Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 06:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe
-
Size
455KB
-
MD5
684b6bba76d5ee98d04e4225a85ea070
-
SHA1
83513500e59ce0564683840efe5aada67324b885
-
SHA256
9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7
-
SHA512
56e7b7fae4f91f459fad7bef5736835b249105cfeb13fea1427f4548bc5854ad5adf8764f8d20e59b1b10d1cfa174e2644fa22c75b9fdd3550557abc1752b5a8
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeE:q7Tc2NYHUrAwfMp3CDE
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/3596-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2904-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2332-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4068-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3944-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4452-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/928-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2404-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3504-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2592-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/456-76-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4796-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3068-77-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4808-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3820-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4768-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2372-117-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1768-138-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5084-144-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1996-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3176-170-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4136-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4760-189-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4300-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/840-201-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2396-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3116-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/224-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4040-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3304-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4124-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4012-235-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/8-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3208-258-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2260-268-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4088-278-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1832-294-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4488-310-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2952-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2696-333-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2244-352-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4196-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2080-384-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1572-391-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4392-404-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4616-411-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3776-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1912-437-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3212-465-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1340-475-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3588-503-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/456-522-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2676-529-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4940-647-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4388-657-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2244-739-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2472-758-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4108-780-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/456-878-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2244-918-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4372-1024-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2944-1058-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3948-1484-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2904 