Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 02:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe
-
Size
455KB
-
MD5
4a95c4737c3d2d34c68cdbe7e841e547
-
SHA1
708ed77fef0fa022195701f9ef380b1abcfc727e
-
SHA256
b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7
-
SHA512
db0b439d24847574c9d2dca6c2c8011402d1fc3848c4924ecaf4fe02b9229668bc7b5026a6b3c84950baf4e4dc1b47fcab9dbc67aedeaf8c68aead663fcc5fe9
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRc:q7Tc2NYHUrAwfMp3CDRc
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2844-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2260-24-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1072-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2360-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3572-14-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4056-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5044-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3008-50-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1020-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/664-73-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1768-83-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3584-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2152-94-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4124-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3532-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5104-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2612-128-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4548-138-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3644-145-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4956-151-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4524-162-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1912-164-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1528-173-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4264-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3492-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4488-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4408-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2416-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4884-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1988-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3832-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4712-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4416-241-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4500-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4272-258-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3636-262-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3008-296-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2900-312-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/380-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/664-320-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/324-339-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4148-373-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3716-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3456-390-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1668-409-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2964-438-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4284-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5088-470-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2832-495-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2132-502-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3912-506-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/924-519-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3768-559-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4716-604-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4408-611-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2292-621-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3640-649-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4728-665-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2372-733-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2612-746-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4300-804-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2476-1199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4244-1422-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4848-1882-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4056 