Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 06:46
Behavioral task
behavioral1
Sample
0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe
Resource
win7-20240903-en
9 signatures
120 seconds
General
-
Target
0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe
-
Size
3.7MB
-
MD5
b4b7e930ecbb6afa203edfa78465486c
-
SHA1
cbd1ecbb960f51deaa4380bdf1f8ca4084360ba0
-
SHA256
0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47
-
SHA512
9acf8a1c0397d6f884257cc5af9085492adad9bba46dcf0c9e33ba02193bf07d860cce4455dbc7ff4d9864aebd4ea062cff18b0589a1de50fa71316ec711a45f
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98H:U6XLq/qPPslzKx/dJg1ErmNg
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/632-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4876-13-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4088-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1408-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3040-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1632-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/860-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/812-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1036-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2968-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2156-77-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3016-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3540-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3564-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4060-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-111-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4760-117-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3936-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1344-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3004-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5080-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4160-159-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3332-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4636-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4428-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3528-211-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1096-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4496-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4708-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3208-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2648-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/868-294-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3440-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2084-323-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4956-339-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/368-349-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3048-353-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4388-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3092-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3952-407-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2072-433-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3912-461-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4300-468-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/780-521-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4012-549-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2192-559-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1320-578-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1040-615-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3024-637-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2276-707-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3240-727-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3112-746-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-765-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2360-775-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2120-779-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3564-921-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4592-1205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2292-1221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 4088 hnbtbb.exe 4876 hbnnhh.exe 1408 3xllflr.exe 3040 1nbtnn.exe 1712 lrxrrrl.exe 1632 bhnnnn.exe 860 bhbthh.exe 1036 xxllxrf.exe 812 vdvvj.exe 2968 jvjjd.exe 4988 flrrlrr.exe 2156 hhnnnn.exe 3112 bbnbhh.exe 3016 xrrffff.exe 3540 jvppp.exe 3564 htbtnt.exe 4060 ntbbnn.exe 4984 djvvd.exe 4760 rrllffx.exe 4300 tnbhbh.exe 3936 lfrfxll.exe 1344 lllrlxx.exe 3004 rlllfll.exe 4420 lrfffff.exe 5016 vpvvv.exe 4160 3bnnhn.exe 5080 thbtnt.exe 3272 jpjjj.exe 2704 lfffrfl.exe 2512 pjpvj.exe 3332 7jvvp.exe 2952 hntnnt.exe 4636 9dppp.exe 2912 tbnbtt.exe 3748 bnbbhh.exe 4388 bbnnnh.exe 4428 nbbbtt.exe 3528 vppjd.exe 3256 jpvvv.exe 468 vdddd.exe 1916 vvpdj.exe 2844 dvdjd.exe 864 ddjvd.exe 724 vdpdp.exe 3740 bbntbt.exe 2192 hhtnbh.exe 3944 ntnbtn.exe 4336 bbhnnt.exe 4840 nbhnnn.exe 1096 nnhhnt.exe 3708 btbbtn.exe 2188 hbhnnn.exe 4708 bnnhbh.exe 4496 nnhhhh.exe 1560 hbbbbt.exe 3352 tnnnnn.exe 3208 hbnntb.exe 1304 vjjdd.exe 2412 frfffll.exe 2648 xxllffx.exe 556 lflxrxf.exe 1648 rfllffl.exe 868 rfrlfff.exe 1436 rllfxxr.exe -
resource yara_rule behavioral2/memory/632-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/632-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023ba4-4.dat upx behavioral2/files/0x000a000000023ba8-10.dat upx behavioral2/memory/4876-13-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4088-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023baa-14.dat upx behavioral2/memory/1408-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023ba5-22.dat upx behavioral2/memory/3040-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023bab-28.dat upx behavioral2/files/0x000a000000023bac-33.dat upx behavioral2/memory/1712-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023bad-38.dat upx behavioral2/memory/1632-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023bae-45.dat upx behavioral2/memory/860-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023baf-51.dat upx behavioral2/memory/812-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1036-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023bb0-58.dat upx behavioral2/files/0x000a000000023bb8-63.dat upx behavioral2/memory/2968-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023bbf-69.dat upx behavioral2/files/0x0008000000023bc8-74.dat upx behavioral2/memory/2156-77-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023bcd-80.dat upx behavioral2/files/0x0009000000023bce-85.dat upx behavioral2/memory/3016-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023bcf-91.dat upx behavioral2/memory/3540-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023bd3-98.dat upx behavioral2/memory/3564-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd5-103.dat