthhhh.exe 656 vjpjd.exe 4936 jpdvv.exe 1996 7pdvp.exe 216 hhbnbn.exe 336 nntttt.exe 4248 nhhhnn.exe 428 xlrlffx.exe 1616 1djvp.exe 1352 hhnhbt.exe 1448 xxxxxrr.exe 4612 7flfxxl.exe 1068 hthhhn.exe 3052 xlrrlll.exe 212 hbnnnt.exe 3548 vdvvv.exe 2176 rfffxfx.exe 4840 jjvdd.exe 4724 lrrlllx.exe 4500 9xlfxxr.exe 516 htbbtt.exe 3912 xffrfrf.exe 688 7hhbth.exe 2856 pjjdv.exe 2784 xflxrrf.exe 2764 1frrrrl.exe 2700 lfxxxfl.exe 2936 fxrlffx.exe 392 rrxlflf.exe 4596 5llflff.exe 3716 xffxxxr.exe 3364 pvjjj.exe 4412 jjppv.exe 2564 pdjdv.exe 2728 ppjjp.exe 3880 vjddv.exe 2364 jjdvv.exe 4440 dpdvp.exe 4188 vpddv.exe 2988 dpvpv.exe 1700 ddjjj.exe 2092 bhttbb.exe 2368 nhnhbb.exe 2132 1ppjj.exe 3616 1tnhbb.exe 1384 nntttt.exe 4216 lllfrrx.exe 3060 1jdvp.exe 828 1dppj.exe 1704 dvddd.exe 3724 jvppj.exe 1032 dpvvv.exe 4036 xlxxrrr.exe 1616 lflllrf.exe 2056 jdvvv.exe 4676 pjdvv.exe 2852 vvvpv.exe 4612 pdvvd.exe 1428 hthtnn.exe 3436 9bhbtt.exe -
resource yara_rule behavioral2/memory/2988-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023ba8-3.dat upx behavioral2/memory/2988-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023bb3-9.dat upx behavioral2/memory/2996-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bc3-13.dat upx behavioral2/memory/4744-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2064-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023ba9-22.dat upx behavioral2/memory/4744-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3616-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3520-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023bc8-29.dat upx behavioral2/files/0x0009000000023bc9-35.dat upx behavioral2/files/0x0009000000023bca-40.dat upx behavioral2/memory/656-43-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023bce-46.dat upx behavioral2/memory/4936-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd0-55.dat upx behavioral2/memory/1996-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/216-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd3-59.dat upx behavioral2/memory/336-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd4-65.dat upx behavioral2/files/0x0008000000023bd5-70.dat upx behavioral2/memory/4248-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/428-79-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd6-78.dat upx behavioral2/files/0x0008000000023c05-85.dat upx behavioral2/memory/1616-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c06-90.dat upx behavioral2/files/0x0008000000023c07-95.dat upx behavioral2/files/0x0008000000023c08-98.dat upx behavioral2/memory/4612-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c09-104.dat upx behavioral2/memory/3052-108-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1068-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c0a-114.dat upx behavioral2/memory/3052-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/212-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c0f-119.dat upx behavioral2/files/0x0008000000023c10-123.dat upx behavioral2/memory/3548-125-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c11-130.dat