dvdvv.exe 3572 bthbbh.exe 2360 lflxxff.exe 2260 i882004.exe 1072 ffffxxx.exe 5044 86664.exe 3008 8640648.exe 780 k68824.exe 1020 thnhhh.exe 4852 e82200.exe 2124 4600404.exe 664 0644882.exe 1768 rfxfflf.exe 3584 pvdvv.exe 2152 ffxxffr.exe 4124 xflxrxl.exe 3128 dvvpd.exe 3888 24440.exe 5104 hhhbbh.exe 3532 88602.exe 2612 hnhthn.exe 2924 3rllrxx.exe 4548 468882.exe 3644 262604.exe 4956 dpjdv.exe 3948 tbnntt.exe 1912 422408.exe 4524 hnbhhh.exe 1528 nbhtbn.exe 4264 bbhbbn.exe 3492 bttbtn.exe 3200 xrxfllr.exe 4488 9bttnt.exe 4408 7btnbb.exe 2416 e84044.exe 4828 fxxrlrx.exe 4308 462266.exe 4184 vpvjp.exe 4204 8266060.exe 4884 jpjpp.exe 1988 jpvvv.exe 3832 04486.exe 4612 8208684.exe 4712 42600.exe 3148 lfxxrff.exe 2660 jdjdd.exe 4416 666602.exe 4500 6840004.exe 3612 bhtnhb.exe 4744 86882.exe 4268 3nbbbh.exe 4272 g2482.exe 3636 464044.exe 2420 44064.exe 2308 s2888.exe 3308 1hntnb.exe 1448 8866660.exe 3660 hntnth.exe 4532 62264.exe 4924 244420.exe 2412 xfrrxlf.exe 3704 02488.exe 728 pddvj.exe 3008 02044.exe -
resource yara_rule behavioral2/memory/2844-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2360-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2260-24-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1072-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2360-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3572-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4056-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5044-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3008-44-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3008-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1020-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/664-73-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1768-83-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3584-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2152-94-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4124-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3532-118-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5104-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2612-128-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4548-138-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3644-145-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4956-151-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4524-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1912-164-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1528-173-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4264-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3492-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4488-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4408-196-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2416-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4884-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3832-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4712-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4416-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4272-258-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3636-262-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3008-296-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2900-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/380-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/664-320-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/324-339-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4148-373-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3716-383-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3456-390-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1668-409-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2964-438-