Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 02:10
Behavioral task
behavioral1
Sample
95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe
-
Size
3.7MB
-
MD5
abe04a5143418c4bf41fba56344e507d
-
SHA1
3db0daea625c1dcdf860ce7ce079dac7014f954d
-
SHA256
95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a
-
SHA512
d1762e470038fd9b919ed0b817206a10215348f49767db40e5ffb9ba420ba0d7c58ca7ab495bc65ae0d6304362a2f1f05abd69ebfbc06325ab7b4d7f7adb174f
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98q:U6XLq/qPPslzKx/dJg1ErmN3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/3844-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2956-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3092-22-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3032-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1440-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2256-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4968-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2544-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5044-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1148-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2380-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1600-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1276-81-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/528-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4244-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1216-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2276-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2996-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5004-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4864-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3384-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/336-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4436-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/548-168-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4640-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4164-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2684-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3472-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2420-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4540-211-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2076-215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1264-228-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4520-238-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4960-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2544-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1144-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2612-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3828-286-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3368-326-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3448-336-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3540-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1468-356-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-366-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1696-370-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4620-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2164-387-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3596-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1504-401-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1660-411-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4736-417-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-449-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4244-468-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3296-520-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1092-560-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/892-684-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3208-697-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2996-804-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1464-1090-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5052-1136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2536-1302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1512-1721-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2956 