Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:52
Behavioral task
behavioral1
Sample
c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe
-
Size
3.7MB
-
MD5
c7953e04fb00f0f42568fb2a203e7d60
-
SHA1
3da5a5395db02005d26ae80aa3daa920930c78b8
-
SHA256
c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448
-
SHA512
7ae19e93f97ffb9587fb8a54c99dc6f4081d7f3b4f5dd3895e937dca2fa9cf884a6d6dc029ee9949ac6af6f077e16d94097d857aec3280365dde05b2a70a4cc4
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98d:U6XLq/qPPslzKx/dJg1ErmNQ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 54 IoCs
resource yara_rule behavioral1/memory/3024-0-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2636-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2672-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2740-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2576-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2808-50-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2808-56-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2592-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1812-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2940-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/700-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/764-123-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1324-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2788-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2788-142-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1344-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2428-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2196-185-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2196-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/884-195-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/408-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2496-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2144-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1304-255-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1804-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/988-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2184-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2648-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2800-336-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/768-373-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-380-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2424-388-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-391-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2356-426-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1980-439-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1952-446-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2408-465-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/656-479-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/408-498-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/656-506-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/964-505-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1684-514-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/588-551-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1996-558-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1180-608-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2384-616-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/272-667-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1628-687-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1632-761-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1744-807-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2808-915-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-996-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2268-1027-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1208-1089-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2636 fxxlxfl.exe 2672 llfrlll.exe 2740 fxlrrxl.exe 2576 ntthbh.exe 2808 bthhnn.exe 2608 lxlrlfr.exe 2592 fxlrrxf.exe 1812 