Analysis
-
max time kernel
114s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 22:07
Behavioral task
behavioral1
Sample
5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe
-
Size
333KB
-
MD5
67478ae4606b1003d28c9d9d9ddc0fa0
-
SHA1
08972ae909c106a6a5847cd7f473ef5d77ada754
-
SHA256
5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9
-
SHA512
0859539528ec02e60fa8980e35538ccc80a7c1f4a064ef65bcf6449846d303f18c2b8bc200fa75fdf313f60118dbdbab583dbb737f5b947087f9190991875f10
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbeF:R4wFHoSHYHUrAwfMp3CDF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4500-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1104-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1920-15-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1324-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1912-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3352-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4316-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4996-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2780-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1296-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4616-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4548-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1868-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1560-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3140-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2932-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2664-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/964-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4620-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/100-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4864-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2164-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4596-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1512-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/832-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4428-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3308-306-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1648-297-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5088-270-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4760-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1248-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1436-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1724-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4576-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1120-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5004-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4632-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3796-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1624-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/536-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1224-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1832-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2276-71-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4296-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4716-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/212-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1128-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/928-324-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2768-339-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3324-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/728-363-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1256-374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-403-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3244-446-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-495-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/100-522-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2884-565-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3892-712-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1116-737-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4784-794-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4700-893-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3192-1019-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-1271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1104 