Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 07:08
Behavioral task
behavioral1
Sample
ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
120 seconds
General
-
Target
ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe
-
Size
3.7MB
-
MD5
c5224cabf04d7988bc114ed5a3c097f0
-
SHA1
3d93a72f46f9032c26a0888cb555335b536024e5
-
SHA256
ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797af
-
SHA512
f36792651b161f3d4fa5114101df844a30e4ab718e1e7589a5fffb1f675698f17ca581effe5a765a34a58eea6d547fe4955bf18c2c0381c5795c7bd8dcb1a7bb
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98u:U6XLq/qPPslzKx/dJg1ErmNf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2524-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4328-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3668-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3680-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1664-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4644-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2096-57-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3940-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5084-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3568-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3688-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3588-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4108-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2740-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1008-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2288-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3908-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/960-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2408-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3980-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1556-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3988-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4280-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4948-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3516-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4520-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4700-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1100-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2000-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4544-264-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2080-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/520-290-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1112-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3452-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-318-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3476-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5032-332-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1184-345-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3240-392-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3428-408-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2720-412-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4460-416-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2080-426-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1572-436-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2324-443-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1120-447-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2696-463-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1748-482-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/376-501-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4004-550-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2036-599-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1084-684-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2720-780-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2696-1085-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1184-1128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2448-1528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 4328 00882.exe 3668 nbhnnh.exe 