Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 10:17
Behavioral task
behavioral1
Sample
5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe
-
Size
3.7MB
-
MD5
72f767b1183d20c732f674bfe6bac75c
-
SHA1
28d3036ed2d8575e4a141f3ebad201aaf797fc5b
-
SHA256
5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0
-
SHA512
6008c0cbaeb1b3a2e1000280b49003d202b09ce64d397c7b0fcede4016573d353c0c030839db1ea58fb70a4391ac6905f30723a66f9b57973b90ede1cc3eab68
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98A:U6XLq/qPPslzKx/dJg1ErmNl
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/3040-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3564-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4252-15-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3488-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4692-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2844-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4580-39-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1580-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3440-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4044-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/672-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3976-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4256-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5096-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1744-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1636-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1112-135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4344-150-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4032-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4592-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2528-168-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2188-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3908-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4544-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1052-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4856-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1060-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4812-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1120-217-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/216-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3620-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3488-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4588-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/592-251-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1756-264-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1644-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-272-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3436-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1116-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3648-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3868-297-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3012-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2276-329-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/556-336-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2728-340-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2528-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4544-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1484-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1248-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1300-420-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-433-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2744-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1416-456-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4536-490-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4020-669-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3948-679-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3284-812-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3376-1062-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2632-1604-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2264-1759-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 