Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 00:35
Behavioral task
behavioral1
Sample
cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe
Resource
win7-20241023-en
windows7-x64
9 signatures
120 seconds
General
-
Target
cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe
-
Size
3.7MB
-
MD5
83932b9bab1f61b0ba946aacc0533620
-
SHA1
3da5bd965483321a40fa982da6714651c32302a2
-
SHA256
cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8ee
-
SHA512
1bce7629676a5be7a242bd937708680a49ca9e804a04d3bd2da79939c07dc06c57d197983c0a3885654eead4085f58be80435ae49926953447611c3138a5a630
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98w:U6XLq/qPPslzKx/dJg1ErmNR
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4824-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1344-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3304-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3220-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4796-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/840-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2612-66-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-71-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2072-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3368-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3240-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5012-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3268-111-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2432-117-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2636-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/372-130-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/372-135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4932-149-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4944-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1948-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4708-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2524-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1416-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/556-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4184-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2940-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/592-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1844-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/692-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4608-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4584-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1100-264-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1840-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/436-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3236-294-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1068-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2432-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1420-324-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/432-331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1504-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4708-357-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/884-364-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4684-373-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3056-384-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-391-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4584-422-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4556-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3140-439-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2496-530-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/592-543-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1908-550-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4328-578-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2124-588-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3612-595-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3680-614-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1948-667-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4696-813-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1416-829-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1644-1067-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1344 