Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2024, 06:47
Behavioral task
behavioral1
Sample
e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe
Resource
win7-20240708-en
9 signatures
120 seconds
General
-
Target
e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe
-
Size
3.7MB
-
MD5
1e766839d720066b199c94c9b2f97d50
-
SHA1
3bfbe2548853151f9ecc706812281ccfbee831ec
-
SHA256
e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29a
-
SHA512
b199afb6f7ebcb8b0a7bff4d1a1cec6a35693743ad724af7e59d86b0e69f2b3643c76c9bc873a4a08fba6007b53d718938058d1616a199e27935d5c658454744
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98g:U6XLq/qPPslzKx/dJg1ErmN9
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/5092-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3688-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2628-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/780-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3056-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2320-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4756-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3340-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4244-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4588-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/372-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4644-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2792-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/512-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1196-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3708-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4212-155-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4400-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2100-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1148-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1892-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4480-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2344-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5112-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/228-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4124-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4236-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2484-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5028-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4536-248-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2368-255-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/336-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4168-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3632-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3236-298-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4000-305-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/624-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1720-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4400-342-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5100-349-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4112-365-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/912-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2744-391-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3056-404-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3068-423-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1992-433-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/264-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/840-456-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3976-466-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5000-473-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1532-504-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4988-550-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/776-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4644-621-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2884-796-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3872-860-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3888-927-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3392-1102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-1588-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 