46204.exe 1920 4226660.exe 1128 1hhbtt.exe 212 2888882.exe 1324 28822.exe 1912 vvjjp.exe 3352 vdpjj.exe 4316 fxxfrrl.exe 3132 5vdvp.exe 1172 httnhb.exe 1348 tnhhhh.exe 2652 nbnnhn.exe 2276 vddvv.exe 4296 66262.exe 4996 62826.exe 2780 hhbnhn.exe 1296 a2082.exe 1832 vvppj.exe 4616 rxlfllf.exe 1224 pvvpj.exe 388 26022.exe 1848 26228.exe 4548 000488.exe 1868 htnnnt.exe 724 6004444.exe 536 6440422.exe 1560 5lrrlll.exe 1624 6660448.exe 5024 406666.exe 3800 446600.exe 4524 04640.exe 3796 642626.exe 4452 pvjdd.exe 4632 xxrllff.exe 3140 264488.exe 2572 w08288.exe 5004 pvvvp.exe 4024 tnnhhh.exe 1120 0422228.exe 1020 60226.exe 2932 dvddv.exe 440 lxfxxxf.exe 5112 4060482.exe 2696 2660888.exe 2664 2468888.exe 4576 26226.exe 964 9ppjd.exe 4620 28604.exe 1724 nntbnn.exe 2120 tnhbnn.exe 1924 04606.exe 100 0462644.exe 2316 600044.exe 1436 0244888.exe 4864 rrxrllf.exe 4412 frlxllr.exe 1248 260488.exe 4596 8200062.exe 2164 btnhbb.exe 2580 8404488.exe 396 6060004.exe 4048 rrffllr.exe 2352 jppjj.exe 4760 0444882.exe -
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023cad-3.dat upx behavioral2/memory/4500-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-8.dat upx behavioral2/memory/1104-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb2-11.dat upx behavioral2/memory/1920-15-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/212-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb3-20.dat upx behavioral2/memory/1324-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb6-34.dat upx behavioral2/memory/1912-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb7-40.dat upx behavioral2/memory/3352-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4316-45-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb9-50.dat upx behavioral2/memory/3132-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cba-55.dat upx behavioral2/files/0x0007000000023cbb-59.dat upx behavioral2/files/0x0007000000023cbd-66.dat upx behavioral2/files/0x0007000000023cbe-73.dat upx behavioral2/memory/4996-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2780-79-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc0-78.dat upx behavioral2/memory/1296-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4616-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc5-107.dat upx behavioral2/memory/4548-116-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc7-117.dat upx behavioral2/memory/1868-122-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc8-121.dat upx behavioral2/files/0x0007000000023cc9-126.dat upx behavioral2/files/0x0007000000023cca-130.dat upx behavioral2/memory/1560-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccb-136.dat upx behavioral2/files/0x0007000000023ccd-145.dat upx behavioral2/files/0x0007000000023ccf-153.dat upx behavioral2/memory/3140-164-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2932-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2664-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/964-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4620-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/100-208-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4864-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2164-226-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4596-244-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1512-259-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/832-277-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4428-284-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3308-306-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1648-297-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