nttnhh.exe 3304 nbhhhb.exe 3092 llrfrfr.exe 3032 rfxrlfr.exe 1440 tbthtn.exe 2256 htnbtn.exe 2544 vjvpv.exe 4968 lxllrlr.exe 5044 nbnhtb.exe 1148 vvvpp.exe 2380 ppddd.exe 1600 flfrfxl.exe 1276 rfxlxlf.exe 528 3btnbt.exe 4244 tttnhb.exe 1216 fflffrl.exe 2276 rlflxlx.exe 2996 tnnhnn.exe 5004 lrxrfrf.exe 4864 nttttt.exe 3512 btthbn.exe 3384 rlfxlxx.exe 696 rlfxrlf.exe 5116 bttnhb.exe 336 ffffrrx.exe 736 djjvj.exe 4436 bbhtht.exe 548 hbbtnh.exe 4640 vjvpp.exe 4420 pvvjd.exe 1964 xxfxlff.exe 4164 lrllrxl.exe 2684 lfrfrlx.exe 232 dppjj.exe 3472 xrlrlxf.exe 1756 pjpjd.exe 2420 vdvvd.exe 4540 7pdvj.exe 2076 xlrfxlf.exe 788 xrxxrrl.exe 3316 xrllfrf.exe 396 rfxrlxr.exe 1264 rlxrfff.exe 1640 9fxrrrr.exe 1564 fflxrfx.exe 4520 frrlxrf.exe 388 rffxrrl.exe 4960 rxxlfxl.exe 3520 xrrlxrl.exe 4984 rrlxrlf.exe 3032 9lllffx.exe 3132 ttnnnh.exe 2212 ntbtbt.exe 2544 fxfxrlf.exe 4612 nttnbb.exe 1144 bntnhb.exe 2612 tnnhtn.exe 3240 tnbnth.exe 2720 fxflfrf.exe 3828 xfrffff.exe 2344 rllffrr.exe 2028 7fffrrr.exe 1064 vjdpj.exe 4804 9vvjv.exe -
resource yara_rule behavioral2/memory/3844-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023bfc-3.dat upx behavioral2/memory/3844-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca2-9.dat upx behavioral2/memory/2956-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca3-17.dat upx behavioral2/files/0x0007000000023ca4-23.dat upx behavioral2/memory/3092-22-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca5-26.dat upx behavioral2/memory/3032-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca6-35.dat upx behavioral2/memory/1440-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023c9e-41.dat upx behavioral2/memory/2256-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4968-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2544-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ca8-45.dat upx behavioral2/files/0x0007000000023ca9-52.dat upx behavioral2/files/0x0007000000023caa-59.dat upx behavioral2/memory/5044-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1148-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cab-63.dat upx behavioral2/files/0x0007000000023cac-68.dat upx behavioral2/memory/2380-69-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1600-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cad-76.dat upx behavioral2/files/0x0007000000023cae-82.dat upx behavioral2/memory/1276-81-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/528-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000400000001e75a-86.dat upx behavioral2/files/0x0007000000023caf-94.dat upx behavioral2/memory/4244-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1216-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb0-100.dat upx behavioral2/memory/2996-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2276-106-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-104.dat upx behavioral2/files/0x0007000000023cb2-113.dat upx behavioral2/memory/2996-112-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb3-118.dat upx behavioral2/memory/5004-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb4-125.dat upx behavioral2/memory/4864-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb5-130.dat upx behavioral2/memory/3384-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb6-134.dat upx behavioral2/files/0x0007000000023cb7-139.dat upx behavioral2/files/0x0007000000023cb8-145.dat upx behavioral2/memory/5116-147-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cba-152.dat upx behavioral2/memory/336-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbb-157.dat upx behavioral2/memory/4436-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbc-163.dat upx