rxfxxxf.exe 4324 pppdd.exe 3572 nnntth.exe 3304 htbtbb.exe 3220 pppjv.exe 4796 pjddv.exe 840 xrffllx.exe 864 bthtnt.exe 1056 5frlrlr.exe 2612 9hnhbb.exe 3600 xrxlxrf.exe 2300 nhnhhb.exe 2072 vjvpp.exe 3368 9xfrfxx.exe 3240 3djjj.exe 5012 jjpjd.exe 3736 rrxrrff.exe 3268 xlxffxf.exe 2432 xrffflf.exe 1508 fxxlxrf.exe 2636 rllfffx.exe 372 llxlrrx.exe 2952 ppppp.exe 4944 fxxlffr.exe 4932 xffxrrr.exe 1504 3flfffx.exe 1944 djpjd.exe 1948 hbhbbb.exe 4708 btbtnn.exe 2524 rlrfxxr.exe 1416 vpjjj.exe 556 rlrllrr.exe 4140 jpvdd.exe 2360 xrrrlll.exe 336 fllxrxr.exe 4184 jddvp.exe 2008 jdjjd.exe 1288 rrlrxxl.exe 404 ffxrxff.exe 2940 rlfrrlr.exe 592 llxxrrl.exe 1388 xrrrllf.exe 5016 jvjdv.exe 1844 dpvpj.exe 4724 pjjjd.exe 2888 pvjjd.exe 1140 pjvpj.exe 692 pjvjv.exe 1488 bnthtn.exe 1132 hntnbb.exe 4608 1bnhtt.exe 4584 hthbtn.exe 1100 bbnbth.exe 1840 thhthb.exe 4908 xxrrlll.exe 436 rfflxxx.exe 384 xrxrffx.exe 3600 rlrlllx.exe 2904 vvvjj.exe 3300 vvjjd.exe 2728 vvvdv.exe 3236 djjdd.exe 4820 htbnnh.exe 1640 ththtn.exe -
resource yara_rule behavioral2/memory/4824-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b92-3.dat upx behavioral2/memory/1344-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4824-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b93-10.dat upx behavioral2/memory/1344-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b94-14.dat upx behavioral2/memory/4324-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3572-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b90-22.dat upx behavioral2/memory/3304-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b96-28.dat upx behavioral2/memory/3220-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b97-36.dat upx behavioral2/files/0x000a000000023b98-41.dat upx behavioral2/memory/4796-43-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/840-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b99-46.dat upx behavioral2/files/0x000a000000023b9a-53.dat upx behavioral2/memory/864-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b9b-57.dat upx behavioral2/files/0x000a000000023b9c-63.dat upx behavioral2/memory/2612-66-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b9d-69.dat upx behavioral2/memory/3600-71-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b9e-75.dat upx behavioral2/files/0x000a000000023b9f-80.dat upx behavioral2/memory/2072-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3368-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba0-86.dat upx behavioral2/files/0x000a000000023ba1-92.dat upx behavioral2/memory/3240-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba2-98.dat upx behavioral2/memory/5012-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba3-104.dat upx behavioral2/files/0x000a000000023ba4-109.dat upx behavioral2/memory/3268-111-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba5-115.dat upx behavioral2/memory/2432-117-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba6-121.dat upx behavioral2/memory/2636-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba7-128.dat upx behavioral2/memory/372-130-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba8-133.dat upx behavioral2/memory/372-135-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023ba9-139.dat upx behavioral2/memory/2952-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023baa-146.dat upx behavioral2/memory/4932-149-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4944-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e767-153.dat upx behavioral2/files/0x000a000000023bad-157.dat upx behavioral2/files/0x000b000000023bae-162.dat upx behavioral2/memory/1948-169-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023baf-170.dat upx behavioral2/files/0x000b000000023bb0-173.dat upx