Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 12:53
Behavioral task
behavioral1
Sample
c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe
-
Size
3.7MB
-
MD5
0471825561814a2acc015825ab2e3f70
-
SHA1
3bfeae5057bb1675b973b2cedf00107fec01aede
-
SHA256
c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caa
-
SHA512
8078cd0d3c22bfdde2076614ed87f89a7fad208ad21c2c29afb7088c87ba3825a69ee82c471f952dfff60d71faad1a580de5319c22c87b2a5c8e3d2578a6d67b
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98/:U6XLq/qPPslzKx/dJg1ErmNy
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2852-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2936-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4104-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3516-22-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1680-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1096-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/508-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1544-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4736-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4164-60-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2400-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1204-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/804-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/396-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2208-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2352-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1636-120-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3976-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/856-130-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2556-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1304-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3860-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3104-168-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4900-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4168-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2396-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3688-228-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1424-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3192-248-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3076-252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1264-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4744-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/228-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3848-282-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4048-310-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1596-320-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2968-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2488-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3968-341-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4780-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4820-370-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3156-377-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3640-384-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4460-403-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4892-425-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4540-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-436-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2320-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-462-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-466-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-515-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1108-519-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1824-526-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3464-530-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1160-547-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5004-647-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3988-654-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2360-703-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2292-845-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4576-1017-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2544-1267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3092-1292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2936 