Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 07:45
Behavioral task
behavioral1
Sample
b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe
Resource
win7-20241023-en
windows7-x64
9 signatures
120 seconds
General
-
Target
b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe
-
Size
3.7MB
-
MD5
912ce881dca9e21b61222352b71dc410
-
SHA1
3d8662b837e5b9769ad9d06b7d67f07b27f0c637
-
SHA256
b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76
-
SHA512
b25b18cb208acc49f699602997985e484cb5fd592112b6d558eb6724291129bff8b248b2669f66692fabfa293bcc37bff7d8e368ee2b865cc6f0a079e0916fb3
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98n:U6XLq/qPPslzKx/dJg1ErmN2
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 51 IoCs
resource yara_rule behavioral1/memory/2272-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2512-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1832-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/840-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2700-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2748-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2904-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2620-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2656-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2084-103-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2344-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2344-108-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1008-118-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1008-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1008-122-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1896-129-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1896-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1656-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2932-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2932-166-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/2692-184-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2692-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2928-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2204-212-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/340-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1236-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-279-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1832-331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-360-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2840-363-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2608-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1948-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1712-446-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1296-459-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2972-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1460-511-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1592-525-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/340-523-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/980-546-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-556-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2796-605-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1348-604-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2748-618-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2384-638-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-745-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2992-759-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2616-921-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/1700-1002-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1676-1009-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1940-1071-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2512 w80626.exe 1832 xrlxrrx.exe 840 646444.exe 2700 jjjdd.exe 2748 k22844.exe 2904 82062.exe 2620 vpddp.exe 2656 ppjdj.exe 2624 tnbbtt.exe 2084 o480622.exe 2344 62428.exe 1008 pdddv.exe 1896 u422262.exe 1948 7llfrrx.exe 1656 k02226.exe 2864 42406.exe 2932 u466884.exe 2976 8640262.exe 2692 28662.exe 2928 