5088-270-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4760-237-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1248-221-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1436-213-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1724-201-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4576-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1120-173-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4024-170-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5004-169-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4632-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3796-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cce-149.dat upx behavioral2/files/0x0007000000023ccc-141.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 002260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0244888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8224840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2848244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 404444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i022662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 064444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1104 4500 5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe 83 PID 4500 wrote to memory of 1104 4500 5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe 83 PID 4500 wrote to memory of 1104 4500 5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe 83 PID 1104 wrote to memory of 1920 1104 46204.exe 84 PID 1104 wrote to memory of 1920 1104 46204.exe 84 PID 1104 wrote to memory of 1920 1104 46204.exe 84 PID 1920 wrote to memory of 1128 1920 4226660.exe 85 PID 1920 wrote to memory of 1128 1920 4226660.exe 85 PID 1920 wrote to memory of 1128 1920 4226660.exe 85 PID 1128 wrote to memory of 212 1128 1hhbtt.exe 86 PID 1128 wrote to memory of 212 1128 1hhbtt.exe 86 PID 1128 wrote to memory of 212 1128 1hhbtt.exe 86 PID 212 wrote to memory of 1324 212 2888882.exe 87 PID 212 wrote to memory of 1324 212 2888882.exe 87 PID 212 wrote to memory of 1324 212 2888882.exe 87 PID 1324 wrote to memory of 1912 1324 28822.exe 88 PID 1324 wrote to memory of 1912 1324 28822.exe 88 PID 1324 wrote to memory of 1912 1324 28822.exe 88 PID 1912 wrote to memory of 3352 1912 vvjjp.exe 89 PID 1912 wrote to memory of 3352 1912 vvjjp.exe 89 PID 1912 wrote to memory of 3352 1912 vvjjp.exe 89 PID 3352 wrote to memory of 4316 3352 vdpjj.exe 153 PID 3352 wrote to memory of 4316 3352 vdpjj.exe 153 PID 3352 wrote to memory of 4316 3352 vdpjj.exe 153 PID 4316 wrote to memory of 3132 4316 fxxfrrl.exe 91 PID 4316 wrote to memory of 3132 4316 fxxfrrl.exe 91 PID 4316 wrote to memory of 3132 4316 fxxfrrl.exe 91 PID 3132 wrote to memory of 1172 3132 5vdvp.exe 92 PID 3132 wrote to memory of 1172 3132 5vdvp.exe 92 PID 3132 wrote to memory of 1172 3132 5vdvp.exe 92 PID 1172 wrote to memory of 1348 1172 httnhb.exe 93 PID 1172 wrote to memory of 1348 1172 httnhb.exe 93 PID 1172 wrote to memory of 1348 1172 httnhb.exe 93 PID 1348 wrote to memory of 2652 1348 tnhhhh.exe 94 PID 1348 wrote to memory of 2652 1348 tnhhhh.exe 94 PID 1348 wrote to memory of 2652 1348 tnhhhh.exe 94 PID 2652 wrote to memory of 2276 2652 nbnnhn.exe 95 PID 2652 wrote to memory of 2276 2652 nbnnhn.exe 95 PID 2652 wrote to memory of 2276 2652 nbnnhn.exe 95 PID 2276 wrote to memory of 4296 2276 vddvv.exe 159 PID 2276 wrote to memory of 4296 2276 vddvv.exe 159 PID 2276 wrote to memory of 4296 2276 vddvv.exe 159 PID 4296 wrote to memory of 4996 4296 66262.exe 97 PID 4296 wrote to memory of 4996 4296 66262.exe 97 PID 4296 wrote to memory of 4996 4296 66262.exe 97 PID 4996 wrote to memory of 2780 4996 62826.exe 98 PID 4996 wrote to memory of 2780 4996 62826.exe 98 PID 4996 wrote to memory of 2780 4996 62826.exe 98 PID 2780 wrote to memory of 1296 2780 hhbnhn.exe 99 PID 2780 wrote to memory of 1296 2780 hhbnhn.exe 99 PID 2780 wrote to memory of 1296 2780 hhbnhn.exe 99 PID 1296 wrote to