4036 42088.exe 4984 ddjpp.exe 5016 6086262.exe 3680 btthtn.exe 1664 hbbnht.exe 4644 28042.exe 2096 ttthbb.exe 3940 rlrxlrf.exe 5084 ppvpj.exe 3568 jdpvv.exe 4448 jjjdd.exe 3688 djpjd.exe 3588 0800000.exe 4108 04484.exe 2740 nhtnhn.exe 1008 80260.exe 4576 4624820.exe 2288 dppdp.exe 3908 8040000.exe 2788 224820.exe 1536 62026.exe 960 0888882.exe 2408 nhtnnn.exe 3980 826222.exe 5048 lfrrrrf.exe 4612 2060844.exe 1556 frfrlxr.exe 3988 442260.exe 100 pjpjd.exe 2300 thhtnh.exe 4280 64442.exe 4948 2884844.exe 3636 428200.exe 4120 lrrfxlf.exe 2476 rllffxl.exe 3516 jvjjp.exe 2892 xffrlfx.exe 4520 xflxlfx.exe 2904 46260.exe 4700 thhbbt.exe 4184 46280.exe 4004 9tbhnb.exe 1100 444826.exe 1644 pjddd.exe 408 4840000.exe 1984 rrlfrxx.exe 3400 6044608.exe 2760 vvvvj.exe 4564 404448.exe 1132 vjjdp.exe 2824 fxfrlff.exe 2000 226222.exe 4544 4644006.exe 2080 djpdp.exe 1472 04266.exe 3552 00642.exe 3456 btbbtn.exe 4080 rfxrlfl.exe 4456 rxrfrlx.exe 4276 xxxrxxf.exe 520 c044684.exe 472 666204.exe -
resource yara_rule behavioral2/memory/2524-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000500000002309e-3.dat upx behavioral2/memory/2524-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c94-7.dat upx behavioral2/memory/4328-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c95-12.dat upx behavioral2/memory/3668-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4036-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c96-21.dat upx behavioral2/memory/4036-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c97-28.dat upx behavioral2/memory/5016-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4984-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c98-34.dat upx behavioral2/files/0x0007000000023c99-39.dat upx behavioral2/memory/3680-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e762-44.dat upx behavioral2/memory/1664-45-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9a-48.dat upx behavioral2/memory/4644-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9b-55.dat upx behavioral2/memory/2096-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3940-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9d-61.dat upx behavioral2/memory/5084-69-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c9e-67.dat upx behavioral2/files/0x0007000000023ca0-73.dat upx behavioral2/memory/3568-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca1-79.dat upx behavioral2/memory/3688-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca2-86.dat upx behavioral2/files/0x0007000000023ca3-90.dat upx behavioral2/memory/3588-92-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca5-96.dat upx behavioral2/memory/4108-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca6-102.dat upx behavioral2/memory/2740-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca7-108.dat upx behavioral2/memory/1008-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca8-115.dat upx behavioral2/files/0x0007000000023ca9-118.dat upx behavioral2/memory/2288-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023caa-123.dat upx behavioral2/memory/3908-125-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cab-130.dat upx behavioral2/files/0x0007000000023cac-134.dat upx behavioral2/memory/960-137-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cae-140.dat upx behavioral2/memory/2408-143-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023caf-146.dat upx behavioral2/memory/2408-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb0-155.dat upx behavioral2/memory/3980-154-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-158.dat upx behavioral2/files/0x0007000000023cb2-165.dat upx behavioral2/files/0x0007000000023cb3-169.dat upx behavioral2/memory/1556-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb4-174.dat upx behavioral2/memory/3988-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb5-182.dat upx