1ntbbb.exe 2440 9lffrrf.exe 2204 a2402.exe 1304 262282.exe 340 hbttbb.exe 1640 pdjpv.exe 1692 28624.exe 2112 ppvjd.exe 1236 e44806.exe 2856 9bhnbb.exe 556 08440.exe 1412 jpppd.exe 2556 9lfflrf.exe 2268 m2228.exe 2308 26062.exe 1348 lfrxffl.exe 1832 64222.exe 2736 s0400.exe 2444 jjppv.exe 3016 4446020.exe 2384 lffxfxl.exe 2840 7vpvv.exe 2764 w86660.exe 2608 pjjpv.exe 2760 nhtbbb.exe 2116 04400.exe 1132 9pddd.exe 1552 8828002.exe 2660 dvvvj.exe 868 48662.exe 1816 0484008.exe 1696 u466828.exe 1948 86228.exe 1656 pvdvd.exe 1712 0640666.exe 2964 2084662.exe 1296 4484488.exe 1560 hnbhth.exe 2972 282248.exe 3044 ntnnnh.exe 1252 xrxrxfl.exe 2440 llrxffr.exe 816 7dpdj.exe 1540 a0228.exe 1460 864406.exe -
resource yara_rule behavioral1/memory/2272-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000c00000001202c-5.dat upx behavioral1/memory/2272-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016b47-20.dat upx behavioral1/memory/2512-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00090000000165c7-28.dat upx behavioral1/memory/840-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1832-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/840-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016c66-36.dat upx behavioral1/memory/2700-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016c88-47.dat upx behavioral1/memory/2748-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016cd7-58.dat upx behavioral1/memory/2904-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2904-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016cf5-66.dat upx behavioral1/memory/2620-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d3a-76.dat upx behavioral1/memory/2656-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017049-85.dat upx behavioral1/memory/2084-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017497-94.dat upx behavioral1/files/0x000600000001749c-104.dat upx behavioral1/memory/2084-103-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000600000001755b-114.dat upx behavioral1/memory/2344-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2344-108-0x00000000001B0000-0x00000000001D7000-memory.dmp upx behavioral1/memory/1008-118-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/1008-125-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018686-123.dat upx behavioral1/files/0x00050000000186e7-135.dat upx behavioral1/memory/1896-134-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186ed-143.dat upx behavioral1/memory/1656-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2864-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186f1-152.dat upx behavioral1/files/0x00050000000186f4-161.dat upx behavioral1/memory/2932-163-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018704-171.dat upx behavioral1/files/0x0005000000018739-180.dat upx behavioral1/files/0x000500000001878e-190.dat upx behavioral1/memory/2692-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000187a8-199.dat upx behavioral1/memory/2928-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018b4e-208.dat upx behavioral1/files/0x0006000000018c16-217.dat upx behavioral1/memory/1304-221-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0005000000019246-226.dat upx behavioral1/files/0x0005000000019250-237.dat upx behavioral1/memory/340-234-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019269-244.dat upx behavioral1/files/0x0005000000019278-254.dat upx behavioral1/memory/1236-263-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019284-262.dat upx behavioral1/memory/2856-271-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019297-272.dat upx behavioral1/files/0x000500000001933f-280.dat upx behavioral1/memory/2856-279-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019360-289.dat upx behavioral1/files/0x00050000000193a6-297.dat upx behavioral1/memory/2308-311-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1832-331-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2736-338-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9djjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 