behavioral2/files/0x0007000000023cbd-169.dat upx behavioral2/memory/548-168-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4420-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4640-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbe-173.dat upx behavioral2/files/0x0007000000023cbf-179.dat upx behavioral2/files/0x0007000000023cc0-186.dat upx behavioral2/memory/4164-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2684-193-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3472-199-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xxfxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fxlflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrfrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlfrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ntntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfflfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffrxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbnh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3844 wrote to memory of 2956 3844 95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe 82 PID 3844 wrote to memory of 2956 3844 95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe 82 PID 3844 wrote to memory of 2956 3844 95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe 82 PID 2956 wrote to memory of 3304 2956 nttnhh.exe 83 PID 2956 wrote to memory of 3304 2956 nttnhh.exe 83 PID 2956 wrote to memory of 3304 2956 nttnhh.exe 83 PID 3304 wrote to memory of 3092 3304 nbhhhb.exe 84 PID 3304 wrote to memory of 3092 3304 nbhhhb.exe 84 PID 3304 wrote to memory of 3092 3304 nbhhhb.exe 84 PID 3092 wrote to memory of 3032 3092 llrfrfr.exe 136 PID 3092 wrote to memory of 3032 3092 llrfrfr.exe 136 PID 3092 wrote to memory of 3032 3092 llrfrfr.exe 136 PID 3032 wrote to memory of 1440 3032 rfxrlfr.exe 86 PID 3032 wrote to memory of 1440 3032 rfxrlfr.exe 86 PID 3032 wrote to memory of 1440 3032 rfxrlfr.exe 86 PID 1440 wrote to memory of 2256 1440 tbthtn.exe 87 PID 1440 wrote to memory of 2256 1440 tbthtn.exe 87 PID 1440 wrote to memory of 2256 1440 tbthtn.exe 87 PID 2256 wrote to memory of 2544 2256 htnbtn.exe 139 PID 2256 wrote to memory of 2544 2256 htnbtn.exe 139 PID 2256 wrote to memory of 2544 2256 htnbtn.exe 139 PID 2544 wrote to memory of 4968 2544 vjvpv.exe 89 PID 2544 wrote to memory of 4968 2544 vjvpv.exe 89 PID 2544 wrote to memory of 4968 2544 vjvpv.exe 89 PID 4968 wrote to memory of 5044 4968 lxllrlr.exe 90 PID 4968 wrote to memory of 5044 4968 lxllrlr.exe 90 PID 4968 wrote to memory of 5044 4968 lxllrlr.exe 90 PID 5044 wrote to memory of 1148 5044 nbnhtb.exe 91 PID 5044 wrote to memory of 1148 5044 nbnhtb.exe 91 PID 5044 wrote to memory of 1148 5044 nbnhtb.exe 91 PID 1148 wrote to memory of 2380 1148 vvvpp.exe 92 PID 1148 wrote to memory of 2380 1148 vvvpp.exe 92 PID 1148 wrote to memory of 2380 1148 vvvpp.exe 92 PID 2380 wrote to memory of 1600 2380 ppddd.exe 93 PID 2380 wrote to memory of 1600 2380 ppddd.exe 93 PID 2380 wrote to memory of 1600 2380 ppddd.exe 93 PID 1600 wrote to memory of 1276 1600 flfrfxl.exe 201 PID 1600 wrote to memory of 1276 1600 flfrfxl.exe 201 PID 1600 wrote to memory of 1276 1600 flfrfxl.exe 201 PID 1276 wrote to memory of 528 1276 rfxlxlf.exe 95 PID 1276 wrote to memory of 528 1276 rfxlxlf.exe 95 PID 1276 wrote to memory of 528 1276 rfxlxlf.exe 95 PID 528 wrote to memory of 4244 528 3btnbt.exe 204 PID 528 wrote to memory of 4244 528 3btnbt.exe 204 PID 528 wrote to memory of 4244 528 3btnbt.exe 204 PID 4244 wrote to memory of 1216 4244 tttnhb.exe 97 PID 4244 wrote to memory of 1216 4244 tttnhb.exe 97 PID 4244 wrote to memory of 1216 4244 tttnhb.exe 97 PID 1216 wrote to memory of 2276 1216 fflffrl.exe 98 PID 1216 wrote to memory of 2276 1216 fflffrl.exe 98 PID 1216 wrote to memory of 2276 1216 fflffrl.exe 98 PID 2276 wrote to memory of 2996 2276 rlflxlx.exe 154 PID 2276 wrote to memory of 2996 2276 rlflxlx.exe 154 PID 2276 wrote to memory of 2996 2276 rlflxlx.exe 154 PID 2996 wrote to memory of 5004 2996 tnnhnn.exe 100 PID 2996 wrote to memory of 5004 2996 tnnhnn.exe 100 PID 2996 wrote to memory of 5004 2996 tnnhnn.exe 100 PID 5004 wrote to memory of 4864 5004 lrxrfrf.exe 101 PID 5004 wrote to memory of 4864 5004 lrxrfrf.exe 101 PID 5004 wrote to memory of 4864 5004 lrxrfrf.exe 101 PID 4864 wrote to memory of 3512 4864 nttttt.exe 102 PID 4864 wrote to memory of 3512 4864 nttttt.exe 102 PID 4864 wrote to memory of 3512 4864 nttttt.exe 102 PID 3512 wrote to memory of 3384 3512 btthbn.