3564 66646.exe 4252 04282.exe 4692 ddpdp.exe 3488 bhnnhb.exe 2844 86260.exe 4580 226006.exe 764 2820280.exe 1580 082424.exe 2220 pjdvp.exe 3440 886266.exe 1016 606660.exe 4044 5xfxlfr.exe 4084 0682648.exe 3976 6626484.exe 672 22620.exe 4256 2462606.exe 3988 3pvjd.exe 5096 jdvpd.exe 1420 rrlxllf.exe 4404 868886.exe 1744 82660.exe 1636 468222.exe 1112 xffrllf.exe 2312 jjpdv.exe 2992 bhhnht.exe 4344 422600.exe 4032 86648.exe 4592 02826.exe 2528 vjdpp.exe 2188 jvdpd.exe 4544 rlrllfl.exe 3908 vpdvj.exe 2208 jdvdj.exe 1052 64288.exe 4856 642228.exe 1060 200444.exe 4984 fxrrlfx.exe 4812 04064.exe 2700 nthhbt.exe 1120 k24484.exe 216 8462884.exe 3620 64682.exe 3488 42802.exe 1300 886600.exe 1468 62448.exe 2820 06266.exe 3636 xfxxxxr.exe 4588 0282222.exe 4636 xxfffff.exe 592 rxfffrr.exe 2192 08660.exe 1600 btbtbt.exe 4696 dpvdd.exe 1756 1bhnhb.exe 1644 0640444.exe 2924 rfllllf.exe 3436 xrrlxxr.exe 1116 82440.exe 1336 tbbnth.exe 4912 6088066.exe 2056 080488.exe 3648 86288.exe 3868 hhhbbt.exe 4064 rlxrlrl.exe -
resource yara_rule behavioral2/memory/3040-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3040-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b4f-3.dat upx behavioral2/files/0x000a000000023b53-8.dat upx behavioral2/memory/3564-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b50-12.dat upx behavioral2/memory/4252-15-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b55-21.dat upx behavioral2/memory/3488-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4692-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b56-27.dat upx behavioral2/files/0x000a000000023b57-32.dat upx behavioral2/memory/2844-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4580-39-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b58-40.dat upx behavioral2/files/0x000a000000023b59-45.dat upx behavioral2/memory/1580-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5a-50.dat upx behavioral2/files/0x0031000000023b5b-54.dat upx behavioral2/files/0x0031000000023b5c-59.dat upx behavioral2/memory/3440-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b5d-65.dat upx behavioral2/files/0x000a000000023b5e-73.dat upx behavioral2/memory/4044-72-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5f-78.dat upx behavioral2/files/0x000a000000023b60-82.dat upx behavioral2/memory/672-85-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3976-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b61-88.dat upx behavioral2/files/0x000a000000023b62-95.dat upx behavioral2/memory/4256-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b63-98.dat upx behavioral2/files/0x000a000000023b64-106.dat upx behavioral2/memory/5096-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b65-110.dat upx behavioral2/files/0x000a000000023b66-116.dat upx behavioral2/memory/1744-122-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b67-120.dat upx behavioral2/files/0x000a000000023b68-126.dat upx behavioral2/memory/1636-128-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b69-132.dat upx behavioral2/memory/1112-135-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6b-138.dat upx behavioral2/files/0x000900000001e104-143.dat upx behavioral2/files/0x000a000000023b6c-148.dat upx behavioral2/memory/4344-150-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4032-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6e-154.dat upx behavioral2/files/0x000a000000023b6f-160.dat upx behavioral2/memory/4592-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b70-166.dat upx behavioral2/memory/2528-168-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b71-173.dat upx behavioral2/memory/2188-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b72-178.dat upx behavioral2/memory/3908-182-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4544-181-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1052-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1052-193-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4856-197-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1060-201-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4984-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4812-209-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2700-213-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 