behavioral2/memory/4708-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023bb8-179.dat upx behavioral2/memory/2524-181-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023bbf-185.dat upx behavioral2/memory/1416-187-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/556-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4184-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2940-218-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fxrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrxrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xrfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrfllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xlfrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7htnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5thbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxlffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 1344 4824 cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe 83 PID 4824 wrote to memory of 1344 4824 cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe 83 PID 4824 wrote to memory of 1344 4824 cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe 83 PID 1344 wrote to memory of 4324 1344 rxfxxxf.exe 84 PID 1344 wrote to memory of 4324 1344 rxfxxxf.exe 84 PID 1344 wrote to memory of 4324 1344 rxfxxxf.exe 84 PID 4324 wrote to memory of 3572 4324 pppdd.exe 85 PID 4324 wrote to memory of 3572 4324 pppdd.exe 85 PID 4324 wrote to memory of 3572 4324 pppdd.exe 85 PID 3572 wrote to memory of 3304 3572 nnntth.exe 86 PID 3572 wrote to memory of 3304 3572 nnntth.exe 86 PID 3572 wrote to memory of 3304 3572 nnntth.exe 86 PID 3304 wrote to memory of 3220 3304 htbtbb.exe 87 PID 3304 wrote to memory of 3220 3304 htbtbb.exe 87 PID 3304 wrote to memory of 3220 3304 htbtbb.exe 87 PID 3220 wrote to memory of 4796 3220 pppjv.exe 88 PID 3220 wrote to memory of 4796 3220 pppjv.exe 88 PID 3220 wrote to memory of 4796 3220 pppjv.exe 88 PID 4796 wrote to memory of 840 4796 pjddv.exe 89 PID 4796 wrote to memory of 840 4796 pjddv.exe 89 PID 4796 wrote to memory of 840 4796 pjddv.exe 89 PID 840 wrote to memory of 864 840 xrffllx.exe 90 PID 840 wrote to memory of 864 840 xrffllx.exe 90 PID 840 wrote to memory of 864 840 xrffllx.exe 90 PID 864 wrote to memory of 1056 864 bthtnt.exe 91 PID 864 wrote to memory of 1056 864 bthtnt.exe 91 PID 864 wrote to memory of 1056 864 bthtnt.exe 91 PID 1056 wrote to memory of 2612 1056 5frlrlr.exe 92 PID 1056 wrote to memory of 2612 1056 5frlrlr.exe 92 PID 1056 wrote to memory of 2612 1056 5frlrlr.exe 92 PID 2612 wrote to memory of 3600 2612 9hnhbb.exe 93 PID 2612 wrote to memory of 3600 2612 9hnhbb.exe 93 PID 2612 wrote to memory of 3600 2612 9hnhbb.exe 93 PID 3600 wrote to memory of 2300 3600 xrxlxrf.exe 94 PID 3600 wrote to memory of 2300 3600 xrxlxrf.exe 94 PID 3600 wrote to memory of 2300 3600 xrxlxrf.exe 94 PID 2300 wrote to memory of 2072 2300 nhnhhb.exe 95 PID 2300 wrote to memory of 2072 2300 nhnhhb.exe 95 PID 2300 wrote to memory of 2072 2300 nhnhhb.exe 95 PID 2072 wrote to memory of 3368 2072 vjvpp.exe 96 PID 2072 wrote to memory of 3368 2072 vjvpp.exe 96 PID 2072 wrote to memory of 3368 2072 vjvpp.exe 96 PID 3368 wrote to memory of 3240 3368 9xfrfxx.exe 97 PID 3368 wrote to memory of 3240 3368 9xfrfxx.exe 97 PID 3368 wrote to memory of 3240 3368 9xfrfxx.exe 97 PID 3240 wrote to memory of 5012 3240 3djjj.exe 98 PID 3240 wrote to memory of 5012 3240 3djjj.exe 98 PID 3240 wrote to memory of 5012 3240 3djjj.exe 98 PID 5012 wrote to memory of 3736 5012 jjpjd.exe 99 PID 5012 wrote to memory of 3736 5012 jjpjd.exe 99 PID 5012 wrote to memory of 3736 5012 jjpjd.exe 99 PID 3736 wrote to memory of 3268 3736 rrxrrff.exe 100 PID 3736 wrote to memory of 3268 3736 rrxrrff.exe 100 PID 3736 wrote to memory of 3268 3736 rrxrrff.exe 100 PID 3268 wrote to memory of 2432 3268 xlxffxf.exe 101 PID 3268 wrote to memory of 2432 3268 xlxffxf.exe 101 PID 3268 wrote to memory of 2432 3268 xlxffxf.exe 101 PID 2432 wrote to memory of 1508 2432 xrffflf.exe 102 PID 2432 wrote to memory of 1508 2432 xrffflf.exe 102 PID 2432 wrote to memory of 1508 2432 xrffflf.exe 102 PID 1508 wrote to memory of 2636 1508 fxxlxrf.exe 103 PID 1508 wrote to memory of 2636 1508 fxxlxrf.exe 103 PID 1508 wrote to memory of 2636 1508 fxxlxrf.exe 103 PID 2636 wrote to memory of 372 2636 rllfffx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe"C:\Users\Admin\AppData\Local\Temp\cc7dc392df21b97e915bdc58ab763aa51c758976982d863e696db707b06ae8eeN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