042228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4484488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6462840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6864262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lxlxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k22844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0646846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 084440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrxllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8644028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 682488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 664628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o028440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlflxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 686800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6020864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2806864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxllrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 282428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxlrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rllxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 082248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrflrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4026624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2512 2272 b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe 30 PID 2272 wrote to memory of 2512 2272 b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe 30 PID 2272 wrote to memory of 2512 2272 b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe 30 PID 2272 wrote to memory of 2512 2272 b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe 30 PID 2512 wrote to memory of 1832 2512 w80626.exe 31 PID 2512 wrote to memory of 1832 2512 w80626.exe 31 PID 2512 wrote to memory of 1832 2512 w80626.exe 31 PID 2512 wrote to memory of 1832 2512 w80626.exe 31 PID 1832 wrote to memory of 840 1832 xrlxrrx.exe 32 PID 1832 wrote to memory of 840 1832 xrlxrrx.exe 32 PID 1832 wrote to memory of 840 1832 xrlxrrx.exe 32 PID 1832 wrote to memory of 840 1832 xrlxrrx.exe 32 PID 840 wrote to memory of 2700 840 646444.exe 33 PID 840 wrote to memory of 2700 840 646444.exe 33 PID 840 wrote to memory of 2700 840 646444.exe 33 PID 840 wrote to memory of 2700 840 646444.exe 33 PID 2700 wrote to memory of 2748 2700 jjjdd.exe 34 PID 2700 wrote to memory of 2748 2700 jjjdd.exe 34 PID 2700 wrote to memory of 2748 2700 jjjdd.exe 34 PID 2700 wrote to memory of 2748 2700 jjjdd.exe 34 PID 2748 wrote to memory of 2904 2748 k22844.exe 35 PID 2748 wrote to memory of 2904 2748 k22844.exe 35 PID 2748 wrote to memory of 2904 2748 k22844.exe 35 PID 2748 wrote to memory of 2904 2748 k22844.exe 35 PID 2904 wrote to memory of 2620 2904 82062.exe 36 PID 2904 wrote to memory of 2620 2904 82062.exe 36 PID 2904 wrote to memory of 2620 2904 82062.exe 36 PID 2904 wrote to memory of 2620 2904 82062.exe 36 PID 2620 wrote to memory of 2656 2620 vpddp.exe 37 PID 2620 wrote to memory of 2656 2620 vpddp.exe 37 PID 2620 wrote to memory of 2656 2620 vpddp.exe 37 PID 2620 wrote to memory of 2656 2620 vpddp.exe 37 PID 2656 wrote to memory of 2624 2656 ppjdj.exe 38 PID 2656 wrote to memory of 2624 2656 ppjdj.exe 38 PID 2656 wrote to memory of 2624 2656 ppjdj.exe 38 PID 2656 wrote to memory of 2624 2656 ppjdj.exe 38 PID 2624 wrote to memory of 2084 2624 tnbbtt.exe 39 PID 2624 wrote to memory of 2084 2624 tnbbtt.exe 39 PID 2624 wrote to memory of 2084 2624 tnbbtt.exe 39 PID 2624 wrote to memory of 2084 2624 tnbbtt.exe 39 PID 2084 wrote to memory of 2344 2084 o480622.exe 40 PID 2084 wrote to memory of 2344 2084 o480622.exe 40 PID 2084 wrote to memory of 2344 2084 o480622.exe 40 PID 2084 wrote to memory of 2344 2084 o480622.exe 40 PID 2344 wrote to memory of 1008 2344 62428.exe 41 PID 2344 wrote to memory of 1008 2344 62428.exe 41 PID 2344 wrote to memory of 1008 2344 62428.exe 41 PID 2344 wrote to memory of 1008 2344 62428.exe 41 PID 1008 wrote to memory of 1896 1008 pdddv.exe 