upx behavioral2/memory/4840-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c23-135.dat upx behavioral2/files/0x0008000000023c29-142.dat upx behavioral2/memory/4724-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c2a-148.dat upx behavioral2/memory/4500-147-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/516-154-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c2b-153.dat upx behavioral2/files/0x0008000000023c2c-160.dat upx behavioral2/memory/3912-159-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c2d-165.dat upx behavioral2/files/0x0008000000023c2e-169.dat upx behavioral2/files/0x000b000000023c43-174.dat upx behavioral2/files/0x0016000000023c44-178.dat upx behavioral2/memory/2700-181-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c4a-185.dat upx behavioral2/memory/392-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3716-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4596-197-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4412-208-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flffxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxlxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllxlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xxrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrlllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xfxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnntb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2996 2988 2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe 82 PID 2988 wrote to memory of 2996 2988 2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe 82 PID 2988 wrote to memory of 2996 2988 2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe 82 PID 2996 wrote to memory of 2064 2996 thbbtb.exe 83 PID 2996 wrote to memory of 2064 2996 thbbtb.exe 83 PID 2996 wrote to memory of 2064 2996 thbbtb.exe 83 PID 2064 wrote to memory of 4744 2064 3bhnnt.exe 84 PID 2064 wrote to memory of 4744 2064 3bhnnt.exe 84 PID 2064 wrote to memory of 4744 2064 3bhnnt.exe 84 PID 4744 wrote to memory of 3616 4744 nnnnnt.exe 85 PID 4744 wrote to memory of 3616 4744 nnnnnt.exe 85 PID 4744 wrote to memory of 3616 4744 nnnnnt.exe 85 PID 3616 wrote to memory of 3520 3616 bnhnbn.exe 86 PID 3616 wrote to memory of 3520 3616 bnhnbn.exe 86 PID 3616 wrote to memory of 3520 3616 bnhnbn.exe 86 PID 3520 wrote to memory of 656 3520 bthhhh.exe 87 PID 3520 wrote to memory of 656 3520 bthhhh.exe 87 PID 3520 wrote to memory of 656 3520 bthhhh.exe 87 PID 656 wrote to memory of 4936 656 vjpjd.exe 88 PID 656 wrote to memory of 4936 656 vjpjd.exe 88 PID 656 wrote to memory of 4936 656 vjpjd.exe 88 PID 4936 wrote to memory of 1996 4936 jpdvv.exe 89 PID 4936 wrote to memory of 1996 4936 jpdvv.exe 89 PID 4936 wrote to memory of 1996 4936 jpdvv.exe 89 PID 1996 wrote to memory of 216 1996 7pdvp.exe 90 PID 1996 wrote to memory of 216 1996 7pdvp.exe 90 PID 1996 wrote to memory of 216 1996 7pdvp.exe 90 PID 216 wrote to memory of 336 216 hhbnbn.exe 139 PID 216 wrote to memory of 336 216 hhbnbn.exe 139 PID 216 wrote to memory of 336 216 hhbnbn.exe 