\??\c:\rxfxxxf.exec:\rxfxxxf.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\pppdd.exec:\pppdd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\nnntth.exec:\nnntth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\htbtbb.exec:\htbtbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\pppjv.exec:\pppjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
\??\c:\pjddv.exec:\pjddv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\xrffllx.exec:\xrffllx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\bthtnt.exec:\bthtnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
\??\c:\5frlrlr.exec:\5frlrlr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\9hnhbb.exec:\9hnhbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\xrxlxrf.exec:\xrxlxrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
\??\c:\nhnhhb.exec:\nhnhhb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\vjvpp.exec:\vjvpp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\9xfrfxx.exec:\9xfrfxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
\??\c:\3djjj.exec:\3djjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
\??\c:\jjpjd.exec:\jjpjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\rrxrrff.exec:\rrxrrff.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\xlxffxf.exec:\xlxffxf.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
\??\c:\xrffflf.exec:\xrffflf.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\fxxlxrf.exec:\fxxlxrf.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\rllfffx.exec:\rllfffx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\llxlrrx.exec:\llxlrrx.exe23⤵
- Executes dropped EXE
PID:372 -
\??\c:\ppppp.exec:\ppppp.exe24⤵
- Executes dropped EXE
PID:2952 -
\??\c:\fxxlffr.exec:\fxxlffr.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4944 -
\??\c:\xffxrrr.exec:\xffxrrr.exe26⤵
- Executes dropped EXE
PID:4932 -
\??\c:\3flfffx.exec:\3flfffx.exe27⤵
- Executes dropped EXE
PID:1504 -
\??\c:\djpjd.exec:\djpjd.exe28⤵
- Executes dropped EXE
PID:1944 -
\??\c:\hbhbbb.exec:\hbhbbb.exe29⤵
- Executes dropped EXE
PID:1948 -
\??\c:\btbtnn.exec:\btbtnn.exe30⤵
- Executes dropped EXE
PID:4708 -
\??\c:\rlrfxxr.exec:\rlrfxxr.exe31⤵
- Executes dropped EXE
PID:2524 -
\??\c:\vpjjj.exec:\vpjjj.exe32⤵
- Executes dropped EXE
PID:1416 -
\??\c:\rlrllrr.exec:\rlrllrr.exe33⤵
- Executes dropped EXE
PID:556 -
\??\c:\jpvdd.exec:\jpvdd.exe34⤵
- Executes dropped EXE
PID:4140 -
\??\c:\xrrrlll.exec:\xrrrlll.exe35⤵
- Executes dropped EXE
PID:2360 -
\??\c:\fllxrxr.exec:\fllxrxr.exe36⤵
- Executes dropped EXE
PID:336 -
\??\c:\jddvp.exec:\jddvp.exe37⤵
- Executes dropped EXE
PID:4184 -
\??\c:\jdjjd.exec:\jdjjd.exe38⤵
- Executes dropped EXE
PID:2008 -
\??\c:\rrlrxxl.exec:\rrlrxxl.exe39⤵
- Executes dropped EXE
PID:1288 -
\??\c:\ffxrxff.exec:\ffxrxff.exe40⤵
- Executes dropped EXE
PID:404 -
\??\c:\rlfrrlr.exec:\rlfrrlr.exe41⤵
- Executes dropped EXE
PID:2940 -
\??\c:\llxxrrl.exec:\llxxrrl.exe42⤵
- Executes dropped EXE
PID:592 -
\??\c:\xrrrllf.exec:\xrrrllf.exe43⤵
- Executes dropped EXE
PID:1388 -
\??\c:\jvjdv.exec:\jvjdv.exe44⤵
- Executes dropped EXE
PID:5016 -
\??\c:\dpvpj.exec:\dpvpj.exe45⤵
- Executes dropped EXE
PID:1844 -
\??\c:\pjjjd.exec:\pjjjd.exe46⤵
- Executes dropped EXE
PID:4724 -
\??\c:\pvjjd.exec:\pvjjd.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888 -
\??\c:\pjvpj.exec:\pjvpj.exe48⤵
- Executes dropped EXE
PID:1140 -
\??\c:\pjvjv.exec:\pjvjv.exe49⤵
- Executes dropped EXE
PID:692 -
\??\c:\bnthtn.exec:\bnthtn.exe50⤵
- Executes dropped EXE