048400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 682046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k44860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4226602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6262468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4008642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 440842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u844202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 008888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o826442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c020266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2422220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8688226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 844204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxflfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o404400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nthtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2222626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m2042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrlllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e06622.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3564 3040 5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe 83 PID 3040 wrote to memory of 3564 3040 5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe 83 PID 3040 wrote to memory of 3564 3040 5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe 83 PID 3564 wrote to memory of 4252 3564 66646.exe 84 PID 3564 wrote to memory of 4252 3564 66646.exe 84 PID 3564 wrote to memory of 4252 3564 66646.exe 84 PID 4252 wrote to memory of 4692 4252 04282.exe 85 PID 4252 wrote to memory of 4692 4252 04282.exe 85 PID 4252 wrote to memory of 4692 4252 04282.exe 85 PID 4692 wrote to memory of 3488 4692 ddpdp.exe 86 PID 4692 wrote to memory of 3488 4692 ddpdp.exe 86 PID 4692 wrote to memory of 3488 4692 ddpdp.exe 86 PID 3488 wrote to memory of 2844 3488 bhnnhb.exe 87 PID 3488 wrote to memory of 2844 3488 bhnnhb.exe 87 PID 3488 wrote to memory of 2844 3488 bhnnhb.exe 87 PID 2844 wrote to memory of 4580 2844 86260.exe 88 PID 2844 wrote to memory of 4580 2844 86260.exe 88 PID 2844 wrote to memory of 4580 2844 86260.exe 88 PID 4580 wrote to memory of 764 4580 226006.exe 89 PID 4580 wrote to memory of 764 4580 226006.exe 89 PID 4580 wrote to memory of 764 4580 226006.exe 89 PID 764 wrote to memory of 1580 764 2820280.exe 90 PID 764 wrote to memory of 1580 764 2820280.exe 90 PID 764 wrote to memory of 1580 764 2820280.exe 90 PID 1580 wrote to memory of 2220 1580 082424.exe 91 PID 1580 wrote to memory of 2220 1580 082424.exe 91 PID 1580 wrote to memory of 2220 1580 082424.exe 91 PID 2220 wrote to memory of 3440 2220 pjdvp.exe 92 PID 2220 wrote to memory of 3440 2220 pjdvp.exe 92 PID 2220 wrote to memory of 3440 2220 pjdvp.exe 92 PID 3440 wrote to memory of 1016 3440 886266.exe 93 PID 3440 wrote to memory of 1016 3440 886266.exe 93 PID 3440 wrote to memory of 1016 3440 886266.exe 93 PID 1016 wrote to memory of 4044 1016 606660.exe 94 PID 1016 wrote to memory of 4044 1016 606660.exe 94 PID 1016 wrote to memory of 4044 1016 606660.exe 94 PID 4044 wrote to memory of 4084 4044 5xfxlfr.exe 95 PID 4044 wrote to memory of 4084 4044 5xfxlfr.exe 95 PID 4044 wrote to memory of 4084 4044 5xfxlfr.exe 95 PID 4084 wrote to memory of 3976 4084 0682648.exe 96 PID 4084 wrote to memory of 3976 4084 0682648.exe 96 PID 4084 wrote to memory of 3976 4084 0682648.exe 96 PID 3976 wrote to memory of 672 3976 6626484.exe 97 PID 3976 wrote to memory of 672 3976 6626484.exe 97 PID 3976 wrote to memory of 672 3976 6626484.exe 97 PID 672 wrote to memory of 4256 672 22620.exe 98 PID 672 wrote to memory of 4256 672 22620.exe 98 PID 672 wrote