vpppj.exe 4104 xfxrlrl.exe 3516 tnbnbb.exe 1680 ffxxxrl.exe 508 1bhbtn.exe 1096 ppddv.exe 1544 lfrrrll.exe 4736 ppvvv.exe 4164 1rxrrlr.exe 1856 pjjvp.exe 2872 vjpdd.exe 2400 3rxxxfl.exe 2136 1thtnh.exe 804 jvpdj.exe 1204 xrxrllx.exe 396 nbtntn.exe 2208 tnbbtn.exe 2352 ddjvv.exe 3976 rrrllrx.exe 1636 jjdvv.exe 856 dpjdv.exe 4244 lffrlfx.exe 2556 tnnhbt.exe 3452 nnbbtt.exe 1304 7xffrrr.exe 2988 tbbttn.exe 3860 5dpjd.exe 3104 flrrrrr.exe 4844 thhbbt.exe 864 xflxfrx.exe 1852 thhtht.exe 4900 9jdvd.exe 5020 xflllfl.exe 4780 nthhnt.exe 3008 ntnttn.exe 2044 jvdvd.exe 4168 tnthnh.exe 2396 9jpjv.exe 4716 rrfxxxf.exe 4012 rrxrrrr.exe 2528 nbhbhb.exe 1160 dpdvp.exe 552 thtttt.exe 3688 vjppp.exe 2516 llxrrll.exe 3504 5rffxxx.exe 1432 llxxxlf.exe 4680 3rlllrr.exe 1424 tnhhnh.exe 3192 hnttth.exe 3076 jjjdp.exe 1264 vpjdp.exe 2152 hhnbbt.exe 5092 djdvv.exe 4744 ddpdj.exe 3664 vjjvv.exe 228 fffrlfx.exe 3996 9frflxl.exe 1540 xffrrff.exe 3848 hnbbbn.exe 5048 nnnhnh.exe 940 bhhbbb.exe 3060 nnnhhn.exe 396 tnbttn.exe -
resource yara_rule behavioral2/memory/2852-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000d000000023b68-3.dat upx behavioral2/memory/2852-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bfe-12.dat upx behavioral2/memory/2936-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c03-13.dat upx behavioral2/memory/4104-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c04-23.dat upx behavioral2/memory/3516-22-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023bfb-29.dat upx behavioral2/memory/1680-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c17-33.dat upx behavioral2/memory/1096-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/508-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c1d-40.dat upx behavioral2/files/0x0008000000023c1e-44.dat upx behavioral2/memory/4736-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1544-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4736-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c1f-53.dat upx behavioral2/memory/1856-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4164-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c20-58.dat upx behavioral2/memory/2872-66-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c21-65.dat upx behavioral2/files/0x0008000000023c22-70.dat upx behavioral2/memory/2400-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023c37-77.dat upx behavioral2/files/0x0016000000023c38-83.dat upx behavioral2/files/0x0008000000023c3e-87.dat upx behavioral2/memory/1204-90-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/804-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c42-93.dat upx behavioral2/memory/396-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c4e-100.dat upx behavioral2/files/0x0008000000023c4f-104.dat upx behavioral2/memory/2208-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c50-113.dat upx behavioral2/memory/2352-112-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1636-120-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3976-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c51-117.dat upx behavioral2/files/0x0008000000023c52-125.dat upx behavioral2/files/0x0008000000023c53-131.dat upx behavioral2/memory/856-130-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c54-136.dat upx behavioral2/files/0x0008000000023c55-139.dat upx behavioral2/memory/2556-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000500000001e75a-147.dat upx behavioral2/files/0x0008000000023c57-152.dat upx behavioral2/memory/1304-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c61-157.dat upx behavioral2/files/0x0007000000023c62-163.dat upx behavioral2/memory/3860-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c63-169.dat upx