2680048.exe 2332 vvvpj.exe 2648 4060404.exe 4068 006824.exe 3504 tnnnnt.exe 3944 s0666.exe 4452 422800.exe 2404 hbtttb.exe 928 s0222.exe 2592 bbnnnn.exe 1668 djpdd.exe 456 nhnhhh.exe 3068 djjdd.exe 4796 46460.exe 2952 i248002.exe 4808 pjjdv.exe 3820 ddpjj.exe 4768 vpjjj.exe 2372 bbbthh.exe 4396 fllrlxx.exe 2264 ntnhbh.exe 4176 7llfxxr.exe 1768 o448260.exe 5084 jvvvv.exe 2424 e28222.exe 1996 6004804.exe 2528 46640.exe 5116 i460444.exe 3176 nhtnnt.exe 1352 thtnhb.exe 4136 9ttttt.exe 4108 22822.exe 4760 q02666.exe 4300 806682.exe 828 g0884.exe 840 ddjpp.exe 4640 i000448.exe 2396 rlrrllf.exe 3116 bnttnn.exe 224 a4604.exe 4040 lxxrlfx.exe 3304 260066.exe 3464 28482.exe 4124 vpvpp.exe 4012 c248822.exe 1640 8480022.exe 1384 ffrlfrr.exe 8 44806.exe 4520 fxxrllf.exe 4412 a0600.exe 4724 tnnntb.exe 3208 vjppj.exe 2432 bnbnht.exe 4492 26260.exe 2260 vdvdv.exe 3484 rfxxrrl.exe 3648 a6086.exe 4088 fffxxxr.exe 3856 68048.exe 3544 24042.exe 3844 0642824.exe 3124 86260.exe 1832 ppdvd.exe 1488 vvjdp.exe -
resource yara_rule behavioral2/memory/3596-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2904-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2332-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4068-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3944-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4452-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2404-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3504-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2592-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4796-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3068-77-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4808-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3820-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4768-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-117-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1768-138-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5084-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1996-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3176-170-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4136-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4760-189-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4300-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/840-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2396-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2396-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3116-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/224-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4040-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3304-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4124-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4012-235-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/8-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-258-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2260-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4088-278-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1832-294-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4488-310-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2696-333-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2244-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4196-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2080-384-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1572-391-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4392-404-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4616-411-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3776-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1912-437-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