139 PID 336 wrote to memory of 4248 336 nntttt.exe 92 PID 336 wrote to memory of 4248 336 nntttt.exe 92 PID 336 wrote to memory of 4248 336 nntttt.exe 92 PID 4248 wrote to memory of 428 4248 nhhhnn.exe 93 PID 4248 wrote to memory of 428 4248 nhhhnn.exe 93 PID 4248 wrote to memory of 428 4248 nhhhnn.exe 93 PID 428 wrote to memory of 1616 428 xlrlffx.exe 143 PID 428 wrote to memory of 1616 428 xlrlffx.exe 143 PID 428 wrote to memory of 1616 428 xlrlffx.exe 143 PID 1616 wrote to memory of 1352 1616 1djvp.exe 95 PID 1616 wrote to memory of 1352 1616 1djvp.exe 95 PID 1616 wrote to memory of 1352 1616 1djvp.exe 95 PID 1352 wrote to memory of 1448 1352 hhnhbt.exe 96 PID 1352 wrote to memory of 1448 1352 hhnhbt.exe 96 PID 1352 wrote to memory of 1448 1352 hhnhbt.exe 96 PID 1448 wrote to memory of 4612 1448 xxxxxrr.exe 147 PID 1448 wrote to memory of 4612 1448 xxxxxrr.exe 147 PID 1448 wrote to memory of 4612 1448 xxxxxrr.exe 147 PID 4612 wrote to memory of 1068 4612 7flfxxl.exe 98 PID 4612 wrote to memory of 1068 4612 7flfxxl.exe 98 PID 4612 wrote to memory of 1068 4612 7flfxxl.exe 98 PID 1068 wrote to memory of 3052 1068 hthhhn.exe 151 PID 1068 wrote to memory of 3052 1068 hthhhn.exe 151 PID 1068 wrote to memory of 3052 1068 hthhhn.exe 151 PID 3052 wrote to memory of 212 3052 xlrrlll.exe 100 PID 3052 wrote to memory of 212 3052 xlrrlll.exe 100 PID 3052 wrote to memory of 212 3052 xlrrlll.exe 100 PID 212 wrote to memory of 3548 212 hbnnnt.exe 101 PID 212 wrote to memory of 3548 212 hbnnnt.exe 101 PID 212 wrote to memory of 3548 212 hbnnnt.exe 101 PID 3548 wrote to memory of 2176 3548 vdvvv.exe 102 PID 3548 wrote to memory of 2176 3548 vdvvv.exe 102 PID 3548 wrote to memory of 2176 3548 vdvvv.exe 102 PID 2176 wrote to memory of 4840 2176 rfffxfx.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe"C:\Users\Admin\AppData\Local\Temp\2cd60b3130d4a62af3777945dbd434050ca2a3244286fd729dbca07e49a67400.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\thbbtb.exec:\thbbtb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\3bhnnt.exec:\3bhnnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\nnnnnt.exec:\nnnnnt.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\bnhnbn.exec:\bnhnbn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\bthhhh.exec:\bthhhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\vjpjd.exec:\vjpjd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\jpdvv.exec:\jpdvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\7pdvp.exec:\7pdvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\hhbnbn.exec:\hhbnbn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\nntttt.exec:\nntttt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
\??\c:\nhhhnn.exec:\nhhhnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\xlrlffx.exec:\xlrlffx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