42 PID 1008 wrote to memory of 1896 1008 pdddv.exe 42 PID 1008 wrote to memory of 1896 1008 pdddv.exe 42 PID 1008 wrote to memory of 1896 1008 pdddv.exe 42 PID 1896 wrote to memory of 1948 1896 u422262.exe 43 PID 1896 wrote to memory of 1948 1896 u422262.exe 43 PID 1896 wrote to memory of 1948 1896 u422262.exe 43 PID 1896 wrote to memory of 1948 1896 u422262.exe 43 PID 1948 wrote to memory of 1656 1948 7llfrrx.exe 44 PID 1948 wrote to memory of 1656 1948 7llfrrx.exe 44 PID 1948 wrote to memory of 1656 1948 7llfrrx.exe 44 PID 1948 wrote to memory of 1656 1948 7llfrrx.exe 44 PID 1656 wrote to memory of 2864 1656 k02226.exe 45 PID 1656 wrote to memory of 2864 1656 k02226.exe 45 PID 1656 wrote to memory of 2864 1656 k02226.exe 45 PID 1656 wrote to memory of 2864 1656 k02226.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe"C:\Users\Admin\AppData\Local\Temp\b6aee2a4a2858f8c5c9a3045e457ab53da61f16878f5fbf891ed896108a8ea76N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\w80626.exec:\w80626.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\xrlxrrx.exec:\xrlxrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\646444.exec:\646444.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\jjjdd.exec:\jjjdd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\k22844.exec:\k22844.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\82062.exec:\82062.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\vpddp.exec:\vpddp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\ppjdj.exec:\ppjdj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\tnbbtt.exec:\tnbbtt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\o480622.exec:\o480622.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\62428.exec:\62428.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\pdddv.exec:\pdddv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\u422262.exec:\u422262.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\7llfrrx.exec:\7llfrrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\k02226.exec:\k02226.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\42406.exec:\42406.exe17⤵
- Executes dropped EXE
PID:2864 -
\??\c:\u466884.exec:\u466884.exe18⤵
- Executes dropped EXE
PID:2932 -
\??\c:\8640262.exec:\8640262.exe19⤵
- Executes dropped EXE
PID:2976 -
\??\c:\28662.exec:\28662.exe20⤵
- Executes dropped EXE
PID:2692 -
\??\c:\1ntbbb.exec:\1ntbbb.exe21⤵
- Executes dropped EXE
PID:2928 -
\??\c:\9lffrrf.exec:\9lffrrf.exe22⤵
- Executes dropped EXE
PID:2440 -
\??\c:\a2402.exec:\a2402.exe23⤵
- Executes dropped EXE
PID:2204 -
\??\c:\262282.exec:\262282.exe24⤵
- Executes dropped EXE
PID:1304 -
\??\c:\hbttbb.exec:\hbttbb.exe25⤵
- Executes dropped EXE
PID:340 -
\??\c:\pdjpv.exec:\pdjpv.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640 -
\??\c:\28624.exec:\28624.exe27⤵
- Executes dropped EXE
PID:1692 -
\??\c:\ppvjd.exec:\ppvjd.exe28⤵
- Executes dropped EXE
PID:2112 -
\??\c:\e44806.exec:\e44806.exe29⤵
- Executes dropped EXE
PID:1236 -
\??\c:\9bhnbb.exec:\9bhnbb.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
\??\c:\08440.exec:\08440.exe31⤵
- Executes dropped EXE
PID:556 -
\??\c:\jpppd.exec:\jpppd.exe32⤵
- Executes dropped EXE
PID:1412 -
\??\c:\9lfflrf.exec:\9lfflrf.exe33⤵
- Executes dropped EXE
PID:2556 -
\??\c:\m2228.exec:\m2228.exe34⤵
- Executes dropped EXE
PID:2268 -
\??\c:\26062.exec:\26062.exe35⤵
- Executes dropped EXE
PID:2308 -
\??\c:\lfrxffl.exec:\lfrxffl.exe36⤵
- Executes dropped EXE
PID:1348 -
\??\c:\64222.exec:\64222.exe37⤵
- Executes dropped EXE
PID:1832 -
\??\c:\s0400.exec:\s0400.exe38⤵
- Executes dropped EXE
PID:2736 -
\??\c:\jjppv.exec:\jjppv.exe39⤵
- Executes dropped EXE
PID:2444 -
\??\c:\4446020.exec:\4446020.exe40⤵
- Executes dropped EXE
PID:3016 -
\??\c:\lffxfxl.exec:\lffxfxl.exe41⤵
- Executes dropped EXE
PID:2384 -
\??\c:\7vpvv.exec:\7vpvv.exe42⤵
- Executes dropped EXE
PID:2840 -
\??\c:\w86660.exec:\w86660.exe43⤵
- Executes dropped EXE
PID:2764 -
\??\c:\pjjpv.exec:\pjjpv.exe44⤵
- Executes dropped EXE
PID:2608 -
\??\c:\nhtbbb.exec:\nhtbbb.exe45⤵
- Executes dropped EXE
PID:2760 -
\??\c:\04400.exec:\04400.exe46⤵