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4284-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5088-470-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2832-495-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-502-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3912-506-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/924-519-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3768-559-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4240-575-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4764-581-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4716-604-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4408-611-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2292-621-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3640-649-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4728-665-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1464-669-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-733-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6848200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rxlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2688222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 840482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0842086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0004826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q80488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e06664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 4056 2844 b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe 84 PID 2844 wrote to memory of 4056 2844 b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe 84 PID 2844 wrote to memory of 4056 2844 b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe 84 PID 4056 wrote to memory of 3572 4056 dvdvv.exe 85 PID 4056 wrote to memory of 3572 4056 dvdvv.exe 85 PID 4056 wrote to memory of 3572 4056 dvdvv.exe 85 PID 3572 wrote to memory of 2360 3572 bthbbh.exe 86 PID 3572 wrote to memory of 2360 3572 bthbbh.exe 86 PID 3572 wrote to memory of 2360 3572 bthbbh.exe 86 PID 2360 wrote to memory of 2260 2360 lflxxff.exe 87 PID 2360 wrote to memory of 2260 2360 lflxxff.exe 87 PID 2360 wrote to memory of 2260 2360 lflxxff.exe 87 PID 2260 wrote to memory of 1072 2260 i882004.exe 88 PID 2260 wrote to memory of 1072 2260 i882004.exe 88 PID 2260 wrote to memory of 1072 2260 i882004.exe 88 PID 1072 wrote to memory of 5044 1072 ffffxxx.exe 89 PID 1072 wrote to memory of 5044 1072 ffffxxx.exe 89 PID 1072 wrote to memory of 5044 1072 ffffxxx.exe 89 PID 5044 wrote to memory of 3008 5044 86664.exe 90 PID 5044 wrote to memory of 3008 5044 86664.exe 90 PID 5044 wrote to memory of 3008 5044 86664.exe 90 PID 3008 wrote to memory of 780 3008 8640648.exe 91 PID 3008 wrote to memory of 780 3008 8640648.exe 91 PID 3008 wrote to memory of 780 3008 8640648.exe 91 PID 780 wrote to memory of 1020 780 k68824.exe 92 PID 780 wrote to memory of 1020 780 k68824.exe 92 PID 780 wrote to memory of 1020 780 k68824.exe 92 PID 1020 wrote to memory of 4852 1020 thnhhh.exe 93 PID 1020 wrote to memory of 4852 1020 thnhhh.exe 93 PID 1020 wrote to memory of 4852 1020 thnhhh.exe 93 PID 4852 wrote to memory of 2124 4852 e82200.exe 94 PID 4852 wrote to memory of 2124 4852 e82200.exe 94 PID 4852 wrote to memory of 2124 4852 e82200.exe 94 PID 2124 wrote to memory of 664 2124 4600404.exe 95 PID 2124 wrote to memory of 664 2124 4600404.exe 95 PID 2124 wrote to memory of 664 2124 4600404.exe 95 PID 664 wrote to memory of 1768 664 0644882.exe 96 PID 664 wrote to memory of 1768 664 0644882.exe 96 PID 664 wrote to memory of 1768 664 0644882.exe 96 PID 1768 wrote to memory of 3584 1768 rfxfflf.exe 97 PID 1768 wrote to memory of 3584 1768 rfxfflf.exe 97 PID 1768 wrote to memory of 3584 1768 rfxfflf.exe 97 PID 3584 wrote to memory of 2152 3584 pvdvv.exe 98 PID 3584 wrote to memory of 2152 3584 pvdvv.exe 98 PID 3584 wrote to memory of 2152 3584 pvdvv.exe 98 PID 2152 wrote to memory of 4124 2152 ffxxffr.exe 99 PID 2152 wrote to memory of 4124 2152 ffxxffr.exe 99 PID 2152 wrote to memory of 4124 2152 ffxxffr.exe 99 PID 4124 wrote to