memory of 1832 1296 a2082.exe 100 PID 1296 wrote to memory of 1832 1296 a2082.exe 100 PID 1296 wrote to memory of 1832 1296 a2082.exe 100 PID 1832 wrote to memory of 4616 1832 vvppj.exe 101 PID 1832 wrote to memory of 4616 1832 vvppj.exe 101 PID 1832 wrote to memory of 4616 1832 vvppj.exe 101 PID 4616 wrote to memory of 1224 4616 rxlfllf.exe 102 PID 4616 wrote to memory of 1224 4616 rxlfllf.exe 102 PID 4616 wrote to memory of 1224 4616 rxlfllf.exe 102 PID 1224 wrote to memory of 388 1224 pvvpj.exe 103 PID 1224 wrote to memory of 388 1224 pvvpj.exe 103 PID 1224 wrote to memory of 388 1224 pvvpj.exe 103 PID 388 wrote to memory of 1848 388 26022.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe"C:\Users\Admin\AppData\Local\Temp\5564c7445671360c006a35d9fd439f55bbb0b66e7073584139ab161e0e3e4ee9N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\46204.exec:\46204.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\4226660.exec:\4226660.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\1hhbtt.exec:\1hhbtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\2888882.exec:\2888882.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\28822.exec:\28822.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\vvjjp.exec:\vvjjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\vdpjj.exec:\vdpjj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\fxxfrrl.exec:\fxxfrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\5vdvp.exec:\5vdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
\??\c:\httnhb.exec:\httnhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\tnhhhh.exec:\tnhhhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\nbnnhn.exec:\nbnnhn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\vddvv.exec:\vddvv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\66262.exec:\66262.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
\??\c:\62826.exec:\62826.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\hhbnhn.exec:\hhbnhn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\a2082.exec:\a2082.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\vvppj.exec:\vvppj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\rxlfllf.exec:\rxlfllf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\pvvpj.exec:\pvvpj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
\??\c:\26022.exec:\26022.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\26228.exec:\26228.exe23⤵
- Executes dropped EXE
PID:1848 -
\??\c:\000488.exec:\000488.exe24⤵
- Executes dropped EXE
PID:4548 -
\??\c:\htnnnt.exec:\htnnnt.exe25⤵
- Executes dropped EXE
PID:1868 -
\??\c:\6004444.exec:\6004444.exe26⤵
- Executes dropped EXE
PID:724 -
\??\c:\6440422.exec:\6440422.exe27⤵
- Executes dropped EXE
PID:536 -
\??\c:\5lrrlll.exec:\5lrrlll.exe28⤵
- Executes dropped EXE
PID:1560 -
\??\c:\6660448.exec:\6660448.exe29⤵
- Executes dropped EXE
PID:1624 -
\??\c:\406666.exec:\406666.exe30⤵
- Executes dropped EXE
PID:5024 -
\??\c:\446600.exec:\446600.exe31⤵
- Executes dropped EXE
PID:3800 -
\??\c:\04640.exec:\04640.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524 -
\??\c:\642626.exec:\642626.exe33⤵
- Executes dropped EXE
PID:3796 -
\??\c:\pvjdd.exec:\pvjdd.exe34⤵
- Executes dropped EXE
PID:4452 -
\??\c:\xxrllff.exec:\xxrllff.exe35⤵
- Executes dropped EXE
PID:4632 -
\??\c:\264488.exec:\264488.exe36⤵
- Executes dropped EXE
PID:3140 -
\??\c:\w08288.exec:\w08288.exe37⤵
- Executes dropped EXE
PID:2572 -
\??\c:\pvvvp.exec:\pvvvp.exe38⤵
- Executes dropped EXE
PID:5004 -
\??\c:\tnnhhh.exec:\tnnhhh.exe39⤵
- Executes dropped EXE
PID:4024 -
\??\c:\0422228.exec:\0422228.exe40⤵
- Executes dropped EXE
PID:1120 -
\??\c:\60226.exec:\60226.exe41⤵
- Executes dropped EXE
PID:1020 -
\??\c:\dvddv.exec:\dvddv.exe42⤵
- Executes dropped EXE
PID:2932 -
\??\c:\lxfxxxf.exec:\lxfxxxf.exe43⤵
- Executes dropped EXE
PID:440 -
\??\c:\4060482.exec:\4060482.exe44⤵
- Executes dropped EXE
PID:5112 -
\??\c:\2660888.exec:\2660888.exe45⤵
- Executes dropped EXE
PID:2696 -