3212-465-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1340-475-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3588-503-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-522-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2676-529-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-647-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4388-657-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2244-739-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2472-758-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4108-780-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1636-862-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-878-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2244-918-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4372-1024-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 842842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 868248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2260202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 060666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfffxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8424882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 806682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0000404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 208044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6204888.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 2904 3596 9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe 82 PID 3596 wrote to memory of 2904 3596 9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe 82 PID 3596 wrote to memory of 2904 3596 9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe 82 PID 2904 wrote to memory of 2332 2904 2680048.exe 83 PID 2904 wrote to memory of 2332 2904 2680048.exe 83 PID 2904 wrote to memory of 2332 2904 2680048.exe 83 PID 2332 wrote to memory of 2648 2332 vvvpj.exe 84 PID 2332 wrote to memory of 2648 2332 vvvpj.exe 84 PID 2332 wrote to memory of 2648 2332 vvvpj.exe 84 PID 2648 wrote to memory of 4068 2648 4060404.exe 85 PID 2648 wrote to memory of 4068 2648 4060404.exe 85 PID 2648 wrote to memory of 4068 2648 4060404.exe 85 PID 4068 wrote to memory of 3504 4068 006824.exe 86 PID 4068 wrote to memory of 3504 4068 006824.exe 86 PID 4068 wrote to memory of 3504 4068 006824.exe 86 PID 3504 wrote to memory of 3944 3504 tnnnnt.exe 87 PID 3504 wrote to memory of 3944 3504 tnnnnt.exe 87 PID 3504 wrote to memory of 3944 3504 tnnnnt.exe 87 PID 3944 wrote to memory of 4452 3944 s0666.exe 88 PID 3944 wrote to memory of 4452 3944 s0666.exe 88 PID 3944 wrote to memory of 4452 3944 s0666.exe 88 PID 4452 wrote to memory of 2404 4452 422800.exe 89 PID 4452 wrote to memory of 2404 4452 422800.exe 89 PID 4452 wrote to memory of 2404 4452 422800.exe 89 PID 2404 wrote to memory of 928 2404 hbtttb.exe 90 PID 2404 wrote to memory of 928 2404 hbtttb.exe 90 PID 2404 wrote to memory of 928 2404 hbtttb.exe 90 PID 928 wrote to memory of 2592 928 s0222.exe 91 PID 928 wrote to memory of 2592 928 s0222.exe 91 PID 928 wrote to memory of 2592 928 s0222.exe 91 PID 2592 wrote to memory of 1668 2592 bbnnnn.exe 92 PID 2592 wrote to memory of 1668 2592 bbnnnn.exe 92 PID 2592 wrote to memory of 1668 2592 bbnnnn.exe 92 PID 1668 wrote to memory of 456 1668 djpdd.exe 93 PID 1668 wrote to memory of 456 1668 djpdd.exe 93 PID 1668 wrote to memory of 456 1668 djpdd.exe 93 PID 456 wrote to memory of 3068 456 nhnhhh.exe 94 PID 456 wrote to memory of 3068 456 nhnhhh.exe 94 PID 456 wrote to memory of 3068 456 nhnhhh.exe 94 PID 3068 wrote to memory of 4796 3068 djjdd.exe 95 PID 3068 wrote to memory of 4796 3068 djjdd.exe 95 PID 3068 wrote to memory of 4796 3068 djjdd.exe 95 PID 4796 wrote to memory of 2952 4796 46460.exe 96 PID 4796 wrote to memory of 2952 4796 46460.exe 96 PID 4796 wrote to memory of 2952 4796 46460.exe 96 PID 2952 wrote to memory of 4808 2952 i248002.exe 97 PID 2952 wrote to memory of 4808 2952 i248002.exe 97 PID 2952 wrote to memory of 4808 2952 i248002.exe 97 PID 4808 wrote