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe"C:\Users\Admin\AppData\Local\Temp\95a537854b0be1c3645a102df893e693de29fc0bc028cf9e9634fe8f5d3e3e5a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
\??\c:\nttnhh.exec:\nttnhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\nbhhhb.exec:\nbhhhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\llrfrfr.exec:\llrfrfr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\rfxrlfr.exec:\rfxrlfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\tbthtn.exec:\tbthtn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\htnbtn.exec:\htnbtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\vjvpv.exec:\vjvpv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\lxllrlr.exec:\lxllrlr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\nbnhtb.exec:\nbnhtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\vvvpp.exec:\vvvpp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\ppddd.exec:\ppddd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\flfrfxl.exec:\flfrfxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\rfxlxlf.exec:\rfxlxlf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\3btnbt.exec:\3btnbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
\??\c:\tttnhb.exec:\tttnhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
\??\c:\fflffrl.exec:\fflffrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\rlflxlx.exec:\rlflxlx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\tnnhnn.exec:\tnnhnn.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\lrxrfrf.exec:\lrxrfrf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\nttttt.exec:\nttttt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\btthbn.exec:\btthbn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\rlfxlxx.exec:\rlfxlxx.exe23⤵
- Executes dropped EXE
PID:3384 -
\??\c:\rlfxrlf.exec:\rlfxrlf.exe24⤵
- Executes dropped EXE
PID:696 -
\??\c:\bttnhb.exec:\bttnhb.exe25⤵
- Executes dropped EXE
PID:5116 -
\??\c:\ffffrrx.exec:\ffffrrx.exe26⤵
- Executes dropped EXE
PID:336 -
\??\c:\djjvj.exec:\djjvj.exe27⤵
- Executes dropped EXE
PID:736 -
\??\c:\bbhtht.exec:\bbhtht.exe28⤵
- Executes dropped EXE
PID:4436 -
\??\c:\hbbtnh.exec:\hbbtnh.exe29⤵
- Executes dropped EXE
PID:548 -
\??\c:\vjvpp.exec:\vjvpp.exe30⤵
- Executes dropped EXE
PID:4640 -
\??\c:\pvvjd.exec:\pvvjd.exe31⤵
- Executes dropped EXE
PID:4420 -
\??\c:\xxfxlff.exec:\xxfxlff.exe32⤵
- Executes dropped EXE
PID:1964 -
\??\c:\lrllrxl.exec:\lrllrxl.exe33⤵
- Executes dropped EXE
PID:4164 -
\??\c:\lfrfrlx.exec:\lfrfrlx.exe34⤵
- Executes dropped EXE
PID:2684 -
\??\c:\dppjj.exec:\dppjj.exe35⤵
- Executes dropped EXE
PID:232 -
\??\c:\xrlrlxf.exec:\xrlrlxf.exe36⤵
- Executes dropped EXE
PID:3472 -
\??\c:\pjpjd.exec:\pjpjd.exe37⤵
- Executes dropped EXE
PID:1756 -
\??\c:\vdvvd.exec:\vdvvd.exe38⤵
- Executes dropped EXE
PID:2420 -
\??\c:\7pdvj.exec:\7pdvj.exe39⤵
- Executes dropped EXE
PID:4540 -
\??\c:\xlrfxlf.exec:\xlrfxlf.exe40⤵
- Executes dropped EXE
PID:2076 -
\??\c:\xrxxrrl.exec:\xrxxrrl.exe41⤵
- Executes dropped EXE
PID:788 -
\??\c:\xrllfrf.exec:\xrllfrf.exe42⤵
- Executes dropped EXE
PID:3316 -
\??\c:\rfxrlxr.exec:\rfxrlxr.exe43⤵
- Executes dropped EXE
PID:396 -
\??\c:\rlxrfff.exec:\rlxrfff.exe44⤵
- Executes dropped EXE
PID:1264 -
\??\c:\9fxrrrr.exec:\9fxrrrr.exe45⤵
- Executes dropped EXE
PID:1640 -
\??\c:\fflxrfx.exec:\fflxrfx.exe46⤵
- Executes dropped EXE
PID:1564 -
\??\c:\frrlxrf.exec:\frrlxrf.exe47⤵