3688 hnttnt.exe 3600 nhbbhn.exe 2628 jvppv.exe 780 djvpv.exe 2320 pdvjj.exe 3056 tttnnt.exe 3252 rflrrrx.exe 4756 hnhnhn.exe 3340 hbbbbh.exe 4244 hhbttb.exe 4588 rxxffrr.exe 3100 tthhtn.exe 4144 rlrlffx.exe 2700 hnnnhh.exe 372 3xffffl.exe 4644 7hhhbh.exe 3756 dvppv.exe 3500 fxfffll.exe 4752 ttbbnn.exe 2792 nntnnh.exe 2688 rlflrxf.exe 320 jddjv.exe 512 ffrlxfr.exe 1196 fxfffxx.exe 3708 9bnnnh.exe 4212 tbhntb.exe 4420 1nbbhh.exe 4400 rxrrxfl.exe 2100 jjddj.exe 1148 pdjjj.exe 4840 pjvjp.exe 768 xrxxfff.exe 1892 vvvvp.exe 4480 pvddd.exe 2344 vdpvj.exe 5112 lfllllr.exe 228 rrrrrxl.exe 4124 rfffxrr.exe 4236 rlxfxfx.exe 3176 fxfxxxf.exe 4824 hnbbhn.exe 5116 nnnnnn.exe 1060 nthhbh.exe 4984 7tbbbh.exe 2484 nbhbbb.exe 2844 bnnnnn.exe 4772 bntbhn.exe 5028 hthbbt.exe 4536 nhtbnt.exe 4908 tnttbb.exe 2368 hnnhtb.exe 4016 nhttbh.exe 3432 bnthtb.exe 1616 bbnnnt.exe 540 bbtbhh.exe 2804 1tbhbt.exe 336 5hbhhn.exe 2900 tnnttb.exe 4168 hhbhhh.exe 3632 hhhbhh.exe 840 dvpjp.exe 2956 jvjjj.exe 4140 tbhhhn.exe 3236 bhtbhn.exe -
resource yara_rule behavioral2/memory/5092-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c83-3.dat upx behavioral2/memory/5092-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c87-8.dat upx behavioral2/memory/3688-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c89-14.dat upx behavioral2/memory/2628-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3600-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c84-22.dat upx behavioral2/memory/780-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8a-28.dat upx behavioral2/memory/2320-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8b-33.dat upx behavioral2/memory/3056-37-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2320-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8c-40.dat upx behavioral2/files/0x0007000000023c8d-45.dat upx behavioral2/memory/4756-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3252-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8e-52.dat upx behavioral2/files/0x0007000000023c8f-57.dat upx behavioral2/memory/3340-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c90-66.dat upx behavioral2/memory/4244-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c91-69.dat upx behavioral2/memory/4588-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c92-74.dat upx behavioral2/files/0x0007000000023c93-79.dat upx behavioral2/files/0x0007000000023c95-84.dat upx behavioral2/memory/2700-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e754-90.dat upx behavioral2/memory/372-92-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c97-96.dat upx behavioral2/memory/4644-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c98-102.dat upx behavioral2/files/0x0007000000023c99-107.dat upx behavioral2/files/0x0007000000023c9a-112.dat upx behavioral2/files/0x0007000000023c9b-117.dat upx behavioral2/memory/2792-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9c-123.dat upx behavioral2/files/0x0007000000023c9d-129.dat upx behavioral2/memory/512-131-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9e-134.dat upx behavioral2/memory/512-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9f-140.dat upx behavioral2/memory/1196-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca1-146.dat upx behavioral2/memory/3708-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca2-152.dat upx behavioral2/memory/4212-155-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca3-158.dat upx behavioral2/memory/4400-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca4-165.dat upx behavioral2/files/0x0007000000023ca5-169.dat upx behavioral2/memory/2100-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca6-176.dat upx