\??\c:\1djvp.exec:\1djvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\hhnhbt.exec:\hhnhbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\xxxxxrr.exec:\xxxxxrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\7flfxxl.exec:\7flfxxl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\hthhhn.exec:\hthhhn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\xlrrlll.exec:\xlrrlll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\hbnnnt.exec:\hbnnnt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\vdvvv.exec:\vdvvv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
\??\c:\rfffxfx.exec:\rfffxfx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\jjvdd.exec:\jjvdd.exe23⤵
- Executes dropped EXE
PID:4840 -
\??\c:\lrrlllx.exec:\lrrlllx.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4724 -
\??\c:\9xlfxxr.exec:\9xlfxxr.exe25⤵
- Executes dropped EXE
PID:4500 -
\??\c:\htbbtt.exec:\htbbtt.exe26⤵
- Executes dropped EXE
PID:516 -
\??\c:\xffrfrf.exec:\xffrfrf.exe27⤵
- Executes dropped EXE
PID:3912 -
\??\c:\7hhbth.exec:\7hhbth.exe28⤵
- Executes dropped EXE
PID:688 -
\??\c:\pjjdv.exec:\pjjdv.exe29⤵
- Executes dropped EXE
PID:2856 -
\??\c:\xflxrrf.exec:\xflxrrf.exe30⤵
- Executes dropped EXE
PID:2784 -
\??\c:\1frrrrl.exec:\1frrrrl.exe31⤵
- Executes dropped EXE
PID:2764 -
\??\c:\lfxxxfl.exec:\lfxxxfl.exe32⤵
- Executes dropped EXE
PID:2700 -
\??\c:\fxrlffx.exec:\fxrlffx.exe33⤵
- Executes dropped EXE
PID:2936 -
\??\c:\rrxlflf.exec:\rrxlflf.exe34⤵
- Executes dropped EXE
PID:392 -
\??\c:\5llflff.exec:\5llflff.exe35⤵
- Executes dropped EXE
PID:4596 -
\??\c:\xffxxxr.exec:\xffxxxr.exe36⤵
- Executes dropped EXE
PID:3716 -
\??\c:\pvjjj.exec:\pvjjj.exe37⤵
- Executes dropped EXE
PID:3364 -
\??\c:\jjppv.exec:\jjppv.exe38⤵
- Executes dropped EXE
PID:4412 -
\??\c:\pdjdv.exec:\pdjdv.exe39⤵
- Executes dropped EXE
PID:2564 -
\??\c:\ppjjp.exec:\ppjjp.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728 -
\??\c:\vjddv.exec:\vjddv.exe41⤵
- Executes dropped EXE
PID:3880 -
\??\c:\jjdvv.exec:\jjdvv.exe42⤵
- Executes dropped EXE
PID:2364 -
\??\c:\dpdvp.exec:\dpdvp.exe43⤵
- Executes dropped EXE
PID:4440 -
\??\c:\vpddv.exec:\vpddv.exe44⤵
- Executes dropped EXE
PID:4188 -
\??\c:\dpvpv.exec:\dpvpv.exe45⤵
- Executes dropped EXE
PID:2988 -
\??\c:\ddjjj.exec:\ddjjj.exe46⤵
- Executes dropped EXE
PID:1700 -
\??\c:\bhttbb.exec:\bhttbb.exe47⤵
- Executes dropped EXE
PID:2092 -
\??\c:\nhnhbb.exec:\nhnhbb.exe48⤵
- Executes dropped EXE
PID:2368 -
\??\c:\1ppjj.exec:\1ppjj.exe49⤵
- Executes dropped EXE
PID:2132 -
\??\c:\1tnhbb.exec:\1tnhbb.exe50⤵
- Executes dropped EXE
PID:3616 -
\??\c:\nntttt.exec:\nntttt.exe51⤵
- Executes dropped EXE
PID:1384 -
\??\c:\lllfrrx.exec:\lllfrrx.exe52⤵
- Executes dropped EXE
PID:4216 -
\??\c:\1jdvp.exec:\1jdvp.exe53⤵
- Executes dropped EXE
PID:3060 -
\??\c:\1dppj.exec:\1dppj.exe54⤵
- Executes dropped EXE
PID:828 -
\??\c:\dvddd.exec:\dvddd.exe55⤵
- Executes dropped EXE
PID:1704 -
\??\c:\jvppj.exec:\jvppj.exe56⤵
- Executes dropped EXE
PID:3724 -
\??\c:\dpvvv.exec:\dpvvv.exe57⤵
- Executes dropped EXE
PID:1032 -
\??\c:\xlxxrrr.exec:\xlxxrrr.exe58⤵
- Executes dropped EXE
PID:4036 -
\??\c:\lflllrf.exec:\lflllrf.exe59⤵
- Executes dropped EXE
PID:1616 -
\??\c:\jdvvv.exec:\jdvvv.exe60⤵
- Executes dropped EXE
PID:2056 -
\??\c:\pjdvv.exec:\pjdvv.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676 -