- Executes dropped EXE
PID:2116 -
\??\c:\9pddd.exec:\9pddd.exe47⤵
- Executes dropped EXE
PID:1132 -
\??\c:\8828002.exec:\8828002.exe48⤵
- Executes dropped EXE
PID:1552 -
\??\c:\dvvvj.exec:\dvvvj.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660 -
\??\c:\48662.exec:\48662.exe50⤵
- Executes dropped EXE
PID:868 -
\??\c:\0484008.exec:\0484008.exe51⤵
- Executes dropped EXE
PID:1816 -
\??\c:\u466828.exec:\u466828.exe52⤵
- Executes dropped EXE
PID:1696 -
\??\c:\86228.exec:\86228.exe53⤵
- Executes dropped EXE
PID:1948 -
\??\c:\pvdvd.exec:\pvdvd.exe54⤵
- Executes dropped EXE
PID:1656 -
\??\c:\0640666.exec:\0640666.exe55⤵
- Executes dropped EXE
PID:1712 -
\??\c:\2084662.exec:\2084662.exe56⤵
- Executes dropped EXE
PID:2964 -
\??\c:\4484488.exec:\4484488.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1296 -
\??\c:\hnbhth.exec:\hnbhth.exe58⤵
- Executes dropped EXE
PID:1560 -
\??\c:\282248.exec:\282248.exe59⤵
- Executes dropped EXE
PID:2972 -
\??\c:\ntnnnh.exec:\ntnnnh.exe60⤵
- Executes dropped EXE
PID:3044 -
\??\c:\xrxrxfl.exec:\xrxrxfl.exe61⤵
- Executes dropped EXE
PID:1252 -
\??\c:\llrxffr.exec:\llrxffr.exe62⤵
- Executes dropped EXE
PID:2440 -
\??\c:\7dpdj.exec:\7dpdj.exe63⤵
- Executes dropped EXE
PID:816 -
\??\c:\a0228.exec:\a0228.exe64⤵
- Executes dropped EXE
PID:1540 -
\??\c:\864406.exec:\864406.exe65⤵
- Executes dropped EXE
PID:1460 -
\??\c:\k64848.exec:\k64848.exe66⤵PID:340
-
\??\c:\dpjjv.exec:\dpjjv.exe67⤵
- System Location Discovery: System Language Discovery
PID:1592 -
\??\c:\9xlrfxf.exec:\9xlrfxf.exe68⤵PID:1692
-
\??\c:\3lrrfxf.exec:\3lrrfxf.exe69⤵PID:3068
-
\??\c:\hbntbt.exec:\hbntbt.exe70⤵PID:980
-
\??\c:\bnhbtt.exec:\bnhbtt.exe71⤵PID:2856
-
\??\c:\e68406.exec:\e68406.exe72⤵PID:1824
-
\??\c:\2206600.exec:\2206600.exe73⤵PID:1836
-
\??\c:\64224.exec:\64224.exe74⤵PID:1512
-
\??\c:\86884.exec:\86884.exe75⤵PID:1436
-
\??\c:\tnbhnn.exec:\tnbhnn.exe76⤵PID:2056
-
\??\c:\xxxxfff.exec:\xxxxfff.exe77⤵PID:2300
-
\??\c:\9frrfxf.exec:\9frrfxf.exe78⤵PID:1348
-
\??\c:\jvppd.exec:\jvppd.exe79⤵PID:2796
-
\??\c:\7lflrxf.exec:\7lflrxf.exe80⤵PID:2720
-
\??\c:\hhtttb.exec:\hhtttb.exe81⤵PID:2748
-
\??\c:\xrllrrx.exec:\xrllrrx.exe82⤵PID:2220
-
\??\c:\xxlrfxf.exec:\xxlrfxf.exe83⤵PID:2384
-
\??\c:\4840662.exec:\4840662.exe84⤵PID:2708
-
\??\c:\ffllrrx.exec:\ffllrrx.exe85⤵PID:2612
-
\??\c:\8680668.exec:\8680668.exe86⤵PID:2712
-
\??\c:\e46688.exec:\e46688.exe87⤵PID:1564
-
\??\c:\2086640.exec:\2086640.exe88⤵PID:564
-
\??\c:\608400.exec:\608400.exe89⤵PID:2020
-
\??\c:\3rfxffl.exec:\3rfxffl.exe90⤵PID:784
-
\??\c:\frllrlx.exec:\frllrlx.exe91⤵PID:1872
-
\??\c:\24006.exec:\24006.exe92⤵PID:1356
-
\??\c:\vpvpv.exec:\vpvpv.exe93⤵PID:2580
-
\??\c:\lxrlxxl.exec:\lxrlxxl.exe94⤵PID:2280
-
\??\c:\428226.exec:\428226.exe95⤵PID:1440
-
\??\c:\486660.exec:\486660.exe96⤵PID:1700
-
\??\c:\m2006.exec:\m2006.exe97⤵PID:2828
-
\??\c:\48002.exec:\48002.exe98⤵
- System Location Discovery: System Language Discovery
PID:2860 -
\??\c:\3httbh.exec:\3httbh.exe99⤵PID:2992
-
\??\c:\xxrlrrx.exec:\xxrlrrx.exe100⤵PID:2964
-
\??\c:\66222.exec:\66222.exe101⤵PID:2680
-
\??\c:\lxfrrrr.exec:\lxfrrrr.exe102⤵PID:2172
-
\??\c:\646848.exec:\646848.exe103⤵PID:3036
-
\??\c:\9hnhht.exec:\9hnhht.exe104⤵PID:2144
-
\??\c:\080444.exec:\080444.exe105⤵PID:2180
-
\??\c:\8688488.exec:\8688488.exe106⤵PID:1780
-
\??\c:\u204684.exec:\u204684.exe107⤵PID:816
-
\??\c:\484060.exec:\484060.exe108⤵PID:1540
-
\??\c:\bntttt.exec:\bntttt.exe109⤵PID:1460
-
\??\c:\84688.exec:\84688.exe110⤵PID:1688
-
\??\c:\8622266.exec:\8622266.exe111⤵PID:2108
-
\??\c:\04220.exec:\04220.exe112⤵PID:3008
-
\??\c:\e02248.exec:\e02248.exe113⤵PID:1396
-
\??\c:\7jvdj.exec:\7jvdj.exe114⤵PID:3060
-
\??\c:\rlxxxxl.exec:\rlxxxxl.exe115⤵PID:2540
-
\??\c:\dvjjj.exec:\dvjjj.exe116⤵PID:1708
-
\??\c:\5pvvv.exec:\5pvvv.exe117⤵PID:1412
-
\??\c:\xlflrlr.exec:\xlflrlr.exe118⤵PID:1900
-
\??\c:\u684668.exec:\u684668.exe119⤵PID:2500
-
\??\c:\82062.exec:\82062.exe120⤵PID:2308
-
\??\c:\dpjjj.exec:\dpjjj.exe121⤵PID:1420
-
\??\c:\i202828.exec:\i202828.exe122⤵PID:1832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-