nnnbnt.exe 2940 nhbnbt.exe 2232 lffrrrx.exe 700 7xxrfrx.exe 764 pvvdj.exe 1324 rlrxffl.exe 2788 xllxlrl.exe 1344 llflllx.exe 1508 7jvdj.exe 1076 xrffxlr.exe 2428 jjjjp.exe 2196 vpvpp.exe 884 dpdpp.exe 408 dpjpd.exe 2496 9hnbhb.exe 2144 jpjvv.exe 928 5dvjv.exe 1992 vvvvj.exe 2148 bnbthb.exe 1304 ffxllrf.exe 1804 fxlxxfl.exe 2504 tbthhh.exe 988 bbbthb.exe 1988 bbtnth.exe 2320 lxrxrrf.exe 2184 vppjv.exe 2648 jjjvp.exe 2884 ddpvj.exe 2212 hbhnht.exe 2800 tnhhth.exe 2816 hbtbtb.exe 2552 fxlfrrx.exe 2480 xrrrrxl.exe 2968 lfxfrrx.exe 768 3vpdv.exe 2856 ttnthh.exe 1060 nhtthn.exe 2424 lfrrflr.exe 1400 jvdjp.exe 1628 ddjjj.exe 1692 nhhnbh.exe 1788 5rffllx.exe 2356 9fflrxf.exe 2612 jjdjv.exe 1980 hbnnbb.exe 1952 hbhhnn.exe 2520 1lxlrrl.exe 2412 lxrrrxl.exe 2128 jvjvj.exe 2408 ppdvj.exe 2328 tnbtnh.exe 656 9tnhnt.exe 1088 3xfflxf.exe 408 5dpdp.exe 964 djpvd.exe 1684 hbhhnb.exe 568 bnbbhb.exe -
resource yara_rule behavioral1/memory/3024-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3024-3-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x000e0000000162b2-6.dat upx behavioral1/memory/2636-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016cc8-17.dat upx behavioral1/memory/2672-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016cec-28.dat upx behavioral1/memory/2740-33-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0007000000016d06-39.dat upx behavioral1/memory/2740-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2576-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000c000000016c3a-48.dat upx behavioral1/memory/2808-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016d0e-58.dat upx behavioral1/files/0x000a000000016d18-67.dat upx behavioral1/memory/2592-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000017079-77.dat upx behavioral1/memory/1812-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00060000000171a8-84.dat upx behavioral1/files/0x00060000000173a7-96.dat upx behavioral1/memory/2940-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00060000000173a9-104.dat upx behavioral1/memory/700-106-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017488-113.dat upx behavioral1/memory/764-123-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1324-126-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2940-125-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0006000000017492-121.dat upx behavioral1/files/0x00060000000174cc-135.dat upx behavioral1/memory/2788-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000d000000018676-146.dat upx behavioral1/files/0x0005000000018683-156.dat upx behavioral1/memory/1344-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186e4-162.dat upx behavioral1/files/0x00050000000186ea-171.dat upx behavioral1/files/0x0004000000004ed7-181.dat upx behavioral1/memory/2428-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186ee-191.dat upx behavioral1/memory/2196-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186fd-200.dat upx behavioral1/files/0x0005000000018728-210.dat upx behavioral1/memory/408-208-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2496-218-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001873d-219.dat upx behavioral1/memory/2144-221-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018784-228.dat upx behavioral1/files/0x000500000001878f-237.dat upx behavioral1/files/0x00050000000187a5-245.dat upx behavioral1/files/0x0006000000019023-253.dat upx behavioral1/memory/1304-255-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001925e-263.dat upx behavioral1/files/0x0005000000019261-272.dat upx behavioral1/memory/1804-271-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019282-280.dat upx behavioral1/memory/988-288-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019334-290.dat upx behavioral1/files/0x0005000000019350-298.dat upx