behavioral2/memory/4280-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4948-193-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2476-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3516-207-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2488440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o662644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2004804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 620600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 486848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0426604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 668066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4080048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8400020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0808826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6488224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 424488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4888266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0248800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4644006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8660482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0824820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 680860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxfxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0026000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 082026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4328 2524 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 83 PID 2524 wrote to memory of 4328 2524 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 83 PID 2524 wrote to memory of 4328 2524 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 83 PID 4328 wrote to memory of 3668 4328 00882.exe 84 PID 4328 wrote to memory of 3668 4328 00882.exe 84 PID 4328 wrote to memory of 3668 4328 00882.exe 84 PID 3668 wrote to memory of 4036 3668 nbhnnh.exe 85 PID 3668 wrote to memory of 4036 3668 nbhnnh.exe 85 PID 3668 wrote to memory of 4036 3668 nbhnnh.exe 85 PID 4036 wrote to memory of 4984 4036 42088.exe 86 PID 4036 wrote to memory of 4984 4036 42088.exe 86 PID 4036 wrote to memory of 4984 4036 42088.exe 86 PID 4984 wrote to memory of 5016 4984 ddjpp.exe 87 PID 4984 wrote to memory of 5016 4984 ddjpp.exe 87 PID 4984 wrote to memory of 5016 4984 ddjpp.exe 87 PID 5016 wrote to memory of 3680 5016 6086262.exe 88 PID 5016 wrote to memory of 3680 5016 6086262.exe 88 PID 5016 wrote to memory of 3680 5016 6086262.exe 88 PID 3680 wrote to memory of 1664 3680 btthtn.exe 89 PID 3680 wrote to memory of 1664 3680 btthtn.exe 89 PID 3680 wrote to memory of 1664 3680 btthtn.exe 89 PID 1664 wrote to memory of 4644 1664 hbbnht.exe 90 PID 1664 wrote to memory of 4644 1664 hbbnht.exe 90 PID 1664 wrote to memory of 4644 1664 hbbnht.exe 90 PID 4644 wrote to memory of 2096 4644 28042.exe 91 PID 4644 wrote to memory of 2096 4644 28042.exe 91 PID 4644 wrote to memory of 2096 4644 28042.exe 91 PID 2096 wrote to memory of 3940 2096 ttthbb.exe 92 PID 2096 wrote to memory of 3940 2096 ttthbb.exe 92 PID 2096 wrote to memory of 3940 2096 ttthbb.exe 92 PID 3940 wrote to memory of 5084 3940 rlrxlrf.exe 93 PID 3940 wrote to memory of 5084 3940 rlrxlrf.exe 93 PID 3940 wrote to memory of 5084 3940 rlrxlrf.exe 93 PID 5084 wrote to memory of 3568 5084 ppvpj.exe 94 PID 5084 wrote to memory of 3568 5084 ppvpj.exe 94 PID 5084 wrote to memory of 3568 5084 ppvpj.exe 94 PID 3568 wrote to memory of 4448 3568 jdpvv.exe 95 PID 3568 wrote to memory of 4448 3568 jdpvv.exe 95 PID 3568 wrote to memory of 4448 3568 jdpvv.exe 95 PID 4448 wrote to memory of 3688 4448 jjjdd.exe 96 PID 4448 wrote to memory of 3688 4448 jjjdd.exe 96 PID 4448 wrote to memory of 3688 4448 jjjdd.exe 96 PID 3688 wrote to memory of 3588 3688 djpjd.exe 97 PID 3688 wrote to memory of 3588 3688 djpjd.exe 97 PID 3688 wrote to memory of 3588 3688 djpjd.exe 97 PID 3588 wrote to memory of 4108 3588 0800000.exe 100 PID 3588 wrote to memory of 4108 3588 0800000.exe 100 PID 3588 wrote to memory of 4108 3588 0800000.exe 100 PID 4108 wrote to memory of 2740 4108 04484.exe 102 PID 4108 wrote to memory of 2740 4108 04484.exe 102 PID 