to memory of 3820 4808 pjjdv.exe 98 PID 4808 wrote to memory of 3820 4808 pjjdv.exe 98 PID 4808 wrote to memory of 3820 4808 pjjdv.exe 98 PID 3820 wrote to memory of 4768 3820 ddpjj.exe 99 PID 3820 wrote to memory of 4768 3820 ddpjj.exe 99 PID 3820 wrote to memory of 4768 3820 ddpjj.exe 99 PID 4768 wrote to memory of 2372 4768 vpjjj.exe 100 PID 4768 wrote to memory of 2372 4768 vpjjj.exe 100 PID 4768 wrote to memory of 2372 4768 vpjjj.exe 100 PID 2372 wrote to memory of 4396 2372 bbbthh.exe 101 PID 2372 wrote to memory of 4396 2372 bbbthh.exe 101 PID 2372 wrote to memory of 4396 2372 bbbthh.exe 101 PID 4396 wrote to memory of 2264 4396 fllrlxx.exe 102 PID 4396 wrote to memory of 2264 4396 fllrlxx.exe 102 PID 4396 wrote to memory of 2264 4396 fllrlxx.exe 102 PID 2264 wrote to memory of 4176 2264 ntnhbh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe"C:\Users\Admin\AppData\Local\Temp\9e12b1720a1b036b29f526dc2538060a7c5a169cb5bfa4411e54ae67a37a2ff7N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\2680048.exec:\2680048.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\vvvpj.exec:\vvvpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\4060404.exec:\4060404.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\006824.exec:\006824.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\tnnnnt.exec:\tnnnnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
\??\c:\s0666.exec:\s0666.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
\??\c:\422800.exec:\422800.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\hbtttb.exec:\hbtttb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\s0222.exec:\s0222.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\bbnnnn.exec:\bbnnnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\djpdd.exec:\djpdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\nhnhhh.exec:\nhnhhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\djjdd.exec:\djjdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\46460.exec:\46460.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\i248002.exec:\i248002.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\pjjdv.exec:\pjjdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
\??\c:\ddpjj.exec:\ddpjj.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
\??\c:\vpjjj.exec:\vpjjj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\bbbthh.exec:\bbbthh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\fllrlxx.exec:\fllrlxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\ntnhbh.exec:\ntnhbh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\7llfxxr.exec:\7llfxxr.exe23⤵
- Executes dropped EXE
PID:4176 -
\??\c:\o448260.exec:\o448260.exe24⤵
- Executes dropped EXE
PID:1768 -
\??\c:\jvvvv.exec:\jvvvv.exe25⤵
- Executes dropped EXE
PID:5084 -
\??\c:\e28222.exec:\e28222.exe26⤵
- Executes dropped EXE
PID:2424 -
\??\c:\6004804.exec:\6004804.exe27⤵
- Executes dropped EXE
PID:1996 -
\??\c:\46640.exec:\46640.exe28⤵
- Executes dropped EXE
PID:2528 -
\??\c:\i460444.exec:\i460444.exe29⤵
- Executes dropped EXE
PID:5116 -
\??\c:\nhtnnt.exec:\nhtnnt.exe30⤵
- Executes dropped EXE
PID:3176 -
\??\c:\thtnhb.exec:\thtnhb.exe31⤵
- Executes dropped EXE
PID:1352 -
\??\c:\9ttttt.exec:\9ttttt.exe32⤵
- Executes dropped EXE
PID:4136 -
\??\c:\22822.exec:\22822.exe33⤵
- Executes dropped EXE
PID:4108 -
\??\c:\q02666.exec:\q02666.exe34⤵
- Executes dropped EXE
PID:4760 -
\??\c:\806682.exec:\806682.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4300 -
\??\c:\g0884.exec:\g0884.exe36⤵
- Executes dropped EXE
PID:828 -
\??\c:\ddjpp.exec:\ddjpp.exe37⤵
- Executes dropped EXE
PID:840 -
\??\c:\i000448.exec:\i000448.exe38⤵
- Executes dropped EXE
PID:4640 -
\??\c:\rlrrllf.exec:\rlrrllf.exe39⤵
- Executes dropped EXE
PID:2396 -
\??\c:\bnttnn.exec:\bnttnn.exe40⤵
- Executes dropped EXE
PID:3116 -
\??\c:\a4604.exec:\a4604.exe41⤵
- Executes dropped EXE
PID:224 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe42⤵
- Executes dropped EXE
PID:4040 -
\??\c:\260066.exec:\260066.exe43⤵
- Executes dropped EXE
PID:3304 -
\??\c:\28482.exec:\28482.exe44⤵