behavioral2/memory/1148-178-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca7-181.dat upx behavioral2/memory/1892-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4480-194-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2344-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5112-202-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/228-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4124-210-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xlrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnthtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rlllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbthbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxlxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lrrrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrllxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3688 5092 e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe 82 PID 5092 wrote to memory of 3688 5092 e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe 82 PID 5092 wrote to memory of 3688 5092 e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe 82 PID 3688 wrote to memory of 3600 3688 hnttnt.exe 83 PID 3688 wrote to memory of 3600 3688 hnttnt.exe 83 PID 3688 wrote to memory of 3600 3688 hnttnt.exe 83 PID 3600 wrote to memory of 2628 3600 nhbbhn.exe 84 PID 3600 wrote to memory of 2628 3600 nhbbhn.exe 84 PID 3600 wrote to memory of 2628 3600 nhbbhn.exe 84 PID 2628 wrote to memory of 780 2628 jvppv.exe 85 PID 2628 wrote to memory of 780 2628 jvppv.exe 85 PID 2628 wrote to memory of 780 2628 jvppv.exe 85 PID 780 wrote to memory of 2320 780 djvpv.exe 86 PID 780 wrote to memory of 2320 780 djvpv.exe 86 PID 780 wrote to memory of 2320 780 djvpv.exe 86 PID 2320 wrote to memory of 3056 2320 pdvjj.exe 87 PID 2320 wrote to memory of 3056 2320 pdvjj.exe 87 PID 2320 wrote to memory of 3056 2320 pdvjj.exe 87 PID 3056 wrote to memory of 3252 3056 tttnnt.exe 88 PID 3056 wrote to memory of 3252 3056 tttnnt.exe 88 PID 3056 wrote to memory of 3252 3056 tttnnt.exe 88 PID 3252 wrote to memory of 4756 3252 rflrrrx.exe 89 PID 3252 wrote to memory of 4756 3252 rflrrrx.exe 89 PID 3252 wrote to memory of 4756 3252 rflrrrx.exe 89 PID 4756 wrote to memory of 3340 4756 hnhnhn.exe 90 PID 4756 wrote to memory of 3340 4756 hnhnhn.exe 90 PID 4756 wrote to memory of 3340 4756 hnhnhn.exe 90 PID 3340 wrote to memory of 4244 3340 hbbbbh.exe 91 PID 3340 wrote to memory of 4244 3340 hbbbbh.exe 91 PID 3340 wrote to memory of 4244 3340 hbbbbh.exe 91 PID 4244 wrote to memory of 4588 4244 hhbttb.exe 92 PID 4244 wrote to memory of 4588 4244 hhbttb.exe 92 PID 4244 wrote to memory of 4588 4244 hhbttb.exe 92 PID 4588 wrote to memory of 3100 4588 rxxffrr.exe 93 PID 4588 wrote to memory of 3100 4588 rxxffrr.exe 93 PID 4588 wrote to memory of 3100 4588 rxxffrr.exe 93 PID 3100 wrote to memory of 4144 3100 tthhtn.exe 94 PID 3100 wrote to memory of 4144 3100 tthhtn.exe 94 PID 3100 wrote to memory of 4144 3100 tthhtn.exe 94 PID 4144 wrote to memory of 2700 4144 rlrlffx.exe 95 PID 4144 wrote to memory of 2700 4144 rlrlffx.exe 95 PID 4144 wrote to memory of 2700 4144 rlrlffx.exe 95 PID 2700 wrote to memory of 372 2700 hnnnhh.exe 96 PID 2700 wrote to memory of 372 2700 hnnnhh.exe 96 PID 2700 wrote to memory of 372 2700 hnnnhh.exe 96 PID 372 wrote to memory of 4644 372 3xffffl.exe 97 PID 372 wrote to memory of 4644 372 3xffffl.exe 97 PID 372 wrote to memory of 4644 372 3xffffl.exe 97 PID 4644 wrote to memory of 3756 4644 7hhhbh.exe 98 PID 4644 wrote to memory of 3756 4644 7hhhbh.exe 98 PID 4644 wrote to memory of 3756 4644 7hhhbh.exe 98 PID 3756 wrote to memory of 3500 3756 dvppv.exe 99 PID 3756 wrote to memory of 3500 3756 dvppv.exe 99 PID 3756 wrote to memory of 3500 3756 dvppv.exe 99 PID 3500 wrote to memory of 4752 3500 fxfffll.exe 100 PID 3500 wrote to memory of 4752 3500 fxfffll.exe 100 PID 3500 wrote to memory of 4752 3500 fxfffll.exe 100 PID 4752 wrote to memory of 2792 4752 ttbbnn.exe 101 PID 4752 wrote to memory of 