4108 wrote to memory of 2740 4108 04484.exe 102 PID 2740 wrote to memory of 1008 2740 nhtnhn.exe 104 PID 2740 wrote to memory of 1008 2740 nhtnhn.exe 104 PID 2740 wrote to memory of 1008 2740 nhtnhn.exe 104 PID 1008 wrote to memory of 4576 1008 80260.exe 105 PID 1008 wrote to memory of 4576 1008 80260.exe 105 PID 1008 wrote to memory of 4576 1008 80260.exe 105 PID 4576 wrote to memory of 2288 4576 4624820.exe 106 PID 4576 wrote to memory of 2288 4576 4624820.exe 106 PID 4576 wrote to memory of 2288 4576 4624820.exe 106 PID 2288 wrote to memory of 3908 2288 dppdp.exe 107 PID 2288 wrote to memory of 3908 2288 dppdp.exe 107 PID 2288 wrote to memory of 3908 2288 dppdp.exe 107 PID 3908 wrote to memory of 2788 3908 8040000.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe"C:\Users\Admin\AppData\Local\Temp\ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\00882.exec:\00882.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
\??\c:\nbhnnh.exec:\nbhnnh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\42088.exec:\42088.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
\??\c:\ddjpp.exec:\ddjpp.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\6086262.exec:\6086262.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\btthtn.exec:\btthtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\hbbnht.exec:\hbbnht.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\28042.exec:\28042.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\ttthbb.exec:\ttthbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\rlrxlrf.exec:\rlrxlrf.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
\??\c:\ppvpj.exec:\ppvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\jdpvv.exec:\jdpvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\jjjdd.exec:\jjjdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\djpjd.exec:\djpjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\0800000.exec:\0800000.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\04484.exec:\04484.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
\??\c:\nhtnhn.exec:\nhtnhn.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\80260.exec:\80260.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\4624820.exec:\4624820.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\dppdp.exec:\dppdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\8040000.exec:\8040000.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\224820.exec:\224820.exe23⤵
- Executes dropped EXE
PID:2788 -
\??\c:\62026.exec:\62026.exe24⤵
- Executes dropped EXE
PID:1536 -
\??\c:\0888882.exec:\0888882.exe25⤵
- Executes dropped EXE
PID:960 -
\??\c:\nhtnnn.exec:\nhtnnn.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408 -
\??\c:\826222.exec:\826222.exe27⤵
- Executes dropped EXE
PID:3980 -
\??\c:\lfrrrrf.exec:\lfrrrrf.exe28⤵
- Executes dropped EXE
PID:5048 -
\??\c:\2060844.exec:\2060844.exe29⤵
- Executes dropped EXE
PID:4612 -
\??\c:\frfrlxr.exec:\frfrlxr.exe30⤵
- Executes dropped EXE
PID:1556 -
\??\c:\442260.exec:\442260.exe31⤵
- Executes dropped EXE
PID:3988 -
\??\c:\pjpjd.exec:\pjpjd.exe32⤵
- Executes dropped EXE
PID:100 -
\??\c:\thhtnh.exec:\thhtnh.exe33⤵
- Executes dropped EXE
PID:2300 -
\??\c:\64442.exec:\64442.exe34⤵
- Executes dropped EXE
PID:4280 -
\??\c:\2884844.exec:\2884844.exe35⤵
- Executes dropped EXE
PID:4948 -
\??\c:\428200.exec:\428200.exe36⤵
- Executes dropped EXE
PID:3636 -
\??\c:\lrrfxlf.exec:\lrrfxlf.exe37⤵
- Executes dropped EXE
PID:4120 -
\??\c:\rllffxl.exec:\rllffxl.exe38⤵
- Executes dropped EXE
PID:2476 -
\??\c:\jvjjp.exec:\jvjjp.exe39⤵
- Executes dropped EXE
PID:3516 -
\??\c:\xffrlfx.exec:\xffrlfx.exe40⤵
- Executes dropped EXE
PID:2892 -
\??\c:\xflxlfx.exec:\xflxlfx.exe41⤵
- Executes dropped EXE
PID:4520 -
\??\c:\46260.exec:\46260.exe42⤵
- Executes dropped EXE
PID:2904 -
\??\c:\thhbbt.exec:\thhbbt.exe43⤵
- Executes dropped EXE
PID:4700 -
\??\c:\46280.exec:\46280.exe44⤵
- Executes dropped EXE
PID:4184 -
\??\c:\9tbhnb.exec:\9tbhnb.exe45⤵
- Executes dropped EXE
PID:4004 -
\??\c:\444826.exec:\444826.exe46⤵