- Executes dropped EXE
PID:3464 -
\??\c:\vpvpp.exec:\vpvpp.exe45⤵
- Executes dropped EXE
PID:4124 -
\??\c:\c248822.exec:\c248822.exe46⤵
- Executes dropped EXE
PID:4012 -
\??\c:\8480022.exec:\8480022.exe47⤵
- Executes dropped EXE
PID:1640 -
\??\c:\ffrlfrr.exec:\ffrlfrr.exe48⤵
- Executes dropped EXE
PID:1384 -
\??\c:\44806.exec:\44806.exe49⤵
- Executes dropped EXE
PID:8 -
\??\c:\fxxrllf.exec:\fxxrllf.exe50⤵
- Executes dropped EXE
PID:4520 -
\??\c:\a0600.exec:\a0600.exe51⤵
- Executes dropped EXE
PID:4412 -
\??\c:\tnnntb.exec:\tnnntb.exe52⤵
- Executes dropped EXE
PID:4724 -
\??\c:\vjppj.exec:\vjppj.exe53⤵
- Executes dropped EXE
PID:3208 -
\??\c:\bnbnht.exec:\bnbnht.exe54⤵
- Executes dropped EXE
PID:2432 -
\??\c:\26260.exec:\26260.exe55⤵
- Executes dropped EXE
PID:4492 -
\??\c:\vdvdv.exec:\vdvdv.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\rfxxrrl.exec:\rfxxrrl.exe57⤵
- Executes dropped EXE
PID:3484 -
\??\c:\a6086.exec:\a6086.exe58⤵
- Executes dropped EXE
PID:3648 -
\??\c:\fffxxxr.exec:\fffxxxr.exe59⤵
- Executes dropped EXE
PID:4088 -
\??\c:\68048.exec:\68048.exe60⤵
- Executes dropped EXE
PID:3856 -
\??\c:\24042.exec:\24042.exe61⤵
- Executes dropped EXE
PID:3544 -
\??\c:\0642824.exec:\0642824.exe62⤵
- Executes dropped EXE
PID:3844 -
\??\c:\86260.exec:\86260.exe63⤵
- Executes dropped EXE
PID:3124 -
\??\c:\ppdvd.exec:\ppdvd.exe64⤵
- Executes dropped EXE
PID:1832 -
\??\c:\vvjdp.exec:\vvjdp.exe65⤵
- Executes dropped EXE
PID:1488 -
\??\c:\htbbbb.exec:\htbbbb.exe66⤵PID:5004
-
\??\c:\00004.exec:\00004.exe67⤵PID:1644
-
\??\c:\462664.exec:\462664.exe68⤵PID:2912
-
\??\c:\240048.exec:\240048.exe69⤵PID:4488
-
\??\c:\q02600.exec:\q02600.exe70⤵PID:1252
-
\??\c:\ppppp.exec:\ppppp.exe71⤵PID:2164
-
\??\c:\9xxrllf.exec:\9xxrllf.exe72⤵PID:2944
-
\??\c:\fxlllll.exec:\fxlllll.exe73⤵PID:4620
-
\??\c:\6060060.exec:\6060060.exe74⤵PID:2968
-
\??\c:\hhnhnn.exec:\hhnhnn.exe75⤵PID:2952
-
\??\c:\ppppj.exec:\ppppj.exe76⤵PID:2696
-
\??\c:\042262.exec:\042262.exe77⤵PID:832
-
\??\c:\g8444.exec:\g8444.exe78⤵PID:3896
-
\??\c:\xrxxlrx.exec:\xrxxlrx.exe79⤵PID:4768
-
\??\c:\024444.exec:\024444.exe80⤵PID:2700
-
\??\c:\62822.exec:\62822.exe81⤵PID:544
-
\??\c:\ffxxrrr.exec:\ffxxrrr.exe82⤵PID:2244
-
\??\c:\5jpjp.exec:\5jpjp.exe83⤵PID:4196
-
\??\c:\xxxxrrl.exec:\xxxxrrl.exe84⤵PID:2256
-
\??\c:\nbtttt.exec:\nbtttt.exe85⤵PID:4828
-
\??\c:\46224.exec:\46224.exe86⤵PID:1160
-
\??\c:\thhbtt.exec:\thhbtt.exe87⤵PID:4576
-
\??\c:\44048.exec:\44048.exe88⤵PID:2368
-
\??\c:\482286.exec:\482286.exe89⤵PID:916
-
\??\c:\jvddv.exec:\jvddv.exe90⤵PID:2740
-
\??\c:\6066004.exec:\6066004.exe91⤵PID:2184
-
\??\c:\6222688.exec:\6222688.exe92⤵PID:2080
-
\??\c:\tnnhhh.exec:\tnnhhh.exe93⤵PID:5116
-
\??\c:\7ffffff.exec:\7ffffff.exe94⤵PID:1572
-
\??\c:\pjppp.exec:\pjppp.exe95⤵PID:2444
-
\??\c:\lxlllrr.exec:\lxlllrr.exe96⤵PID:1408
-
\??\c:\2422268.exec:\2422268.exe97⤵PID:5092
-
\??\c:\htbbtn.exec:\htbbtn.exe98⤵PID:4392
-
\??\c:\5btttt.exec:\5btttt.exe99⤵PID:4780
-
\??\c:\hnbthn.exec:\hnbthn.exe100⤵PID:4616
-
\??\c:\nnttbh.exec:\nnttbh.exe101⤵PID:4544
-
\??\c:\tbttnn.exec:\tbttnn.exe102⤵PID:4852
-
\??\c:\pjpjd.exec:\pjpjd.exe103⤵PID:5020
-
\??\c:\thtnnn.exec:\thtnnn.exe104⤵PID:2396
-
\??\c:\xxlrlll.exec:\xxlrlll.exe105⤵PID:3776
-
\??\c:\420404.exec:\420404.exe106⤵PID:4212
-
\??\c:\024488.exec:\024488.exe107⤵PID:1612
-
\??\c:\bntnnn.exec:\bntnnn.exe108⤵PID:1912
-
\??\c:\c026666.exec:\c026666.exe109⤵PID:3940
-
\??\c:\flrlfff.exec:\flrlfff.exe110⤵PID:3900
-
\??\c:\8260006.exec:\8260006.exe111⤵PID:3276
-
\??\c:\7pdvv.exec:\7pdvv.exe112⤵PID:1596
-
\??\c:\02680.exec:\02680.exe113⤵PID:4672
-
\??\c:\2666000.exec:\2666000.exe114⤵PID:1904
-
\??\c:\bnbtnn.exec:\bnbtnn.exe115⤵PID:404
-
\??\c:\jvpdp.exec:\jvpdp.exe116⤵PID:4408
-
\??\c:\m0626.exec:\m0626.exe117⤵PID:3212
-
\??\c:\7tbthn.exec:\7tbthn.exe118⤵PID:3088
-
\??\c:\fxlfxfx.exec:\fxlfxfx.exe119⤵PID:4328
-
\??\c:\4882260.exec:\4882260.exe120⤵PID:1340
-
\??\c:\djppj.exec:\djppj.exe121⤵PID:2260
-
\??\c:\rrlllll.exec:\rrlllll.exe122⤵PID:4860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-