\??\c:\2468888.exec:\2468888.exe46⤵
- Executes dropped EXE
PID:2664 -
\??\c:\26226.exec:\26226.exe47⤵
- Executes dropped EXE
PID:4576 -
\??\c:\9ppjd.exec:\9ppjd.exe48⤵
- Executes dropped EXE
PID:964 -
\??\c:\28604.exec:\28604.exe49⤵
- Executes dropped EXE
PID:4620 -
\??\c:\nntbnn.exec:\nntbnn.exe50⤵
- Executes dropped EXE
PID:1724 -
\??\c:\tnhbnn.exec:\tnhbnn.exe51⤵
- Executes dropped EXE
PID:2120 -
\??\c:\04606.exec:\04606.exe52⤵
- Executes dropped EXE
PID:1924 -
\??\c:\0462644.exec:\0462644.exe53⤵
- Executes dropped EXE
PID:100 -
\??\c:\600044.exec:\600044.exe54⤵
- Executes dropped EXE
PID:2316 -
\??\c:\0244888.exec:\0244888.exe55⤵
- Executes dropped EXE
PID:1436 -
\??\c:\rrxrllf.exec:\rrxrllf.exe56⤵
- Executes dropped EXE
PID:4864 -
\??\c:\frlxllr.exec:\frlxllr.exe57⤵
- Executes dropped EXE
PID:4412 -
\??\c:\260488.exec:\260488.exe58⤵
- Executes dropped EXE
PID:1248 -
\??\c:\8200062.exec:\8200062.exe59⤵
- Executes dropped EXE
PID:4596 -
\??\c:\btnhbb.exec:\btnhbb.exe60⤵
- Executes dropped EXE
PID:2164 -
\??\c:\8404488.exec:\8404488.exe61⤵
- Executes dropped EXE
PID:2580 -
\??\c:\6060004.exec:\6060004.exe62⤵
- Executes dropped EXE
PID:396 -
\??\c:\rrffllr.exec:\rrffllr.exe63⤵
- Executes dropped EXE
PID:4048 -
\??\c:\jppjj.exec:\jppjj.exe64⤵
- Executes dropped EXE
PID:2352 -
\??\c:\0444882.exec:\0444882.exe65⤵
- Executes dropped EXE
PID:4760 -
\??\c:\824402.exec:\824402.exe66⤵PID:2108
-
\??\c:\04648.exec:\04648.exe67⤵PID:1568
-
\??\c:\826024.exec:\826024.exe68⤵PID:4404
-
\??\c:\lllxrlr.exec:\lllxrlr.exe69⤵PID:4888
-
\??\c:\824066.exec:\824066.exe70⤵PID:3656
-
\??\c:\6008864.exec:\6008864.exe71⤵PID:4900
-
\??\c:\jvddv.exec:\jvddv.exe72⤵PID:4316
-
\??\c:\jjddp.exec:\jjddp.exe73⤵PID:2424
-
\??\c:\666260.exec:\666260.exe74⤵PID:4932
-
\??\c:\64662.exec:\64662.exe75⤵PID:1512
-
\??\c:\68448.exec:\68448.exe76⤵PID:2528
-
\??\c:\06882.exec:\06882.exe77⤵PID:2276
-
\??\c:\nntntn.exec:\nntntn.exe78⤵PID:4296
-
\??\c:\jjjdv.exec:\jjjdv.exe79⤵PID:2552
-
\??\c:\44666.exec:\44666.exe80⤵PID:5088
-
\??\c:\ttttnn.exec:\ttttnn.exe81⤵PID:4304
-
\??\c:\6240620.exec:\6240620.exe82⤵PID:208
-
\??\c:\xlrrlll.exec:\xlrrlll.exe83⤵PID:832
-
\??\c:\rxlflfx.exec:\rxlflfx.exe84⤵PID:3092
-
\??\c:\888260.exec:\888260.exe85⤵PID:5104
-
\??\c:\268888.exec:\268888.exe86⤵PID:4428
-
\??\c:\1vdvv.exec:\1vdvv.exe87⤵PID:1088
-
\??\c:\0644848.exec:\0644848.exe88⤵PID:1848
-
\??\c:\pdpdp.exec:\pdpdp.exe89⤵PID:1992
-
\??\c:\bbttnt.exec:\bbttnt.exe90⤵PID:2460
-
\??\c:\26828.exec:\26828.exe91⤵PID:4516
-
\??\c:\htbtnn.exec:\htbtnn.exe92⤵PID:1648
-
\??\c:\k28266.exec:\k28266.exe93⤵PID:3284
-
\??\c:\5hnbtb.exec:\5hnbtb.exe94⤵PID:2468
-
\??\c:\lxfxxxx.exec:\lxfxxxx.exe95⤵PID:2388
-
\??\c:\6000488.exec:\6000488.exe96⤵PID:3308
-
\??\c:\268826.exec:\268826.exe97⤵PID:1792
-
\??\c:\00048.exec:\00048.exe98⤵PID:4368
-
\??\c:\u688266.exec:\u688266.exe99⤵PID:2960
-
\??\c:\c222668.exec:\c222668.exe100⤵PID:836
-
\??\c:\xxlrrrl.exec:\xxlrrrl.exe101⤵PID:4716
-
\??\c:\vpvpv.exec:\vpvpv.exe102⤵PID:4792
-
\??\c:\dvdvd.exec:\dvdvd.exe103⤵PID:884
-
\??\c:\k08888.exec:\k08888.exe104⤵PID:928
-
\??\c:\flxrlfx.exec:\flxrlfx.exe105⤵PID:1272
-
\??\c:\40648.exec:\40648.exe106⤵PID:2876
-
\??\c:\5btthn.exec:\5btthn.exe107⤵PID:3816
-
\??\c:\222048.exec:\222048.exe108⤵PID:3784
-
\??\c:\vjvvp.exec:\vjvvp.exe109⤵PID:2988
-
\??\c:\k288888.exec:\k288888.exe110⤵PID:1908
-
\??\c:\jppdj.exec:\jppdj.exe111⤵PID:2768
-
\??\c:\vdvpv.exec:\vdvpv.exe112⤵PID:916
-
\??\c:\840040.exec:\840040.exe113⤵PID:1964
-
\??\c:\frxrrrx.exec:\frxrrrx.exe114⤵PID:4020
-
\??\c:\jvvpp.exec:\jvvpp.exe115⤵PID:3324
-
\??\c:\04000.exec:\04000.exe116⤵PID:660
-
\??\c:\2848244.exec:\2848244.exe117⤵
- System Location Discovery: System Language Discovery
PID:2324 -
\??\c:\pdjpj.exec:\pdjpj.exe118⤵PID:3812
-
\??\c:\246666.exec:\246666.exe119⤵PID:4144
-
\??\c:\dvvdp.exec:\dvvdp.exe120⤵PID:3604
-
\??\c:\rrxrllf.exec:\rrxrllf.exe121⤵PID:1856
-
\??\c:\686888.exec:\686888.exe122⤵PID:728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-