PID:1488 -
\??\c:\hntnbb.exec:\hntnbb.exe51⤵
- Executes dropped EXE
PID:1132 -
\??\c:\1bnhtt.exec:\1bnhtt.exe52⤵
- Executes dropped EXE
PID:4608 -
\??\c:\hthbtn.exec:\hthbtn.exe53⤵
- Executes dropped EXE
PID:4584 -
\??\c:\bbnbth.exec:\bbnbth.exe54⤵
- Executes dropped EXE
PID:1100 -
\??\c:\thhthb.exec:\thhthb.exe55⤵
- Executes dropped EXE
PID:1840 -
\??\c:\xxrrlll.exec:\xxrrlll.exe56⤵
- Executes dropped EXE
PID:4908 -
\??\c:\rfflxxx.exec:\rfflxxx.exe57⤵
- Executes dropped EXE
PID:436 -
\??\c:\xrxrffx.exec:\xrxrffx.exe58⤵
- Executes dropped EXE
PID:384 -
\??\c:\rlrlllx.exec:\rlrlllx.exe59⤵
- Executes dropped EXE
PID:3600 -
\??\c:\vvvjj.exec:\vvvjj.exe60⤵
- Executes dropped EXE
PID:2904 -
\??\c:\vvjjd.exec:\vvjjd.exe61⤵
- Executes dropped EXE
PID:3300 -
\??\c:\vvvdv.exec:\vvvdv.exe62⤵
- Executes dropped EXE
PID:2728 -
\??\c:\djjdd.exec:\djjdd.exe63⤵
- Executes dropped EXE
PID:3236 -
\??\c:\htbnnh.exec:\htbnnh.exe64⤵
- Executes dropped EXE
PID:4820 -
\??\c:\ththtn.exec:\ththtn.exe65⤵
- Executes dropped EXE
PID:1640 -
\??\c:\nhnhth.exec:\nhnhth.exe66⤵PID:1068
-
\??\c:\tntnbh.exec:\tntnbh.exe67⤵PID:2144
-
\??\c:\thnnhh.exec:\thnnhh.exe68⤵PID:2432
-
\??\c:\hntttb.exec:\hntttb.exe69⤵PID:1764
-
\??\c:\ffrfxxr.exec:\ffrfxxr.exe70⤵PID:2824
-
\??\c:\fllxrlf.exec:\fllxrlf.exe71⤵PID:2748
-
\??\c:\5xrfxxr.exec:\5xrfxxr.exe72⤵
- System Location Discovery: System Language Discovery
PID:1420 -
\??\c:\xxlfxxx.exec:\xxlfxxx.exe73⤵
- System Location Discovery: System Language Discovery
PID:4604 -
\??\c:\xrlxxlr.exec:\xrlxxlr.exe74⤵PID:432
-
\??\c:\lrxxffx.exec:\lrxxffx.exe75⤵PID:3720
-
\??\c:\3jppj.exec:\3jppj.exe76⤵PID:4932
-
\??\c:\jppdv.exec:\jppdv.exe77⤵PID:3944
-
\??\c:\htbtnn.exec:\htbtnn.exe78⤵PID:1504
-
\??\c:\nbtnht.exec:\nbtnht.exe79⤵PID:4108
-
\??\c:\9nttnh.exec:\9nttnh.exe80⤵PID:2268
-
\??\c:\1xlffxf.exec:\1xlffxf.exe81⤵PID:2868
-
\??\c:\7flfxrr.exec:\7flfxrr.exe82⤵PID:4708
-
\??\c:\flrlxfx.exec:\flrlxfx.exe83⤵PID:2864
-
\??\c:\rllfxxf.exec:\rllfxxf.exe84⤵PID:884
-
\??\c:\ppvpd.exec:\ppvpd.exe85⤵
- System Location Discovery: System Language Discovery
PID:3284 -
\??\c:\pjvpv.exec:\pjvpv.exe86⤵PID:4692
-
\??\c:\vpvjv.exec:\vpvjv.exe87⤵PID:4996
-
\??\c:\3vdpd.exec:\3vdpd.exe88⤵PID:4684
-
\??\c:\jvpjd.exec:\jvpjd.exe89⤵PID:4992
-
\??\c:\3pjdd.exec:\3pjdd.exe90⤵PID:3056
-
\??\c:\jvjvp.exec:\jvjvp.exe91⤵PID:2372
-
\??\c:\tnnhbt.exec:\tnnhbt.exe92⤵PID:1388
-
\??\c:\thntbt.exec:\thntbt.exe93⤵PID:2644
-
\??\c:\bbbthb.exec:\bbbthb.exe94⤵PID:1276
-
\??\c:\xlllfxr.exec:\xlllfxr.exe95⤵PID:2040
-
\??\c:\rllfllr.exec:\rllfllr.exe96⤵PID:2888
-
\??\c:\fxrfrlx.exec:\fxrfrlx.exe97⤵PID:1456
-
\??\c:\lxfxxxf.exec:\lxfxxxf.exe98⤵PID:2708
-
\??\c:\5jjjd.exec:\5jjjd.exe99⤵PID:1512
-
\??\c:\3dpjp.exec:\3dpjp.exe100⤵PID:3252
-
\??\c:\djddj.exec:\djddj.exe101⤵
- System Location Discovery: System Language Discovery
PID:4608 -
\??\c:\thnnnh.exec:\thnnnh.exe102⤵PID:4584
-
\??\c:\ttthtt.exec:\ttthtt.exe103⤵PID:4488
-
\??\c:\1tnhth.exec:\1tnhth.exe104⤵PID:2584
-
\??\c:\nhtnhb.exec:\nhtnhb.exe105⤵
- System Location Discovery: System Language Discovery
PID:4556 -
\??\c:\nhhtnh.exec:\nhhtnh.exe106⤵PID:4152
-
\??\c:\bbhbtt.exec:\bbhbtt.exe107⤵PID:3140
-
\??\c:\tbhbbh.exec:\tbhbbh.exe108⤵PID:1412
-
\??\c:\9nbthh.exec:\9nbthh.exe109⤵
- System Location Discovery: System Language Discovery
PID:2668 -
\??\c:\tbthnh.exec:\tbthnh.exe110⤵PID:3240
-
\??\c:\nnhbtn.exec:\nnhbtn.exe111⤵PID:1096
-
\??\c:\nnnhbt.exec:\nnnhbt.exe112⤵PID:3392
-
\??\c:\httntn.exec:\httntn.exe113⤵PID:3540
-
\??\c:\tthnhh.exec:\tthnhh.exe114⤵PID:4704
-
\??\c:\rxlfrlf.exec:\rxlfrlf.exe115⤵PID:4588
-
\??\c:\lxfxrll.exec:\lxfxrll.exe116⤵
- System Location Discovery: System Language Discovery
PID:3420 -
\??\c:\xrxrrxr.exec:\xrxrrxr.exe117⤵PID:3892
-
\??\c:\rfllfxr.exec:\rfllfxr.exe118⤵PID:3716
-
\??\c:\xffxrrr.exec:\xffxrrr.exe119⤵PID:5052
-
\??\c:\xxrlfff.exec:\xxrlfff.exe120⤵PID:2680
-
\??\c:\dvvvp.exec:\dvvvp.exe121⤵PID:4392
-
\??\c:\dpvpj.exec:\dpvpj.exe122⤵PID:4944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-