behavioral2/memory/3104-168-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c64-172.dat upx behavioral2/memory/864-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c65-180.dat upx behavioral2/files/0x0007000000023c66-185.dat upx behavioral2/memory/4900-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4168-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2396-208-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3688-228-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7llrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxlxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xfxxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frrxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1frrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrfllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrlxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xlfflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ntnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xlrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xfxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nnnbt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2936 2852 c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe 82 PID 2852 wrote to memory of 2936 2852 c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe 82 PID 2852 wrote to memory of 2936 2852 c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe 82 PID 2936 wrote to memory of 4104 2936 vpppj.exe 83 PID 2936 wrote to memory of 4104 2936 vpppj.exe 83 PID 2936 wrote to memory of 4104 2936 vpppj.exe 83 PID 4104 wrote to memory of 3516 4104 xfxrlrl.exe 238 PID 4104 wrote to memory of 3516 4104 xfxrlrl.exe 238 PID 4104 wrote to memory of 3516 4104 xfxrlrl.exe 238 PID 3516 wrote to memory of 1680 3516 tnbnbb.exe 188 PID 3516 wrote to memory of 1680 3516 tnbnbb.exe 188 PID 3516 wrote to memory of 1680 3516 tnbnbb.exe 188 PID 1680 wrote to memory of 508 1680 ffxxxrl.exe 86 PID 1680 wrote to memory of 508 1680 ffxxxrl.exe 86 PID 1680 wrote to memory of 508 1680 ffxxxrl.exe 86 PID 508 wrote to memory of 1096 508 1bhbtn.exe 87 PID 508 wrote to memory of 1096 508 1bhbtn.exe 87 PID 508 wrote to memory of 1096 508 1bhbtn.exe 87 PID 1096 wrote to memory of 1544 1096 ppddv.exe 88 PID 1096 wrote to memory of 1544 1096 ppddv.exe 88 PID 1096 wrote to memory of 1544 1096 ppddv.exe 88 PID 1544 wrote to memory of 4736 1544 lfrrrll.exe 89 PID 1544 wrote to memory of 4736 1544 lfrrrll.exe 89 PID 1544 wrote to memory of 4736 1544 lfrrrll.exe 89 PID 4736 wrote to memory of 4164 4736 ppvvv.exe 90 PID 4736 wrote to memory of 4164 4736 ppvvv.exe 90 PID 4736 wrote to memory of 4164 4736 ppvvv.exe 90 PID 4164 wrote to memory of 1856 4164 1rxrrlr.exe 91 PID 4164 wrote to memory of 1856 4164 1rxrrlr.exe 91 PID 4164 wrote to memory of 1856 4164 1rxrrlr.exe 91 PID 1856 wrote to memory of 2872 1856 pjjvp.exe 92 PID 1856 wrote to memory of 2872 1856 pjjvp.exe 92 PID 1856 wrote to memory of 2872 1856 pjjvp.exe 92 PID 2872 wrote to memory of 2400 2872 vjpdd.exe 93 PID 2872 wrote to memory of 2400 2872 vjpdd.exe 93 PID 2872 wrote to memory of 2400 2872 vjpdd.exe 93 PID 2400 wrote to memory of 2136 2400 3rxxxfl.exe 94 PID 2400 wrote to memory of 2136 2400 3rxxxfl.exe 94 PID 2400 wrote to memory of 2136 2400 3rxxxfl.exe 94 PID 2136 wrote to memory of 804 2136 1thtnh.exe 95 PID 2136 wrote to memory of 804 2136 1thtnh.exe 95 PID 2136 wrote to memory of 804 2136 1thtnh.exe 95 PID 804 wrote to memory of 1204 804 jvpdj.exe 201 PID 804 wrote to memory of 1204 804 jvpdj.exe 201 PID 804 wrote to memory of 1204 804 jvpdj.exe 201 PID 1204 wrote to memory of 396 1204 xrxrllx.exe 151 PID 1204 wrote to memory of 396 1204 xrxrllx.exe 151 PID 1204 wrote to memory of 396 1204 xrxrllx.exe 151 PID 396 wrote to memory of 2208 396 nbtntn.exe 98 PID 396 wrote to memory of 2208 396 nbtntn.exe 98 PID 396 wrote to memory of 2208 396 nbtntn.exe 98 PID 2208 wrote to memory of 2352 2208 tnbbtn.exe 99 PID 2208 wrote to memory of 2352 2208 tnbbtn.exe 99 PID 2208 wrote to memory of 2352 2208 tnbbtn.exe 99 PID 2352 wrote to memory of 3976 2352 ddjvv.exe 100 PID 2352 wrote to memory of 3976 2352 ddjvv.exe 100 PID 2352 wrote to memory of 3976 2352 ddjvv.exe 100 PID 3976 wrote to memory of 1636 3976 rrrllrx.exe 101 PID 3976 wrote to memory of 1636 3976 rrrllrx.exe 101 PID 3976 wrote to memory of 1636 3976 rrrllrx.exe 101 PID 1636 wrote to memory of 856 1636 jjdvv.exe 102 PID 1636 wrote to memory of 856 1636 jjdvv.exe 102 PID 1636 wrote to memory of 856 1636 jjdvv.exe 102 PID 856 wrote to memory of 4244 856 dpjdv.