to memory of 4256 672 22620.exe 98 PID 4256 wrote to memory of 3988 4256 2462606.exe 99 PID 4256 wrote to memory of 3988 4256 2462606.exe 99 PID 4256 wrote to memory of 3988 4256 2462606.exe 99 PID 3988 wrote to memory of 5096 3988 3pvjd.exe 101 PID 3988 wrote to memory of 5096 3988 3pvjd.exe 101 PID 3988 wrote to memory of 5096 3988 3pvjd.exe 101 PID 5096 wrote to memory of 1420 5096 jdvpd.exe 102 PID 5096 wrote to memory of 1420 5096 jdvpd.exe 102 PID 5096 wrote to memory of 1420 5096 jdvpd.exe 102 PID 1420 wrote to memory of 4404 1420 rrlxllf.exe 103 PID 1420 wrote to memory of 4404 1420 rrlxllf.exe 103 PID 1420 wrote to memory of 4404 1420 rrlxllf.exe 103 PID 4404 wrote to memory of 1744 4404 868886.exe 104 PID 4404 wrote to memory of 1744 4404 868886.exe 104 PID 4404 wrote to memory of 1744 4404 868886.exe 104 PID 1744 wrote to memory of 1636 1744 82660.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe"C:\Users\Admin\AppData\Local\Temp\5b4a795046b247ce7fc0a9785614a2771e054f9d8d2950716f3ec2a00d167ae0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\66646.exec:\66646.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
\??\c:\04282.exec:\04282.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\ddpdp.exec:\ddpdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\bhnnhb.exec:\bhnnhb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\86260.exec:\86260.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\226006.exec:\226006.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\2820280.exec:\2820280.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\082424.exec:\082424.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\pjdvp.exec:\pjdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\886266.exec:\886266.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\606660.exec:\606660.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\5xfxlfr.exec:\5xfxlfr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\0682648.exec:\0682648.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\6626484.exec:\6626484.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\22620.exec:\22620.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\2462606.exec:\2462606.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
\??\c:\3pvjd.exec:\3pvjd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\jdvpd.exec:\jdvpd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
\??\c:\rrlxllf.exec:\rrlxllf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\868886.exec:\868886.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\82660.exec:\82660.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\468222.exec:\468222.exe23⤵
- Executes dropped EXE
PID:1636 -
\??\c:\xffrllf.exec:\xffrllf.exe24⤵
- Executes dropped EXE
PID:1112 -
\??\c:\jjpdv.exec:\jjpdv.exe25⤵
- Executes dropped EXE
PID:2312 -
\??\c:\bhhnht.exec:\bhhnht.exe26⤵
- Executes dropped EXE
PID:2992 -
\??\c:\422600.exec:\422600.exe27⤵
- Executes dropped EXE
PID:4344 -
\??\c:\86648.exec:\86648.exe28⤵
- Executes dropped EXE
PID:4032 -
\??\c:\02826.exec:\02826.exe29⤵
- Executes dropped EXE
PID:4592 -
\??\c:\vjdpp.exec:\vjdpp.exe30⤵
- Executes dropped EXE
PID:2528 -
\??\c:\jvdpd.exec:\jvdpd.exe31⤵
- Executes dropped EXE
PID:2188 -
\??\c:\rlrllfl.exec:\rlrllfl.exe32⤵
- Executes dropped EXE
PID:4544 -
\??\c:\vpdvj.exec:\vpdvj.exe33⤵
- Executes dropped EXE
PID:3908 -
\??\c:\jdvdj.exec:\jdvdj.exe34⤵
- Executes dropped EXE
PID:2208 -
\??\c:\64288.exec:\64288.exe35⤵
- Executes dropped EXE
PID:1052 -
\??\c:\642228.exec:\642228.exe36⤵
- Executes dropped EXE
PID:4856 -
\??\c:\200444.exec:\200444.exe37⤵
- Executes dropped EXE
PID:1060 -
\??\c:\fxrrlfx.exec:\fxrrlfx.exe38⤵
- Executes dropped EXE
PID:4984 -
\??\c:\04064.exec:\04064.exe39⤵
- Executes dropped EXE
PID:4812 -
\??\c:\nthhbt.exec:\nthhbt.exe40⤵
- Executes dropped EXE
PID:2700 -
\??\c:\k24484.exec:\k24484.exe41⤵
- Executes dropped EXE
PID:1120 -
\??\c:\8462884.exec:\8462884.exe42⤵
- Executes dropped EXE
PID:216 -
\??\c:\64682.exec:\64682.exe43⤵
- Executes dropped EXE
PID:3620 -
\??\c:\42802.exec:\42802.exe44⤵