2792 4752 ttbbnn.exe 101 PID 4752 wrote to memory of 2792 4752 ttbbnn.exe 101 PID 2792 wrote to memory of 2688 2792 nntnnh.exe 102 PID 2792 wrote to memory of 2688 2792 nntnnh.exe 102 PID 2792 wrote to memory of 2688 2792 nntnnh.exe 102 PID 2688 wrote to memory of 320 2688 rlflrxf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe"C:\Users\Admin\AppData\Local\Temp\e0accdd903924f30ca091201bedf7e65b5260697139ff56a55d8cd302759d29aN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\hnttnt.exec:\hnttnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\nhbbhn.exec:\nhbbhn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
\??\c:\jvppv.exec:\jvppv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\djvpv.exec:\djvpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
\??\c:\pdvjj.exec:\pdvjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\tttnnt.exec:\tttnnt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\rflrrrx.exec:\rflrrrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\hnhnhn.exec:\hnhnhn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\hbbbbh.exec:\hbbbbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
\??\c:\hhbttb.exec:\hhbttb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
\??\c:\rxxffrr.exec:\rxxffrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\tthhtn.exec:\tthhtn.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\rlrlffx.exec:\rlrlffx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\hnnnhh.exec:\hnnnhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\3xffffl.exec:\3xffffl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
\??\c:\7hhhbh.exec:\7hhhbh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\dvppv.exec:\dvppv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
\??\c:\fxfffll.exec:\fxfffll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
\??\c:\ttbbnn.exec:\ttbbnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\nntnnh.exec:\nntnnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\rlflrxf.exec:\rlflrxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\jddjv.exec:\jddjv.exe23⤵
- Executes dropped EXE
PID:320 -
\??\c:\ffrlxfr.exec:\ffrlxfr.exe24⤵
- Executes dropped EXE
PID:512 -
\??\c:\fxfffxx.exec:\fxfffxx.exe25⤵
- Executes dropped EXE
PID:1196 -
\??\c:\9bnnnh.exec:\9bnnnh.exe26⤵
- Executes dropped EXE
PID:3708 -
\??\c:\tbhntb.exec:\tbhntb.exe27⤵
- Executes dropped EXE
PID:4212 -
\??\c:\1nbbhh.exec:\1nbbhh.exe28⤵
- Executes dropped EXE
PID:4420 -
\??\c:\rxrrxfl.exec:\rxrrxfl.exe29⤵
- Executes dropped EXE
PID:4400 -
\??\c:\jjddj.exec:\jjddj.exe30⤵
- Executes dropped EXE
PID:2100 -
\??\c:\pdjjj.exec:\pdjjj.exe31⤵
- Executes dropped EXE
PID:1148 -
\??\c:\pjvjp.exec:\pjvjp.exe32⤵
- Executes dropped EXE
PID:4840 -
\??\c:\xrxxfff.exec:\xrxxfff.exe33⤵
- Executes dropped EXE
PID:768 -
\??\c:\vvvvp.exec:\vvvvp.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892 -
\??\c:\pvddd.exec:\pvddd.exe35⤵
- Executes dropped EXE
PID:4480 -
\??\c:\vdpvj.exec:\vdpvj.exe36⤵
- Executes dropped EXE
PID:2344 -
\??\c:\lfllllr.exec:\lfllllr.exe37⤵
- Executes dropped EXE
PID:5112 -
\??\c:\rrrrrxl.exec:\rrrrrxl.exe38⤵
- Executes dropped EXE
PID:228 -
\??\c:\rfffxrr.exec:\rfffxrr.exe39⤵
- Executes dropped EXE
PID:4124 -
\??\c:\rlxfxfx.exec:\rlxfxfx.exe40⤵
- Executes dropped EXE
PID:4236 -
\??\c:\fxfxxxf.exec:\fxfxxxf.exe41⤵
- Executes dropped EXE
PID:3176 -
\??\c:\hnbbhn.exec:\hnbbhn.exe42⤵
- Executes dropped EXE
PID:4824 -
\??\c:\nnnnnn.exec:\nnnnnn.exe43⤵
- Executes dropped EXE
PID:5116 -
\??\c:\nthhbh.exec:\nthhbh.exe44⤵
- Executes dropped EXE
PID:1060 -
\??\c:\7tbbbh.exec:\7tbbbh.exe45⤵
- Executes dropped EXE
PID:4984 -
\??\c:\nbhbbb.exec:\nbhbbb.exe46⤵
- Executes dropped EXE
PID:2484 -
\??\c:\bnnnnn.exec:\bnnnnn.exe47⤵
- Executes dropped EXE
PID:2844 -
\??\c:\bntbhn.exec:\bntbhn.exe48⤵
- Executes dropped EXE
PID:4772 -
\??\c:\hthbbt.exec:\hthbbt.exe49⤵
- Executes dropped EXE
PID:5028 -
\??\c:\nhtbnt.exec:\nhtbnt.exe50⤵
- Executes dropped EXE
PID:4536 -