behavioral1/memory/2184-313-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2648-322-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2800-336-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/768-373-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2856-380-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/2968-387-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/2424-388-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrfxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxllflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rrxfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rrxrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3thbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xrxlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ffxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrfrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxllxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5frxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1thnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llflllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rfflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdjv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2636 3024 c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe 31 PID 3024 wrote to memory of 2636 3024 c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe 31 PID 3024 wrote to memory of 2636 3024 c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe 31 PID 3024 wrote to memory of 2636 3024 c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe 31 PID 2636 wrote to memory of 2672 2636 fxxlxfl.exe 32 PID 2636 wrote to memory of 2672 2636 fxxlxfl.exe 32 PID 2636 wrote to memory of 2672 2636 fxxlxfl.exe 32 PID 2636 wrote to memory of 2672 2636 fxxlxfl.exe 32 PID 2672 wrote to memory of 2740 2672 llfrlll.exe 33 PID 2672 wrote to memory of 2740 2672 llfrlll.exe 33 PID 2672 wrote to memory of 2740 2672 llfrlll.exe 33 PID 2672 wrote to memory of 2740 2672 llfrlll.exe 33 PID 2740 wrote to memory of 2576 2740 fxlrrxl.exe 34 PID 2740 wrote to memory of 2576 2740 fxlrrxl.exe 34 PID 2740 wrote to memory of 2576 2740 fxlrrxl.exe 34 PID 2740 wrote to memory of 2576 2740 fxlrrxl.exe 34 PID 2576 wrote to memory of 2808 2576 ntthbh.exe 35 PID 2576 wrote to memory of 2808 2576 ntthbh.exe 35 PID 2576 wrote to memory of 2808 2576 ntthbh.exe 35 PID 2576 wrote to memory of 2808 2576 ntthbh.exe 35 PID 2808 wrote to memory of 2608 2808 bthhnn.exe 36 PID 2808 wrote to memory of 2608 2808 bthhnn.exe 36 PID 2808 wrote to memory of 2608 2808 bthhnn.exe 36 PID 2808 wrote to memory of 2608 2808 bthhnn.exe 36 PID 2608 wrote to memory of 2592 2608 lxlrlfr.exe 37 PID 2608 wrote to memory of 2592 2608 lxlrlfr.exe 37 PID 2608 wrote to memory of 2592 2608 lxlrlfr.exe 37 PID 2608 wrote to memory of 2592 2608 lxlrlfr.exe 37 PID 2592 wrote to memory of 1812 2592 fxlrrxf.exe 38 PID 2592 wrote to memory of 1812 2592 fxlrrxf.exe 38 PID 2592 wrote to memory of 1812 2592 fxlrrxf.exe 38 PID 2592 wrote to memory of 1812 2592 fxlrrxf.exe 38 PID 1812 wrote to memory of 2940 1812 nnnbnt.exe 39 PID 1812 wrote to memory of 2940 1812 nnnbnt.exe 39 PID 1812 wrote to memory of 2940 1812 nnnbnt.exe 39 PID 1812 wrote to memory of 2940 1812 nnnbnt.exe 39 PID 2940 wrote to memory of 2232 2940 nhbnbt.exe 40 PID 2940 wrote to memory of 2232 2940 nhbnbt.exe 40 PID 2940 wrote to memory of 2232 2940 nhbnbt.exe 40 PID 2940 wrote to memory of 2232 2940 nhbnbt.exe 40 PID 2232 wrote to memory of 700 2232 lffrrrx.exe 41 PID 2232 wrote to memory of 700 2232 lffrrrx.exe 41 PID 2232 wrote to memory of 700 2232 lffrrrx.exe 41 PID 2232 wrote to memory of 700 2232 lffrrrx.exe 41 PID 700 wrote to memory of 764 700 7xxrfrx.exe 42 PID 700 wrote to memory of 764 700 7xxrfrx.exe 42 PID 700 wrote to memory of 764 700 7xxrfrx.exe 42 PID 700 wrote to memory of 764 700 7xxrfrx.exe 42 PID 764 wrote to memory of 1324 764 pvvdj.exe 43 PID 764 wrote to memory of 1324 764 pvvdj.exe 43 PID 764 wrote to memory of 1324 764 pvvdj.exe 43 PID 764 wrote to memory of 1324 764 pvvdj.exe 43 PID 1324 wrote to memory of 2788 1324 rlrxffl.exe 44 PID 1324 wrote to memory of 2788 1324 rlrxffl.exe 44 PID 1324 wrote to memory of 2788 1324 rlrxffl.exe 44 PID 1324 wrote to memory of 2788 1324 rlrxffl.exe 44 PID 2788 wrote to memory of 1344 2788 xllxlrl.exe 45 PID 2788 wrote to memory of 1344 2788 xllxlrl.exe 45 PID 2788 wrote to memory of 1344 2788 xllxlrl.exe 45 PID 2788 wrote to memory of 1344 2788 xllxlrl.exe 45 PID 1344 wrote to memory of 1508 1344 llflllx.exe 46 PID 1344 wrote to memory of 1508 1344 llflllx.exe 46 PID 1344 wrote to memory of 1508 1344 llflllx.exe 46 PID 1344 wrote to memory of 1508 1344 llflllx.