- Executes dropped EXE
PID:3488 -
\??\c:\886600.exec:\886600.exe45⤵
- Executes dropped EXE
PID:1300 -
\??\c:\62448.exec:\62448.exe46⤵
- Executes dropped EXE
PID:1468 -
\??\c:\06266.exec:\06266.exe47⤵
- Executes dropped EXE
PID:2820 -
\??\c:\xfxxxxr.exec:\xfxxxxr.exe48⤵
- Executes dropped EXE
PID:3636 -
\??\c:\0282222.exec:\0282222.exe49⤵
- Executes dropped EXE
PID:4588 -
\??\c:\xxfffff.exec:\xxfffff.exe50⤵
- Executes dropped EXE
PID:4636 -
\??\c:\rxfffrr.exec:\rxfffrr.exe51⤵
- Executes dropped EXE
PID:592 -
\??\c:\08660.exec:\08660.exe52⤵
- Executes dropped EXE
PID:2192 -
\??\c:\btbtbt.exec:\btbtbt.exe53⤵
- Executes dropped EXE
PID:1600 -
\??\c:\dpvdd.exec:\dpvdd.exe54⤵
- Executes dropped EXE
PID:4696 -
\??\c:\1bhnhb.exec:\1bhnhb.exe55⤵
- Executes dropped EXE
PID:1756 -
\??\c:\0640444.exec:\0640444.exe56⤵
- Executes dropped EXE
PID:1644 -
\??\c:\rfllllf.exec:\rfllllf.exe57⤵
- Executes dropped EXE
PID:2924 -
\??\c:\xrrlxxr.exec:\xrrlxxr.exe58⤵
- Executes dropped EXE
PID:3436 -
\??\c:\82440.exec:\82440.exe59⤵
- Executes dropped EXE
PID:1116 -
\??\c:\tbbnth.exec:\tbbnth.exe60⤵
- Executes dropped EXE
PID:1336 -
\??\c:\6088066.exec:\6088066.exe61⤵
- Executes dropped EXE
PID:4912 -
\??\c:\080488.exec:\080488.exe62⤵
- Executes dropped EXE
PID:2056 -
\??\c:\86288.exec:\86288.exe63⤵
- Executes dropped EXE
PID:3648 -
\??\c:\hhhbbt.exec:\hhhbbt.exe64⤵
- Executes dropped EXE
PID:3868 -
\??\c:\rlxrlrl.exec:\rlxrlrl.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064 -
\??\c:\jdpjd.exec:\jdpjd.exe66⤵PID:3012
-
\??\c:\6646604.exec:\6646604.exe67⤵PID:940
-
\??\c:\tnbtbt.exec:\tnbtbt.exe68⤵PID:380
-
\??\c:\5nbnhb.exec:\5nbnhb.exe69⤵PID:1112
-
\??\c:\1rrlffx.exec:\1rrlffx.exe70⤵PID:692
-
\??\c:\802884.exec:\802884.exe71⤵PID:4548
-
\??\c:\dpdjd.exec:\dpdjd.exe72⤵PID:4852
-
\??\c:\vvjdd.exec:\vvjdd.exe73⤵PID:1716
-
\??\c:\8224428.exec:\8224428.exe74⤵PID:2276
-
\??\c:\jpppj.exec:\jpppj.exe75⤵PID:4076
-
\??\c:\lxlxlxl.exec:\lxlxlxl.exe76⤵PID:556
-
\??\c:\m2866.exec:\m2866.exe77⤵PID:2728
-
\??\c:\6446666.exec:\6446666.exe78⤵PID:2528
-
\??\c:\0204884.exec:\0204884.exe79⤵PID:4532
-
\??\c:\nnbbbb.exec:\nnbbbb.exe80⤵PID:4544
-
\??\c:\ppdvp.exec:\ppdvp.exe81⤵PID:4080
-
\??\c:\lfrrlfr.exec:\lfrrlfr.exe82⤵PID:1484
-
\??\c:\fxrllxx.exec:\fxrllxx.exe83⤵PID:3908
-
\??\c:\thhbtt.exec:\thhbtt.exe84⤵PID:2980
-
\??\c:\rrfxxxr.exec:\rrfxxxr.exe85⤵PID:4348
-
\??\c:\802600.exec:\802600.exe86⤵PID:1248
-
\??\c:\q02600.exec:\q02600.exe87⤵PID:4352
-
\??\c:\7xlfxrl.exec:\7xlfxrl.exe88⤵PID:1800
-
\??\c:\rllfxrr.exec:\rllfxrr.exe89⤵PID:208
-
\??\c:\0488222.exec:\0488222.exe90⤵PID:2852
-
\??\c:\vdjjd.exec:\vdjjd.exe91⤵PID:1936
-
\??\c:\8606004.exec:\8606004.exe92⤵PID:3568
-
\??\c:\tbnhbb.exec:\tbnhbb.exe93⤵PID:1300
-
\??\c:\g2044.exec:\g2044.exe94⤵PID:1468
-
\??\c:\2088222.exec:\2088222.exe95⤵PID:1428
-
\??\c:\80662.exec:\80662.exe96⤵PID:4568
-
\??\c:\28866.exec:\28866.exe97⤵PID:4660
-
\??\c:\jvdvp.exec:\jvdvp.exe98⤵PID:4708
-
\??\c:\206208.exec:\206208.exe99⤵PID:4868
-
\??\c:\3xfrxrx.exec:\3xfrxrx.exe100⤵PID:4048
-
\??\c:\lfrfrrf.exec:\lfrfrrf.exe101⤵PID:4052
-
\??\c:\422086.exec:\422086.exe102⤵PID:1412
-
\??\c:\08048.exec:\08048.exe103⤵PID:4656
-
\??\c:\2804826.exec:\2804826.exe104⤵PID:2740
-
\??\c:\btbbbt.exec:\btbbbt.exe105⤵PID:4596
-
\??\c:\428604.exec:\428604.exe106⤵PID:4440
-
\??\c:\tnbnbt.exec:\tnbnbt.exe107⤵PID:4728
-
\??\c:\428848.exec:\428848.exe108⤵PID:2744
-
\??\c:\vpvpv.exec:\vpvpv.exe109⤵PID:1656
-
\??\c:\g2648.exec:\g2648.exe110⤵PID:2216
-
\??\c:\248260.exec:\248260.exe111⤵PID:3940
-
\??\c:\bthbnn.exec:\bthbnn.exe112⤵PID:2724
-
\??\c:\bnthbt.exec:\bnthbt.exe113⤵PID:1416
-
\??\c:\pddpd.exec:\pddpd.exe114⤵PID:4484
-
\??\c:\9thbbb.exec:\9thbbb.exe115⤵PID:1796
-
\??\c:\ppjjv.exec:\ppjjv.exe116⤵PID:2144
-
\??\c:\vddvp.exec:\vddvp.exe117⤵PID:4420
-
\??\c:\fxlfrlf.exec:\fxlfrlf.exe118⤵PID:4400
-
\??\c:\222648.exec:\222648.exe119⤵PID:2756
-
\??\c:\k44204.exec:\k44204.exe120⤵PID:2040
-
\??\c:\pjjvp.exec:\pjjvp.exe121⤵PID:1872
-
\??\c:\g2860.exec:\g2860.exe122⤵PID:4032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-