\??\c:\vvvpv.exec:\vvvpv.exe62⤵
- Executes dropped EXE
PID:2852 -
\??\c:\pdvvd.exec:\pdvvd.exe63⤵
- Executes dropped EXE
PID:4612 -
\??\c:\hthtnn.exec:\hthtnn.exe64⤵
- Executes dropped EXE
PID:1428 -
\??\c:\9bhbtt.exec:\9bhbtt.exe65⤵
- Executes dropped EXE
PID:3436 -
\??\c:\bbtntt.exec:\bbtntt.exe66⤵PID:3332
-
\??\c:\1xrlfff.exec:\1xrlfff.exe67⤵PID:3052
-
\??\c:\fxllrrf.exec:\fxllrrf.exe68⤵PID:4960
-
\??\c:\xrrflxf.exec:\xrrflxf.exe69⤵PID:1712
-
\??\c:\pdpvv.exec:\pdpvv.exe70⤵PID:4268
-
\??\c:\dvppp.exec:\dvppp.exe71⤵PID:3752
-
\??\c:\jvddj.exec:\jvddj.exe72⤵PID:4848
-
\??\c:\nnhhhh.exec:\nnhhhh.exe73⤵PID:4984
-
\??\c:\9bbbhh.exec:\9bbbhh.exe74⤵PID:1600
-
\??\c:\ntnnnn.exec:\ntnnnn.exe75⤵PID:980
-
\??\c:\ttbbhh.exec:\ttbbhh.exe76⤵PID:3076
-
\??\c:\nnnhnn.exec:\nnnhnn.exe77⤵PID:4636
-
\??\c:\hbhbnn.exec:\hbhbnn.exe78⤵PID:2872
-
\??\c:\fxrfllf.exec:\fxrfllf.exe79⤵PID:4552
-
\??\c:\xxffxxr.exec:\xxffxxr.exe80⤵PID:4548
-
\??\c:\lxlllxx.exec:\lxlllxx.exe81⤵PID:3824
-
\??\c:\3rrrrfx.exec:\3rrrrfx.exe82⤵PID:3348
-
\??\c:\9xxrrrr.exec:\9xxrrrr.exe83⤵
- System Location Discovery: System Language Discovery
PID:4732 -
\??\c:\jjppp.exec:\jjppp.exe84⤵PID:5020
-
\??\c:\vvpjj.exec:\vvpjj.exe85⤵PID:4004
-
\??\c:\pjvpp.exec:\pjvpp.exe86⤵PID:1452
-
\??\c:\vjddv.exec:\vjddv.exe87⤵PID:4684
-
\??\c:\jpvvv.exec:\jpvvv.exe88⤵PID:2224
-
\??\c:\jvjdv.exec:\jvjdv.exe89⤵PID:4596
-
\??\c:\btttnh.exec:\btttnh.exe90⤵PID:4620
-
\??\c:\pjdpj.exec:\pjdpj.exe91⤵
- System Location Discovery: System Language Discovery
PID:2012 -
\??\c:\hnnnnt.exec:\hnnnnt.exe92⤵PID:640
-
\??\c:\bhnhtt.exec:\bhnhtt.exe93⤵PID:1664
-
\??\c:\1dvvp.exec:\1dvvp.exe94⤵PID:1660
-
\??\c:\lrlrrxx.exec:\lrlrrxx.exe95⤵PID:1784
-
\??\c:\xxlrlrr.exec:\xxlrlrr.exe96⤵
- System Location Discovery: System Language Discovery
PID:532 -
\??\c:\bthhbb.exec:\bthhbb.exe97⤵PID:4624
-
\??\c:\bnnhhb.exec:\bnnhhb.exe98⤵PID:556
-
\??\c:\hhnnnh.exec:\hhnnnh.exe99⤵PID:3092
-
\??\c:\jpppp.exec:\jpppp.exe100⤵PID:316
-
\??\c:\dvjdv.exec:\dvjdv.exe101⤵PID:1952
-
\??\c:\pvjpj.exec:\pvjpj.exe102⤵PID:2344
-
\??\c:\vpjjd.exec:\vpjjd.exe103⤵PID:4300
-
\??\c:\ddvvj.exec:\ddvvj.exe104⤵PID:2300
-
\??\c:\vvvdd.exec:\vvvdd.exe105⤵PID:2060
-
\??\c:\dvvpd.exec:\dvvpd.exe106⤵PID:1996
-
\??\c:\5dppj.exec:\5dppj.exe107⤵PID:4156
-
\??\c:\7lfffff.exec:\7lfffff.exe108⤵PID:4384
-
\??\c:\xlffxrr.exec:\xlffxrr.exe109⤵PID:2688
-
\??\c:\ffxxxll.exec:\ffxxxll.exe110⤵PID:312
-
\??\c:\xxrfrlx.exec:\xxrfrlx.exe111⤵PID:2256
-
\??\c:\lxfxrlf.exec:\lxfxrlf.exe112⤵PID:3264
-
\??\c:\flrxfxl.exec:\flrxfxl.exe113⤵PID:4252
-
\??\c:\flflflf.exec:\flflflf.exe114⤵PID:2772
-
\??\c:\nhbbhb.exec:\nhbbhb.exe115⤵PID:2852
-
\??\c:\nbnhbb.exec:\nbnhbb.exe116⤵PID:3688
-
\??\c:\rxxxrxx.exec:\rxxxrxx.exe117⤵PID:3352
-
\??\c:\ntbttt.exec:\ntbttt.exe118⤵PID:3368
-
\??\c:\tnnnnn.exec:\tnnnnn.exe119⤵PID:3052
-
\??\c:\tthhhn.exec:\tthhhn.exe120⤵
- System Location Discovery: System Language Discovery
PID:3140 -
\??\c:\bbbtth.exec:\bbbtth.exe121⤵PID:760
-
\??\c:\nhbthb.exec:\nhbthb.exe122⤵PID:4044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-