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe"C:\Users\Admin\AppData\Local\Temp\c310f2a65fa807c9ce8f8f265f5c714daa951d149db9b3de3fbab124e51b2448N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\fxxlxfl.exec:\fxxlxfl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\llfrlll.exec:\llfrlll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\fxlrrxl.exec:\fxlrrxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\ntthbh.exec:\ntthbh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\bthhnn.exec:\bthhnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\lxlrlfr.exec:\lxlrlfr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\fxlrrxf.exec:\fxlrrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\nnnbnt.exec:\nnnbnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\nhbnbt.exec:\nhbnbt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\lffrrrx.exec:\lffrrrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\7xxrfrx.exec:\7xxrfrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
\??\c:\pvvdj.exec:\pvvdj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\rlrxffl.exec:\rlrxffl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\xllxlrl.exec:\xllxlrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\llflllx.exec:\llflllx.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\7jvdj.exec:\7jvdj.exe17⤵
- Executes dropped EXE
PID:1508 -
\??\c:\xrffxlr.exec:\xrffxlr.exe18⤵
- Executes dropped EXE
PID:1076 -
\??\c:\jjjjp.exec:\jjjjp.exe19⤵
- Executes dropped EXE
PID:2428 -
\??\c:\vpvpp.exec:\vpvpp.exe20⤵
- Executes dropped EXE
PID:2196 -
\??\c:\dpdpp.exec:\dpdpp.exe21⤵
- Executes dropped EXE
PID:884 -
\??\c:\dpjpd.exec:\dpjpd.exe22⤵
- Executes dropped EXE
PID:408 -
\??\c:\9hnbhb.exec:\9hnbhb.exe23⤵
- Executes dropped EXE
PID:2496 -
\??\c:\jpjvv.exec:\jpjvv.exe24⤵
- Executes dropped EXE
PID:2144 -
\??\c:\5dvjv.exec:\5dvjv.exe25⤵
- Executes dropped EXE
PID:928 -
\??\c:\vvvvj.exec:\vvvvj.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992 -
\??\c:\bnbthb.exec:\bnbthb.exe27⤵
- Executes dropped EXE
PID:2148 -
\??\c:\ffxllrf.exec:\ffxllrf.exe28⤵
- Executes dropped EXE
PID:1304 -
\??\c:\fxlxxfl.exec:\fxlxxfl.exe29⤵
- Executes dropped EXE
PID:1804 -
\??\c:\tbthhh.exec:\tbthhh.exe30⤵
- Executes dropped EXE
PID:2504 -
\??\c:\bbbthb.exec:\bbbthb.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:988 -
\??\c:\bbtnth.exec:\bbtnth.exe32⤵
- Executes dropped EXE
PID:1988 -
\??\c:\lxrxrrf.exec:\lxrxrrf.exe33⤵
- Executes dropped EXE
PID:2320 -
\??\c:\vppjv.exec:\vppjv.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184 -
\??\c:\jjjvp.exec:\jjjvp.exe35⤵
- Executes dropped EXE
PID:2648 -
\??\c:\ddpvj.exec:\ddpvj.exe36⤵
- Executes dropped EXE
PID:2884 -
\??\c:\hbhnht.exec:\hbhnht.exe37⤵
- Executes dropped EXE
PID:2212 -
\??\c:\tnhhth.exec:\tnhhth.exe38⤵
- Executes dropped EXE
PID:2800 -
\??\c:\hbtbtb.exec:\hbtbtb.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816 -
\??\c:\fxlfrrx.exec:\fxlfrrx.exe40⤵
- Executes dropped EXE
PID:2552 -
\??\c:\xrrrrxl.exec:\xrrrrxl.exe41⤵
- Executes dropped EXE
PID:2480 -
\??\c:\lfxfrrx.exec:\lfxfrrx.exe42⤵
- Executes dropped EXE
PID:2968 -
\??\c:\3vpdv.exec:\3vpdv.exe43⤵
- Executes dropped EXE
PID:768 -
\??\c:\ttnthh.exec:\ttnthh.exe44⤵
- Executes dropped EXE
PID:2856 -
\??\c:\nhtthn.exec:\nhtthn.exe45⤵
- Executes dropped EXE
PID:1060 -
\??\c:\lfrrflr.exec:\lfrrflr.exe46⤵
- Executes dropped EXE
PID:2424 -
\??\c:\jvdjp.exec:\jvdjp.exe47⤵
- Executes dropped EXE
PID:1400 -