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe"C:\Users\Admin\AppData\Local\Temp\c93912b5901e85e99142fcbf15a2cb596c98c5e61b52ad998f695a99f4075caaN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\vpppj.exec:\vpppj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\xfxrlrl.exec:\xfxrlrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
\??\c:\tnbnbb.exec:\tnbnbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\ffxxxrl.exec:\ffxxxrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\1bhbtn.exec:\1bhbtn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:508 -
\??\c:\ppddv.exec:\ppddv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\lfrrrll.exec:\lfrrrll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\ppvvv.exec:\ppvvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\1rxrrlr.exec:\1rxrrlr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\pjjvp.exec:\pjjvp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\vjpdd.exec:\vjpdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\3rxxxfl.exec:\3rxxxfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\1thtnh.exec:\1thtnh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\jvpdj.exec:\jvpdj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
\??\c:\xrxrllx.exec:\xrxrllx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\nbtntn.exec:\nbtntn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\tnbbtn.exec:\tnbbtn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\ddjvv.exec:\ddjvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\rrrllrx.exec:\rrrllrx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\jjdvv.exec:\jjdvv.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\dpjdv.exec:\dpjdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\lffrlfx.exec:\lffrlfx.exe23⤵
- Executes dropped EXE
PID:4244 -
\??\c:\tnnhbt.exec:\tnnhbt.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556 -
\??\c:\nnbbtt.exec:\nnbbtt.exe25⤵
- Executes dropped EXE
PID:3452 -
\??\c:\7xffrrr.exec:\7xffrrr.exe26⤵
- Executes dropped EXE
PID:1304 -
\??\c:\tbbttn.exec:\tbbttn.exe27⤵
- Executes dropped EXE
PID:2988 -
\??\c:\5dpjd.exec:\5dpjd.exe28⤵
- Executes dropped EXE
PID:3860 -
\??\c:\flrrrrr.exec:\flrrrrr.exe29⤵
- Executes dropped EXE
PID:3104 -
\??\c:\thhbbt.exec:\thhbbt.exe30⤵
- Executes dropped EXE
PID:4844 -
\??\c:\xflxfrx.exec:\xflxfrx.exe31⤵
- Executes dropped EXE
PID:864 -
\??\c:\thhtht.exec:\thhtht.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852 -
\??\c:\9jdvd.exec:\9jdvd.exe33⤵
- Executes dropped EXE
PID:4900 -
\??\c:\xflllfl.exec:\xflllfl.exe34⤵
- Executes dropped EXE
PID:5020 -
\??\c:\nthhnt.exec:\nthhnt.exe35⤵
- Executes dropped EXE
PID:4780 -
\??\c:\ntnttn.exec:\ntnttn.exe36⤵
- Executes dropped EXE
PID:3008 -
\??\c:\jvdvd.exec:\jvdvd.exe37⤵
- Executes dropped EXE
PID:2044 -
\??\c:\tnthnh.exec:\tnthnh.exe38⤵
- Executes dropped EXE
PID:4168 -
\??\c:\9jpjv.exec:\9jpjv.exe39⤵
- Executes dropped EXE
PID:2396 -
\??\c:\rrfxxxf.exec:\rrfxxxf.exe40⤵
- Executes dropped EXE
PID:4716 -
\??\c:\rrxrrrr.exec:\rrxrrrr.exe41⤵
- Executes dropped EXE
PID:4012 -
\??\c:\nbhbhb.exec:\nbhbhb.exe42⤵
- Executes dropped EXE
PID:2528 -
\??\c:\dpdvp.exec:\dpdvp.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1160 -
\??\c:\7rlllff.exec:\7rlllff.exe44⤵PID:3884
-
\??\c:\thtttt.exec:\thtttt.exe45⤵
- Executes dropped EXE
PID:552 -
\??\c:\vjppp.exec:\vjppp.exe46⤵
- Executes dropped EXE
PID:3688 -
\??\c:\llxrrll.exec:\llxrrll.exe47⤵
- Executes dropped EXE
PID:2516 -
\??\c:\5rffxxx.exec:\5rffxxx.exe48⤵