\??\c:\tnttbb.exec:\tnttbb.exe51⤵
- Executes dropped EXE
PID:4908 -
\??\c:\hnnhtb.exec:\hnnhtb.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368 -
\??\c:\nhttbh.exec:\nhttbh.exe53⤵
- Executes dropped EXE
PID:4016 -
\??\c:\bnthtb.exec:\bnthtb.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3432 -
\??\c:\bbnnnt.exec:\bbnnnt.exe55⤵
- Executes dropped EXE
PID:1616 -
\??\c:\bbtbhh.exec:\bbtbhh.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540 -
\??\c:\1tbhbt.exec:\1tbhbt.exe57⤵
- Executes dropped EXE
PID:2804 -
\??\c:\5hbhhn.exec:\5hbhhn.exe58⤵
- Executes dropped EXE
PID:336 -
\??\c:\tnnttb.exec:\tnnttb.exe59⤵
- Executes dropped EXE
PID:2900 -
\??\c:\hhbhhh.exec:\hhbhhh.exe60⤵
- Executes dropped EXE
PID:4168 -
\??\c:\hhhbhh.exec:\hhhbhh.exe61⤵
- Executes dropped EXE
PID:3632 -
\??\c:\dvpjp.exec:\dvpjp.exe62⤵
- Executes dropped EXE
PID:840 -
\??\c:\jvjjj.exec:\jvjjj.exe63⤵
- Executes dropped EXE
PID:2956 -
\??\c:\tbhhhn.exec:\tbhhhn.exe64⤵
- Executes dropped EXE
PID:4140 -
\??\c:\bhtbhn.exec:\bhtbhn.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236 -
\??\c:\tttbbt.exec:\tttbbt.exe66⤵PID:2608
-
\??\c:\vjdpp.exec:\vjdpp.exe67⤵PID:4000
-
\??\c:\pjpdj.exec:\pjpdj.exe68⤵PID:3984
-
\??\c:\pvppp.exec:\pvppp.exe69⤵PID:624
-
\??\c:\dvddj.exec:\dvddj.exe70⤵PID:1720
-
\??\c:\pdjpp.exec:\pdjpp.exe71⤵PID:2552
-
\??\c:\pdjpp.exec:\pdjpp.exe72⤵PID:512
-
\??\c:\tbhtht.exec:\tbhtht.exe73⤵PID:1052
-
\??\c:\vppjp.exec:\vppjp.exe74⤵PID:4600
-
\??\c:\pjjjj.exec:\pjjjj.exe75⤵PID:632
-
\??\c:\jpddp.exec:\jpddp.exe76⤵PID:4976
-
\??\c:\vjppv.exec:\vjppv.exe77⤵
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\ddpjj.exec:\ddpjj.exe78⤵PID:2364
-
\??\c:\pjddd.exec:\pjddd.exe79⤵PID:4400
-
\??\c:\dpjvv.exec:\dpjvv.exe80⤵PID:1708
-
\??\c:\jpvdd.exec:\jpvdd.exe81⤵PID:5100
-
\??\c:\7lrrrff.exec:\7lrrrff.exe82⤵
- System Location Discovery: System Language Discovery
PID:3248 -
\??\c:\frxrllr.exec:\frxrllr.exe83⤵PID:2284
-
\??\c:\rxfllrr.exec:\rxfllrr.exe84⤵
- System Location Discovery: System Language Discovery
PID:4452 -
\??\c:\llxxxxx.exec:\llxxxxx.exe85⤵PID:3268
-
\??\c:\xxlrrxf.exec:\xxlrrxf.exe86⤵PID:4112
-
\??\c:\ffllflx.exec:\ffllflx.exe87⤵PID:4808
-
\??\c:\lxxffff.exec:\lxxffff.exe88⤵PID:1652
-
\??\c:\fxlffxr.exec:\fxlffxr.exe89⤵PID:3700
-
\??\c:\pjpjj.exec:\pjpjj.exe90⤵PID:4200
-
\??\c:\ddvdd.exec:\ddvdd.exe91⤵PID:912
-
\??\c:\jjvvj.exec:\jjvvj.exe92⤵PID:3820
-
\??\c:\lxrrffr.exec:\lxrrffr.exe93⤵PID:2936
-
\??\c:\llrxxlr.exec:\llrxxlr.exe94⤵PID:2744
-
\??\c:\rrxxrxf.exec:\rrxxrxf.exe95⤵PID:1292
-
\??\c:\bthhhn.exec:\bthhhn.exe96⤵PID:4984
-
\??\c:\hhtbhn.exec:\hhtbhn.exe97⤵
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\fllfxfx.exec:\fllfxfx.exe98⤵
- System Location Discovery: System Language Discovery
PID:3056 -
\??\c:\nthhnh.exec:\nthhnh.exe99⤵PID:1796
-
\??\c:\hthhnn.exec:\hthhnn.exe100⤵PID:1880
-
\??\c:\jvjjd.exec:\jvjjd.exe101⤵PID:4672
-
\??\c:\jjvvd.exec:\jjvvd.exe102⤵PID:4328
-
\??\c:\pddvp.exec:\pddvp.exe103⤵PID:456
-
\??\c:\fflxfrr.exec:\fflxfrr.exe104⤵PID:3068
-
\??\c:\xlxflxf.exec:\xlxflxf.exe105⤵PID:2432
-
\??\c:\rllrrfr.exec:\rllrrfr.exe106⤵PID:3888
-
\??\c:\rxrlxlf.exec:\rxrlxlf.exe107⤵PID:1992
-
\??\c:\ffxxxff.exec:\ffxxxff.exe108⤵PID:436
-
\??\c:\xfllrrl.exec:\xfllrrl.exe109⤵PID:264
-
\??\c:\xflffxr.exec:\xflffxr.exe110⤵PID:2952
-
\??\c:\xrrlxrf.exec:\xrrlxrf.exe111⤵PID:2828
-
\??\c:\lllffxx.exec:\lllffxx.exe112⤵PID:3152
-
\??\c:\xrfxlrl.exec:\xrfxlrl.exe113⤵PID:1248
-
\??\c:\rlffllr.exec:\rlffllr.exe114⤵PID:840
-
\??\c:\lrffrfl.exec:\lrffrfl.exe115⤵PID:2956
-
\??\c:\lxffxff.exec:\lxffxff.exe116⤵PID:1824
-
\??\c:\xrrrrxx.exec:\xrrrrxx.exe117⤵
- System Location Discovery: System Language Discovery
PID:3976 -
\??\c:\xxrlxrl.exec:\xxrlxrl.exe118⤵PID:1388
-
\??\c:\fxfffff.exec:\fxfffff.exe119⤵PID:5000
-
\??\c:\bhnhnh.exec:\bhnhnh.exe120⤵PID:3984
-
\??\c:\nhtnnt.exec:\nhtnnt.exe121⤵PID:4692
-
\??\c:\bthntb.exec:\bthntb.exe122⤵PID:4220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-