memory of 3128 4124 xflxrxl.exe 100 PID 4124 wrote to memory of 3128 4124 xflxrxl.exe 100 PID 4124 wrote to memory of 3128 4124 xflxrxl.exe 100 PID 3128 wrote to memory of 3888 3128 dvvpd.exe 101 PID 3128 wrote to memory of 3888 3128 dvvpd.exe 101 PID 3128 wrote to memory of 3888 3128 dvvpd.exe 101 PID 3888 wrote to memory of 5104 3888 24440.exe 102 PID 3888 wrote to memory of 5104 3888 24440.exe 102 PID 3888 wrote to memory of 5104 3888 24440.exe 102 PID 5104 wrote to memory of 3532 5104 hhhbbh.exe 103 PID 5104 wrote to memory of 3532 5104 hhhbbh.exe 103 PID 5104 wrote to memory of 3532 5104 hhhbbh.exe 103 PID 3532 wrote to memory of 2612 3532 88602.exe 104 PID 3532 wrote to memory of 2612 3532 88602.exe 104 PID 3532 wrote to memory of 2612 3532 88602.exe 104 PID 2612 wrote to memory of 2924 2612 hnhthn.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe"C:\Users\Admin\AppData\Local\Temp\b821c56b74ed9acf592fc3251047cbbb3f4ca737835f17cd1ec6e6b92ef675f7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\dvdvv.exec:\dvdvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\bthbbh.exec:\bthbbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\lflxxff.exec:\lflxxff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\i882004.exec:\i882004.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\ffffxxx.exec:\ffffxxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\86664.exec:\86664.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\8640648.exec:\8640648.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\k68824.exec:\k68824.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
\??\c:\thnhhh.exec:\thnhhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\e82200.exec:\e82200.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\4600404.exec:\4600404.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\0644882.exec:\0644882.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
\??\c:\rfxfflf.exec:\rfxfflf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\pvdvv.exec:\pvdvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
\??\c:\ffxxffr.exec:\ffxxffr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\xflxrxl.exec:\xflxrxl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
\??\c:\dvvpd.exec:\dvvpd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
\??\c:\24440.exec:\24440.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
\??\c:\hhhbbh.exec:\hhhbbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\88602.exec:\88602.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\hnhthn.exec:\hnhthn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\3rllrxx.exec:\3rllrxx.exe23⤵
- Executes dropped EXE
PID:2924 -
\??\c:\468882.exec:\468882.exe24⤵
- Executes dropped EXE
PID:4548 -
\??\c:\262604.exec:\262604.exe25⤵
- Executes dropped EXE
PID:3644 -
\??\c:\dpjdv.exec:\dpjdv.exe26⤵
- Executes dropped EXE
PID:4956 -
\??\c:\tbnntt.exec:\tbnntt.exe27⤵
- Executes dropped EXE
PID:3948 -
\??\c:\422408.exec:\422408.exe28⤵
- Executes dropped EXE
PID:1912 -
\??\c:\hnbhhh.exec:\hnbhhh.exe29⤵
- Executes dropped EXE
PID:4524 -
\??\c:\nbhtbn.exec:\nbhtbn.exe30⤵
- Executes dropped EXE
PID:1528 -
\??\c:\bbhbbn.exec:\bbhbbn.exe31⤵
- Executes dropped EXE
PID:4264 -
\??\c:\bttbtn.exec:\bttbtn.exe32⤵
- Executes dropped EXE
PID:3492 -
\??\c:\xrxfllr.exec:\xrxfllr.exe33⤵
- Executes dropped EXE
PID:3200 -
\??\c:\9bttnt.exec:\9bttnt.exe34⤵
- Executes dropped EXE
PID:4488 -
\??\c:\7btnbb.exec:\7btnbb.exe35⤵
- Executes dropped EXE
PID:4408 -
\??\c:\e84044.exec:\e84044.exe36⤵
- Executes dropped EXE
PID:2416 -
\??\c:\fxxrlrx.exec:\fxxrlrx.exe37⤵
- Executes dropped EXE
PID:4828 -
\??\c:\462266.exec:\462266.exe38⤵
- Executes dropped EXE
PID:4308 -
\??\c:\vpvjp.exec:\vpvjp.exe39⤵
- Executes dropped EXE
PID:4184 -
\??\c:\8266060.exec:\8266060.exe40⤵
- Executes dropped EXE
PID:4204 -
\??\c:\jpjpp.exec:\jpjpp.exe41⤵
- Executes dropped EXE
PID:4884 -
\??\c:\jpvvv.exec:\jpvvv.exe42⤵
- Executes dropped EXE
PID:1988 -
\??\c:\04486.exec:\04486.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3832 -
\??\c:\8208684.exec:\8208684.exe44⤵
- Executes dropped EXE