- Executes dropped EXE
PID:3504 -
\??\c:\llxxxlf.exec:\llxxxlf.exe49⤵
- Executes dropped EXE
PID:1432 -
\??\c:\3rlllrr.exec:\3rlllrr.exe50⤵
- Executes dropped EXE
PID:4680 -
\??\c:\tnhhnh.exec:\tnhhnh.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1424 -
\??\c:\hnttth.exec:\hnttth.exe52⤵
- Executes dropped EXE
PID:3192 -
\??\c:\jjjdp.exec:\jjjdp.exe53⤵
- Executes dropped EXE
PID:3076 -
\??\c:\vpjdp.exec:\vpjdp.exe54⤵
- Executes dropped EXE
PID:1264 -
\??\c:\hhnbbt.exec:\hhnbbt.exe55⤵
- Executes dropped EXE
PID:2152 -
\??\c:\djdvv.exec:\djdvv.exe56⤵
- Executes dropped EXE
PID:5092 -
\??\c:\ddpdj.exec:\ddpdj.exe57⤵
- Executes dropped EXE
PID:4744 -
\??\c:\vjjvv.exec:\vjjvv.exe58⤵
- Executes dropped EXE
PID:3664 -
\??\c:\fffrlfx.exec:\fffrlfx.exe59⤵
- Executes dropped EXE
PID:228 -
\??\c:\9frflxl.exec:\9frflxl.exe60⤵
- Executes dropped EXE
PID:3996 -
\??\c:\xffrrff.exec:\xffrrff.exe61⤵
- Executes dropped EXE
PID:1540 -
\??\c:\hnbbbn.exec:\hnbbbn.exe62⤵
- Executes dropped EXE
PID:3848 -
\??\c:\nnnhnh.exec:\nnnhnh.exe63⤵
- Executes dropped EXE
PID:5048 -
\??\c:\bhhbbb.exec:\bhhbbb.exe64⤵
- Executes dropped EXE
PID:940 -
\??\c:\nnnhhn.exec:\nnnhhn.exe65⤵
- Executes dropped EXE
PID:3060 -
\??\c:\tnbttn.exec:\tnbttn.exe66⤵
- Executes dropped EXE
PID:396 -
\??\c:\hbhthb.exec:\hbhthb.exe67⤵PID:3684
-
\??\c:\thtttt.exec:\thtttt.exe68⤵PID:3908
-
\??\c:\3nnhnh.exec:\3nnhnh.exe69⤵PID:624
-
\??\c:\nhtnnh.exec:\nhtnnh.exe70⤵PID:4364
-
\??\c:\1tnhbb.exec:\1tnhbb.exe71⤵PID:4048
-
\??\c:\bthhbb.exec:\bthhbb.exe72⤵PID:1240
-
\??\c:\1nnhbh.exec:\1nnhbh.exe73⤵PID:1404
-
\??\c:\5btnhn.exec:\5btnhn.exe74⤵PID:1596
-
\??\c:\ttttbb.exec:\ttttbb.exe75⤵PID:3208
-
\??\c:\dvvpj.exec:\dvvpj.exe76⤵PID:2968
-
\??\c:\thtbhn.exec:\thtbhn.exe77⤵PID:2848
-
\??\c:\dpvvp.exec:\dpvvp.exe78⤵PID:2488
-
\??\c:\3vjpp.exec:\3vjpp.exe79⤵PID:3052
-
\??\c:\jvdpv.exec:\jvdpv.exe80⤵
- System Location Discovery: System Language Discovery
PID:3968 -
\??\c:\vjpdd.exec:\vjpdd.exe81⤵PID:3964
-
\??\c:\vdddd.exec:\vdddd.exe82⤵PID:5016
-
\??\c:\vjppp.exec:\vjppp.exe83⤵PID:4900
-
\??\c:\ddvdd.exec:\ddvdd.exe84⤵PID:4780
-
\??\c:\ppjvj.exec:\ppjvj.exe85⤵PID:3008
-
\??\c:\djvdj.exec:\djvdj.exe86⤵PID:2044
-
\??\c:\ddppp.exec:\ddppp.exe87⤵PID:4936
-
\??\c:\pdppj.exec:\pdppj.exe88⤵
- System Location Discovery: System Language Discovery
PID:4344 -
\??\c:\bhbbbb.exec:\bhbbbb.exe89⤵PID:4820
-
\??\c:\btbhnb.exec:\btbhnb.exe90⤵PID:4568
-
\??\c:\hhnnnt.exec:\hhnnnt.exe91⤵
- System Location Discovery: System Language Discovery
PID:3156 -
\??\c:\nhhtbn.exec:\nhhtbn.exe92⤵PID:3412
-
\??\c:\tntttt.exec:\tntttt.exe93⤵PID:3640
-
\??\c:\tbbbht.exec:\tbbbht.exe94⤵PID:2752
-
\??\c:\nthhhh.exec:\nthhhh.exe95⤵PID:4280
-
\??\c:\5vpvv.exec:\5vpvv.exe96⤵PID:4488
-
\??\c:\dvvpj.exec:\dvvpj.exe97⤵PID:1100
-
\??\c:\nhhhnn.exec:\nhhhnn.exe98⤵PID:2448
-
\??\c:\9ddpv.exec:\9ddpv.exe99⤵PID:4460
-
\??\c:\9jvpj.exec:\9jvpj.exe100⤵
- System Location Discovery: System Language Discovery
PID:4468 -
\??\c:\jvpjj.exec:\jvpjj.exe101⤵PID:1680
-
\??\c:\djvvd.exec:\djvvd.exe102⤵PID:692
-
\??\c:\9djpp.exec:\9djpp.exe103⤵PID:4548
-
\??\c:\vvvvv.exec:\vvvvv.exe104⤵PID:1696
-
\??\c:\3vppv.exec:\3vppv.exe105⤵PID:4208
-
\??\c:\pdjdp.exec:\pdjdp.exe106⤵PID:4892
-
\??\c:\3vvdd.exec:\3vvdd.exe107⤵PID:2736
-
\??\c:\ddppp.exec:\ddppp.exe108⤵PID:4540
-
\??\c:\dvjjj.exec:\dvjjj.exe109⤵PID:2924
-
\??\c:\pdjpv.exec:\pdjpv.exe110⤵
- System Location Discovery: System Language Discovery
PID:2320 -
\??\c:\fxxlxfx.exec:\fxxlxfx.exe111⤵PID:3320
-
\??\c:\dddvp.exec:\dddvp.exe112⤵PID:3996
-
\??\c:\xflfffx.exec:\xflfffx.exe113⤵PID:1540
-
\??\c:\rfxrrrl.exec:\rfxrrrl.exe114⤵PID:1204
-
\??\c:\1rxfxrl.exec:\1rxfxrl.exe115⤵PID:4528
-
\??\c:\lxrrrrr.exec:\lxrrrrr.exe116⤵PID:1212
-
\??\c:\llllfll.exec:\llllfll.exe117⤵PID:4324
-
\??\c:\nnttnn.exec:\nnttnn.exe118⤵PID:2476
-
\??\c:\thtnnb.exec:\thtnnb.exe119⤵PID:1148
-
\??\c:\5tbtbb.exec:\5tbtbb.exe120⤵PID:4204
-
\??\c:\hbbnht.exec:\hbbnht.exe121⤵PID:5044
-
\??\c:\bhbhnt.exec:\bhbhnt.exe122⤵PID:4732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-