- Executes dropped EXE
PID:1100 -
\??\c:\pjddd.exec:\pjddd.exe47⤵
- Executes dropped EXE
PID:1644 -
\??\c:\4840000.exec:\4840000.exe48⤵
- Executes dropped EXE
PID:408 -
\??\c:\rrlfrxx.exec:\rrlfrxx.exe49⤵
- Executes dropped EXE
PID:1984 -
\??\c:\6044608.exec:\6044608.exe50⤵
- Executes dropped EXE
PID:3400 -
\??\c:\vvvvj.exec:\vvvvj.exe51⤵
- Executes dropped EXE
PID:2760 -
\??\c:\404448.exec:\404448.exe52⤵
- Executes dropped EXE
PID:4564 -
\??\c:\vjjdp.exec:\vjjdp.exe53⤵
- Executes dropped EXE
PID:1132 -
\??\c:\fxfrlff.exec:\fxfrlff.exe54⤵
- Executes dropped EXE
PID:2824 -
\??\c:\226222.exec:\226222.exe55⤵
- Executes dropped EXE
PID:2000 -
\??\c:\4644006.exec:\4644006.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4544 -
\??\c:\djpdp.exec:\djpdp.exe57⤵
- Executes dropped EXE
PID:2080 -
\??\c:\04266.exec:\04266.exe58⤵
- Executes dropped EXE
PID:1472 -
\??\c:\00642.exec:\00642.exe59⤵
- Executes dropped EXE
PID:3552 -
\??\c:\btbbtn.exec:\btbbtn.exe60⤵
- Executes dropped EXE
PID:3456 -
\??\c:\rfxrlfl.exec:\rfxrlfl.exe61⤵
- Executes dropped EXE
PID:4080 -
\??\c:\rxrfrlx.exec:\rxrfrlx.exe62⤵
- Executes dropped EXE
PID:4456 -
\??\c:\xxxrxxf.exec:\xxxrxxf.exe63⤵
- Executes dropped EXE
PID:4276 -
\??\c:\c044684.exec:\c044684.exe64⤵
- Executes dropped EXE
PID:520 -
\??\c:\666204.exec:\666204.exe65⤵
- Executes dropped EXE
PID:472 -
\??\c:\8288864.exec:\8288864.exe66⤵PID:1444
-
\??\c:\8402668.exec:\8402668.exe67⤵PID:896
-
\??\c:\42486.exec:\42486.exe68⤵PID:1112
-
\??\c:\0260066.exec:\0260066.exe69⤵PID:4068
-
\??\c:\6684826.exec:\6684826.exe70⤵PID:1436
-
\??\c:\22208.exec:\22208.exe71⤵PID:3452
-
\??\c:\40648.exec:\40648.exe72⤵PID:4840
-
\??\c:\bhhhbt.exec:\bhhhbt.exe73⤵PID:3476
-
\??\c:\02066.exec:\02066.exe74⤵PID:2816
-
\??\c:\jpdpj.exec:\jpdpj.exe75⤵PID:1924
-
\??\c:\04860.exec:\04860.exe76⤵PID:5032
-
\??\c:\xrfrfxl.exec:\xrfrfxl.exe77⤵PID:2560
-
\??\c:\lxfxlrx.exec:\lxfxlrx.exe78⤵PID:2064
-
\??\c:\8464824.exec:\8464824.exe79⤵PID:212
-
\??\c:\824622.exec:\824622.exe80⤵PID:1184
-
\??\c:\ffxfxxx.exec:\ffxfxxx.exe81⤵PID:4948
-
\??\c:\88848.exec:\88848.exe82⤵
- System Location Discovery: System Language Discovery
PID:4392 -
\??\c:\402888.exec:\402888.exe83⤵PID:2780
-
\??\c:\666644.exec:\666644.exe84⤵PID:2476
-
\??\c:\rfxrlxr.exec:\rfxrlxr.exe85⤵PID:1908
-
\??\c:\ffxlfrl.exec:\ffxlfrl.exe86⤵PID:3016
-
\??\c:\rrfxxrr.exec:\rrfxxrr.exe87⤵PID:2588
-
\??\c:\44208.exec:\44208.exe88⤵PID:4632
-
\??\c:\6868244.exec:\6868244.exe89⤵PID:3992
-
\??\c:\26804.exec:\26804.exe90⤵PID:396
-
\??\c:\0684882.exec:\0684882.exe91⤵PID:3836
-
\??\c:\080220.exec:\080220.exe92⤵PID:4524
-
\??\c:\vpvvd.exec:\vpvvd.exe93⤵
- System Location Discovery: System Language Discovery
PID:536 -
\??\c:\6066666.exec:\6066666.exe94⤵PID:1972
-
\??\c:\tttttt.exec:\tttttt.exe95⤵PID:3240
-
\??\c:\2464826.exec:\2464826.exe96⤵PID:2652
-
\??\c:\48844.exec:\48844.exe97⤵PID:656
-
\??\c:\3pppj.exec:\3pppj.exe98⤵PID:1180
-
\??\c:\0488226.exec:\0488226.exe99⤵PID:4464
-
\??\c:\jppjj.exec:\jppjj.exe100⤵PID:3428
-
\??\c:\2442246.exec:\2442246.exe101⤵PID:2720
-
\??\c:\400826.exec:\400826.exe102⤵PID:4460
-
\??\c:\002222.exec:\002222.exe103⤵PID:1224
-
\??\c:\bnnbtn.exec:\bnnbtn.exe104⤵PID:4108
-
\??\c:\rxrlxrf.exec:\rxrlxrf.exe105⤵PID:2080
-
\??\c:\fllfxlf.exec:\fllfxlf.exe106⤵PID:4092
-
\??\c:\084460.exec:\084460.exe107⤵PID:1928
-
\??\c:\44004.exec:\44004.exe108⤵PID:1572
-
\??\c:\068266.exec:\068266.exe109⤵PID:4680
-
\??\c:\8062602.exec:\8062602.exe110⤵PID:2324
-
\??\c:\flfrffr.exec:\flfrffr.exe111⤵PID:1120
-
\??\c:\bnthth.exec:\bnthth.exe112⤵PID:848
-
\??\c:\7rxllff.exec:\7rxllff.exe113⤵PID:3860
-
\??\c:\pdddv.exec:\pdddv.exe114⤵PID:3908
-
\??\c:\42204.exec:\42204.exe115⤵PID:2776
-
\??\c:\0866480.exec:\0866480.exe116⤵PID:2696
-
\??\c:\llfxrlf.exec:\llfxrlf.exe117⤵PID:1536
-
\??\c:\82668.exec:\82668.exe118⤵PID:1428
-
\??\c:\djpjj.exec:\djpjj.exe119⤵PID:412
-
\??\c:\28604.exec:\28604.exe120⤵PID:456
-
\??\c:\thbttt.exec:\thbttt.exe121⤵PID:4912
-
\??\c:\w02648.exec:\w02648.exe122⤵PID:1748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-