PID:4612 -
\??\c:\42600.exec:\42600.exe45⤵
- Executes dropped EXE
PID:4712 -
\??\c:\lfxxrff.exec:\lfxxrff.exe46⤵
- Executes dropped EXE
PID:3148 -
\??\c:\jdjdd.exec:\jdjdd.exe47⤵
- Executes dropped EXE
PID:2660 -
\??\c:\666602.exec:\666602.exe48⤵
- Executes dropped EXE
PID:4416 -
\??\c:\6840004.exec:\6840004.exe49⤵
- Executes dropped EXE
PID:4500 -
\??\c:\bhtnhb.exec:\bhtnhb.exe50⤵
- Executes dropped EXE
PID:3612 -
\??\c:\86882.exec:\86882.exe51⤵
- Executes dropped EXE
PID:4744 -
\??\c:\3nbbbh.exec:\3nbbbh.exe52⤵
- Executes dropped EXE
PID:4268 -
\??\c:\g2482.exec:\g2482.exe53⤵
- Executes dropped EXE
PID:4272 -
\??\c:\464044.exec:\464044.exe54⤵
- Executes dropped EXE
PID:3636 -
\??\c:\44064.exec:\44064.exe55⤵
- Executes dropped EXE
PID:2420 -
\??\c:\s2888.exec:\s2888.exe56⤵
- Executes dropped EXE
PID:2308 -
\??\c:\1hntnb.exec:\1hntnb.exe57⤵
- Executes dropped EXE
PID:3308 -
\??\c:\8866660.exec:\8866660.exe58⤵
- Executes dropped EXE
PID:1448 -
\??\c:\hntnth.exec:\hntnth.exe59⤵
- Executes dropped EXE
PID:3660 -
\??\c:\62264.exec:\62264.exe60⤵
- Executes dropped EXE
PID:4532 -
\??\c:\244420.exec:\244420.exe61⤵
- Executes dropped EXE
PID:4924 -
\??\c:\xfrrxlf.exec:\xfrrxlf.exe62⤵
- Executes dropped EXE
PID:2412 -
\??\c:\02488.exec:\02488.exe63⤵
- Executes dropped EXE
PID:3704 -
\??\c:\pddvj.exec:\pddvj.exe64⤵
- Executes dropped EXE
PID:728 -
\??\c:\02044.exec:\02044.exe65⤵
- Executes dropped EXE
PID:3008 -
\??\c:\jjpdd.exec:\jjpdd.exe66⤵PID:4136
-
\??\c:\a0248.exec:\a0248.exe67⤵PID:4552
-
\??\c:\xlrxfff.exec:\xlrxfff.exe68⤵PID:4008
-
\??\c:\3ffxxxx.exec:\3ffxxxx.exe69⤵PID:924
-
\??\c:\pvppv.exec:\pvppv.exe70⤵PID:2900
-
\??\c:\2406026.exec:\2406026.exe71⤵PID:380
-
\??\c:\bhtbnt.exec:\bhtbnt.exe72⤵PID:664
-
\??\c:\462086.exec:\462086.exe73⤵PID:1768
-
\??\c:\tthbhb.exec:\tthbhb.exe74⤵PID:2404
-
\??\c:\684428.exec:\684428.exe75⤵PID:3216
-
\??\c:\dddvp.exec:\dddvp.exe76⤵PID:3840
-
\??\c:\48264.exec:\48264.exe77⤵PID:4984
-
\??\c:\s2288.exec:\s2288.exe78⤵PID:324
-
\??\c:\ffxrllf.exec:\ffxrllf.exe79⤵PID:3760
-
\??\c:\8466488.exec:\8466488.exe80⤵PID:2264
-
\??\c:\g2482.exec:\g2482.exe81⤵PID:3960
-
\??\c:\vjpdp.exec:\vjpdp.exe82⤵PID:880
-
\??\c:\042202.exec:\042202.exe83⤵PID:2612
-
\??\c:\5rxlfff.exec:\5rxlfff.exe84⤵
- System Location Discovery: System Language Discovery
PID:884 -
\??\c:\2000886.exec:\2000886.exe85⤵PID:2568
-
\??\c:\jddvp.exec:\jddvp.exe86⤵PID:1952
-
\??\c:\88882.exec:\88882.exe87⤵PID:4384
-
\??\c:\5lxxllx.exec:\5lxxllx.exe88⤵PID:620
-
\??\c:\nhtbnb.exec:\nhtbnb.exe89⤵PID:4148
-
\??\c:\486868.exec:\486868.exe90⤵PID:2880
-
\??\c:\vvddv.exec:\vvddv.exe91⤵PID:672
-
\??\c:\4604488.exec:\4604488.exe92⤵PID:3716
-
\??\c:\o662060.exec:\o662060.exe93⤵PID:4244
-
\??\c:\480622.exec:\480622.exe94⤵PID:3456
-
\??\c:\vvvpp.exec:\vvvpp.exe95⤵PID:4292
-
\??\c:\44802.exec:\44802.exe96⤵PID:2508
-
\??\c:\btnbtb.exec:\btnbtb.exe97⤵PID:4716
-
\??\c:\dddvv.exec:\dddvv.exe98⤵PID:3200
-
\??\c:\a2482.exec:\a2482.exe99⤵PID:1664
-
\??\c:\q28222.exec:\q28222.exe100⤵PID:1668
-
\??\c:\0840044.exec:\0840044.exe101⤵PID:2416
-
\??\c:\dpjpv.exec:\dpjpv.exe102⤵PID:436
-
\??\c:\68440.exec:\68440.exe103⤵PID:3180
-
\??\c:\jdpjp.exec:\jdpjp.exe104⤵
- System Location Discovery: System Language Discovery
PID:1524 -
\??\c:\bbbhbh.exec:\bbbhbh.exe105⤵PID:1736
-
\??\c:\xllffxf.exec:\xllffxf.exe106⤵PID:2700
-
\??\c:\rrfxxfx.exec:\rrfxxfx.exe107⤵PID:2804
-
\??\c:\8482626.exec:\8482626.exe108⤵PID:4052
-
\??\c:\tthbbh.exec:\tthbbh.exe109⤵PID:2964
-
\??\c:\6888888.exec:\6888888.exe110⤵PID:764
-
\??\c:\488000.exec:\488000.exe111⤵PID:4808
-
\??\c:\dppjj.exec:\dppjj.exe112⤵PID:2428
-
\??\c:\lrrrxfl.exec:\lrrrxfl.exe113⤵PID:1220
-
\??\c:\rlrlfxr.exec:\rlrlfxr.exe114⤵PID:4500
-
\??\c:\fxxffrr.exec:\fxxffrr.exe115⤵PID:4740
-
\??\c:\9ddvp.exec:\9ddvp.exe116⤵PID:4284
-
\??\c:\vvpjj.exec:\vvpjj.exe117⤵PID:1424
-
\??\c:\pvjpp.exec:\pvjpp.exe118⤵PID:4880
-
\??\c:\ppjdv.exec:\ppjdv.exe119⤵PID:5088
-
\??\c:\ttnhnn.exec:\ttnhnn.exe120⤵PID:4084
-
\??\c:\24604.exec:\24604.exe121⤵PID:3912
-
\??\c:\8804488.exec:\8804488.exe122⤵PID:3748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-