\??\c:\ddjjj.exec:\ddjjj.exe48⤵
- Executes dropped EXE
PID:1628 -
\??\c:\nhhnbh.exec:\nhhnbh.exe49⤵
- Executes dropped EXE
PID:1692 -
\??\c:\5rffllx.exec:\5rffllx.exe50⤵
- Executes dropped EXE
PID:1788 -
\??\c:\9fflrxf.exec:\9fflrxf.exe51⤵
- Executes dropped EXE
PID:2356 -
\??\c:\jjdjv.exec:\jjdjv.exe52⤵
- Executes dropped EXE
PID:2612 -
\??\c:\hbnnbb.exec:\hbnnbb.exe53⤵
- Executes dropped EXE
PID:1980 -
\??\c:\hbhhnn.exec:\hbhhnn.exe54⤵
- Executes dropped EXE
PID:1952 -
\??\c:\1lxlrrl.exec:\1lxlrrl.exe55⤵
- Executes dropped EXE
PID:2520 -
\??\c:\lxrrrxl.exec:\lxrrrxl.exe56⤵
- Executes dropped EXE
PID:2412 -
\??\c:\jvjvj.exec:\jvjvj.exe57⤵
- Executes dropped EXE
PID:2128 -
\??\c:\ppdvj.exec:\ppdvj.exe58⤵
- Executes dropped EXE
PID:2408 -
\??\c:\tnbtnh.exec:\tnbtnh.exe59⤵
- Executes dropped EXE
PID:2328 -
\??\c:\9tnhnt.exec:\9tnhnt.exe60⤵
- Executes dropped EXE
PID:656 -
\??\c:\3xfflxf.exec:\3xfflxf.exe61⤵
- Executes dropped EXE
PID:1088 -
\??\c:\5dpdp.exec:\5dpdp.exe62⤵
- Executes dropped EXE
PID:408 -
\??\c:\djpvd.exec:\djpvd.exe63⤵
- Executes dropped EXE
PID:964 -
\??\c:\hbhhnb.exec:\hbhhnb.exe64⤵
- Executes dropped EXE
PID:1684 -
\??\c:\bnbbhb.exec:\bnbbhb.exe65⤵
- Executes dropped EXE
PID:568 -
\??\c:\thtbnh.exec:\thtbnh.exe66⤵PID:2304
-
\??\c:\3lfxxrx.exec:\3lfxxrx.exe67⤵PID:2060
-
\??\c:\pdpdp.exec:\pdpdp.exe68⤵PID:1492
-
\??\c:\jddjj.exec:\jddjj.exe69⤵PID:1672
-
\??\c:\7nbtbb.exec:\7nbtbb.exe70⤵PID:588
-
\??\c:\bnhntb.exec:\bnhntb.exe71⤵PID:2096
-
\??\c:\3xlrxrf.exec:\3xlrxrf.exe72⤵PID:1996
-
\??\c:\3jvvv.exec:\3jvvv.exe73⤵PID:1504
-
\??\c:\hbttbb.exec:\hbttbb.exe74⤵
- System Location Discovery: System Language Discovery
PID:2624 -
\??\c:\htnntn.exec:\htnntn.exe75⤵PID:1576
-
\??\c:\xxllxfx.exec:\xxllxfx.exe76⤵PID:1180
-
\??\c:\vjvvd.exec:\vjvvd.exe77⤵PID:1580
-
\??\c:\thnbhn.exec:\thnbhn.exe78⤵PID:2756
-
\??\c:\rfrlllx.exec:\rfrlllx.exe79⤵PID:2700
-
\??\c:\9frxxff.exec:\9frxxff.exe80⤵PID:2384
-
\??\c:\vjpdp.exec:\vjpdp.exe81⤵PID:2212
-
\??\c:\9tbtbb.exec:\9tbtbb.exe82⤵PID:2596
-
\??\c:\hhbtth.exec:\hhbtth.exe83⤵PID:292
-
\??\c:\frflrlr.exec:\frflrlr.exe84⤵PID:2556
-
\??\c:\3dpvd.exec:\3dpvd.exe85⤵PID:2044
-
\??\c:\djddj.exec:\djddj.exe86⤵PID:2604
-
\??\c:\hbnhth.exec:\hbnhth.exe87⤵PID:1972
-
\??\c:\xllrflf.exec:\xllrflf.exe88⤵PID:272
-
\??\c:\pjdjd.exec:\pjdjd.exe89⤵PID:2368
-
\??\c:\xflxrfx.exec:\xflxrfx.exe90⤵PID:2136
-
\??\c:\dvdjj.exec:\dvdjj.exe91⤵PID:1948
-
\??\c:\ttnnbh.exec:\ttnnbh.exe92⤵PID:1628
-
\??\c:\htbbbt.exec:\htbbbt.exe93⤵PID:1692
-
\??\c:\frxflll.exec:\frxflll.exe94⤵PID:1788
-
\??\c:\vjvvv.exec:\vjvvv.exe95⤵
- System Location Discovery: System Language Discovery
PID:2788 -
\??\c:\nhnnnt.exec:\nhnnnt.exe96⤵PID:536
-
\??\c:\hbnnhn.exec:\hbnnhn.exe97⤵PID:1980
-
\??\c:\fxllrxf.exec:\fxllrxf.exe98⤵PID:1952
-
\??\c:\3pvpj.exec:\3pvpj.exe99⤵PID:1624
-
\??\c:\bttnnn.exec:\bttnnn.exe100⤵PID:2220
-
\??\c:\hbnttb.exec:\hbnttb.exe101⤵PID:2128
-
\??\c:\rrrflrf.exec:\rrrflrf.exe102⤵PID:2900
-
\??\c:\dvjjp.exec:\dvjjp.exe103⤵PID:1632
-
\??\c:\5hbhtt.exec:\5hbhtt.exe104⤵
- System Location Discovery: System Language Discovery
PID:2240 -
\??\c:\xrflxxl.exec:\xrflxxl.exe105⤵PID:1132
-
\??\c:\xrflrxl.exec:\xrflrxl.exe106⤵PID:1956
-
\??\c:\vjpvd.exec:\vjpvd.exe107⤵PID:300
-
\??\c:\tntbhn.exec:\tntbhn.exe108⤵PID:2020
-
\??\c:\fxrxfll.exec:\fxrxfll.exe109⤵PID:1684
-
\??\c:\rxxffxf.exec:\rxxffxf.exe110⤵PID:1744
-
\??\c:\pjpjp.exec:\pjpjp.exe111⤵PID:1280
-
\??\c:\3hnttt.exec:\3hnttt.exe112⤵PID:704
-
\??\c:\1thnhn.exec:\1thnhn.exe113⤵
- System Location Discovery: System Language Discovery
PID:1304 -
\??\c:\lfffffl.exec:\lfffffl.exe114⤵PID:1596
-
\??\c:\vppjp.exec:\vppjp.exe115⤵PID:1056
-
\??\c:\tntntt.exec:\tntntt.exe116⤵PID:2096
-
\??\c:\xrffxxx.exec:\xrffxxx.exe117⤵PID:1996
-
\??\c:\xxfflrx.exec:\xxfflrx.exe118⤵PID:2300
-
\??\c:\jvjdv.exec:\jvjdv.exe119⤵PID:1776
-
\??\c:\5httbb.exec:\5httbb.exe120⤵PID:3060
-
\??\c:\nhnttt.exec:\nhnttt.exe121⤵PID:2636
-
\??\c:\xrflrrf.exec:\xrflrrf.exe122⤵PID:2676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-