- Executes dropped EXE
PID:4520 -
\??\c:\rffxrrl.exec:\rffxrrl.exe48⤵
- Executes dropped EXE
PID:388 -
\??\c:\rxxlfxl.exec:\rxxlfxl.exe49⤵
- Executes dropped EXE
PID:4960 -
\??\c:\xrrlxrl.exec:\xrrlxrl.exe50⤵
- Executes dropped EXE
PID:3520 -
\??\c:\rrlxrlf.exec:\rrlxrlf.exe51⤵
- Executes dropped EXE
PID:4984 -
\??\c:\9lllffx.exec:\9lllffx.exe52⤵
- Executes dropped EXE
PID:3032 -
\??\c:\ttnnnh.exec:\ttnnnh.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132 -
\??\c:\ntbtbt.exec:\ntbtbt.exe54⤵
- Executes dropped EXE
PID:2212 -
\??\c:\fxfxrlf.exec:\fxfxrlf.exe55⤵
- Executes dropped EXE
PID:2544 -
\??\c:\nttnbb.exec:\nttnbb.exe56⤵
- Executes dropped EXE
PID:4612 -
\??\c:\bntnhb.exec:\bntnhb.exe57⤵
- Executes dropped EXE
PID:1144 -
\??\c:\tnnhtn.exec:\tnnhtn.exe58⤵
- Executes dropped EXE
PID:2612 -
\??\c:\tnbnth.exec:\tnbnth.exe59⤵
- Executes dropped EXE
PID:3240 -
\??\c:\fxflfrf.exec:\fxflfrf.exe60⤵
- Executes dropped EXE
PID:2720 -
\??\c:\xfrffff.exec:\xfrffff.exe61⤵
- Executes dropped EXE
PID:3828 -
\??\c:\rllffrr.exec:\rllffrr.exe62⤵
- Executes dropped EXE
PID:2344 -
\??\c:\7fffrrr.exec:\7fffrrr.exe63⤵
- Executes dropped EXE
PID:2028 -
\??\c:\vjdpj.exec:\vjdpj.exe64⤵
- Executes dropped EXE
PID:1064 -
\??\c:\9vvjv.exec:\9vvjv.exe65⤵
- Executes dropped EXE
PID:4804 -
\??\c:\vjvpp.exec:\vjvpp.exe66⤵PID:1956
-
\??\c:\3jpjp.exec:\3jpjp.exe67⤵PID:4912
-
\??\c:\tnnbth.exec:\tnnbth.exe68⤵PID:3424
-
\??\c:\nthbnh.exec:\nthbnh.exe69⤵PID:1460
-
\??\c:\flxlxxl.exec:\flxlxxl.exe70⤵PID:2996
-
\??\c:\flxlflf.exec:\flxlflf.exe71⤵PID:4276
-
\??\c:\xffxrlf.exec:\xffxrlf.exe72⤵PID:3864
-
\??\c:\vpvvj.exec:\vpvvj.exe73⤵PID:5052
-
\??\c:\jdvpp.exec:\jdvpp.exe74⤵PID:3368
-
\??\c:\9jvpv.exec:\9jvpv.exe75⤵PID:1928
-
\??\c:\htnbnb.exec:\htnbnb.exe76⤵PID:2740
-
\??\c:\ntnnnt.exec:\ntnnnt.exe77⤵PID:3448
-
\??\c:\lflllfl.exec:\lflllfl.exe78⤵PID:4584
-
\??\c:\5xxrlfr.exec:\5xxrlfr.exe79⤵PID:440
-
\??\c:\djdpd.exec:\djdpd.exe80⤵PID:4368
-
\??\c:\dppjv.exec:\dppjv.exe81⤵PID:2204
-
\??\c:\thnbnh.exec:\thnbnh.exe82⤵PID:3540
-
\??\c:\bnhbnb.exec:\bnhbnb.exe83⤵PID:1468
-
\??\c:\htnbtn.exec:\htnbtn.exe84⤵
- System Location Discovery: System Language Discovery
PID:1236 -
\??\c:\rrfxrll.exec:\rrfxrll.exe85⤵PID:2896
-
\??\c:\vvdpj.exec:\vvdpj.exe86⤵PID:3252
-
\??\c:\vjvdp.exec:\vjvdp.exe87⤵PID:1696
-
\??\c:\jjpjv.exec:\jjpjv.exe88⤵PID:2144
-
\??\c:\ntbhth.exec:\ntbhth.exe89⤵PID:1960
-
\??\c:\nbbtnh.exec:\nbbtnh.exe90⤵PID:4620
-
\??\c:\bhnbnb.exec:\bhnbnb.exe91⤵PID:1852
-
\??\c:\frlxlrl.exec:\frlxlrl.exe92⤵PID:2164
-
\??\c:\xllfrlx.exec:\xllfrlx.exe93⤵PID:1156
-
\??\c:\lrrfrfr.exec:\lrrfrfr.exe94⤵PID:3596
-
\??\c:\ddppv.exec:\ddppv.exe95⤵PID:3316
-
\??\c:\jpdpd.exec:\jpdpd.exe96⤵
- System Location Discovery: System Language Discovery
PID:1504 -
\??\c:\7ttnhb.exec:\7ttnhb.exe97⤵PID:4848
-
\??\c:\nhtnbn.exec:\nhtnbn.exe98⤵PID:4860
-
\??\c:\rxrlxrl.exec:\rxrlxrl.exe99⤵PID:1660
-
\??\c:\rlrlxrf.exec:\rlrlxrf.exe100⤵PID:1452
-
\??\c:\jjpjd.exec:\jjpjd.exe101⤵PID:3892
-
\??\c:\dvpjv.exec:\dvpjv.exe102⤵PID:4736
-
\??\c:\vjdpd.exec:\vjdpd.exe103⤵PID:3308
-
\??\c:\tthbbt.exec:\tthbbt.exe104⤵PID:5012
-
\??\c:\thntht.exec:\thntht.exe105⤵PID:3796
-
\??\c:\bhtnht.exec:\bhtnht.exe106⤵PID:1508
-
\??\c:\7rfxxxx.exec:\7rfxxxx.exe107⤵PID:3328
-
\??\c:\xlxxrrl.exec:\xlxxrrl.exe108⤵PID:1748
-
\??\c:\fxxxllx.exec:\fxxxllx.exe109⤵PID:1968
-
\??\c:\pvdpd.exec:\pvdpd.exe110⤵PID:2612
-
\??\c:\jjjdp.exec:\jjjdp.exe111⤵PID:4840
-
\??\c:\3htnbn.exec:\3htnbn.exe112⤵PID:1012
-
\??\c:\bbthth.exec:\bbthth.exe113⤵PID:212
-
\??\c:\hnnbnt.exec:\hnnbnt.exe114⤵PID:1276
-
\??\c:\rllfxrl.exec:\rllfxrl.exe115⤵PID:4380
-
\??\c:\lrxlfxl.exec:\lrxlfxl.exe116⤵PID:3508
-
\??\c:\rrlrllf.exec:\rrlrllf.exe117⤵PID:4244
-
\??\c:\frrfrlf.exec:\frrfrlf.exe118⤵PID:4804
-
\??\c:\pvdvv.exec:\pvdvv.exe119⤵PID:2700
-
\??\c:\djddv.exec:\djddv.exe120⤵PID:664
-
\??\c:\dpvpj.exec:\dpvpj.exe121⤵PID:1856
-
\??\c:\vvpjd.exec:\vvpjd.exe122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-