upx behavioral2/memory/4060-105-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd8-109.dat upx behavioral2/memory/4984-111-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bd9-115.dat upx behavioral2/memory/4760-117-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bda-121.dat upx behavioral2/files/0x0008000000023bdb-126.dat upx behavioral2/memory/3936-128-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1344-134-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c0a-135.dat upx behavioral2/memory/4420-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3004-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c0b-139.dat upx behavioral2/files/0x0008000000023c0c-145.dat upx behavioral2/files/0x0008000000023c0d-150.dat upx behavioral2/memory/5016-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c0e-157.dat upx behavioral2/memory/5080-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4160-159-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023c0f-163.dat upx behavioral2/files/0x0008000000023c14-168.dat upx behavioral2/files/0x0008000000023c15-173.dat upx behavioral2/files/0x0008000000023c16-178.dat upx behavioral2/files/0x0008000000023c28-183.dat upx behavioral2/memory/3332-185-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2952-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4636-194-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4428-207-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3528-211-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/864-226-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflrflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlllfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1llfxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9flfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfllrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflllxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxxrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxllflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlllxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrxflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xrlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlffrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 4088 632 0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe 83 PID 632 wrote to memory of 4088 632 0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe 83 PID 632 wrote to memory of 4088 632 0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe 83 PID 4088 wrote to memory of 4876 4088 hnbtbb.exe 84 PID 4088 wrote to memory of 4876 4088 hnbtbb.exe 84 PID 4088 wrote to memory of 4876 4088 hnbtbb.exe 84 PID 4876 wrote to memory of 1408 4876 hbnnhh.exe 85 PID 4876 wrote to memory of 1408 4876 hbnnhh.exe 85 PID 4876 wrote to memory of 1408 4876 hbnnhh.exe 85 PID 1408 wrote to memory of 3040 1408 3xllflr.exe 86 PID 1408 wrote to memory of 3040 1408 3xllflr.exe 86 PID 1408 wrote to memory of 3040 1408 3xllflr.exe 86 PID 3040 wrote to memory of 1712 3040 1nbtnn.exe 87 PID 3040 wrote to memory of 1712 3040 1nbtnn.exe 87 PID 3040 wrote to memory of 1712 3040 1nbtnn.exe 87 PID 1712 wrote to memory of 1632 1712 lrxrrrl.exe 88 PID 1712 wrote to memory of 1632 1712 lrxrrrl.exe 88 PID 1712 wrote to memory of 1632 1712 lrxrrrl.exe 88 PID 1632 wrote to memory of 860 1632 bhnnnn.exe 89 PID 1632 wrote to memory of 860 1632 bhnnnn.exe 89 PID 1632 wrote to memory of 860 1632 bhnnnn.exe 89 PID 860 wrote to memory of 1036 860 bhbthh.exe 90 PID 860 wrote to memory of 1036 860 bhbthh.exe 90 PID 860 wrote to memory of 1036 860 bhbthh.exe 90 PID 1036 wrote to memory of 812 1036 xxllxrf.exe 91 PID 1036 wrote to memory of 812 1036 xxllxrf.exe 91 PID 1036 wrote to memory of 812 1036 xxllxrf.exe 91 PID 812 wrote to memory of 2968 812 vdvvj.exe 92 PID 812 wrote to memory of 2968 812 vdvvj.exe 92 PID 812 wrote to memory of 2968 812 vdvvj.exe 92 PID 2968 wrote to memory of 4988 2968 jvjjd.exe 93 PID 2968 wrote to memory of 4988 2968 jvjjd.exe 93 PID 2968 wrote to memory of 4988 2968 jvjjd.exe 93 PID 4988 wrote to memory of 2156 4988 flrrlrr.exe 94 PID 4988 wrote to memory of 2156 4988 flrrlrr.exe 94 PID 4988 wrote to memory of 2156 4988 flrrlrr.exe 94 PID 2156 wrote to memory of 3112 2156 hhnnnn.exe 95 PID 2156 wrote to memory of 3112 2156 hhnnnn.exe 95 PID 2156 wrote to memory of 3112 2156 hhnnnn.exe 95 PID 3112 wrote to memory of 3016 3112 bbnbhh.exe 96 PID 3112 wrote to memory of 3016 3112 bbnbhh.exe 96 PID 3112 wrote to memory of 3016 3112 bbnbhh.exe 96 PID 3016 wrote to memory of 3540 3016 xrrffff.exe 97 PID 3016 wrote to memory of 3540 3016 xrrffff.exe 97 PID 3016 wrote to memory of 3540 3016 xrrffff.exe 97 PID 3540 wrote to memory of 3564 3540 jvppp.exe 98 PID 3540 wrote to memory of 3564 3540 jvppp.exe 98 PID 3540 wrote to memory of 3564 3540 jvppp.exe 98 PID 3564 wrote to memory of 4060 3564 htbtnt.exe 99 PID 3564 wrote to memory of 4060 3564 htbtnt.exe 99 PID 3564 wrote to memory of 4060 3564 htbtnt.exe 99 PID 4060 wrote to memory of 4984 4060 ntbbnn.exe 100 PID 4060 wrote to memory of 4984 4060 ntbbnn.exe 100 PID 4060 wrote to memory of 4984 4060 ntbbnn.exe 100 PID 4984 wrote to memory of 4760 4984 djvvd.exe 101 PID 4984 wrote to memory of 4760 4984 djvvd.exe 101 PID 4984 wrote to memory of 4760 4984 djvvd.exe 101 PID 4760 wrote to memory of 4300 4760 rrllffx.exe 102 PID 4760 wrote to memory of 4300 4760 rrllffx.exe 102 PID 4760 wrote to memory of 4300 4760 rrllffx.exe 102 PID 4300 wrote to memory of 3936 4300 tnbhbh.exe 103 PID 4300 wrote to memory of 3936 4300 tnbhbh.exe 103 PID 4300 wrote to memory of 3936 4300 tnbhbh.exe 103 PID 3936 wrote to memory of 1344 3936 lfrfxll.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe"C:\Users\Admin\AppData\Local\Temp\0a78ee83b6099a9e752a2c9f58c48f3d7ad34a92b4a2019eb50821eee327ee47.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\hnbtbb.exec:\hnbtbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\hbnnhh.exec:\hbnnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\3xllflr.exec:\3xllflr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\1nbtnn.exec:\1nbtnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\lrxrrrl.exec:\lrxrrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\bhnnnn.exec:\bhnnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\bhbthh.exec:\bhbthh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\xxllxrf.exec:\xxllxrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\vdvvj.exec:\vdvvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\jvjjd.exec:\jvjjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\flrrlrr.exec:\flrrlrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
\??\c:\hhnnnn.exec:\hhnnnn.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\bbnbhh.exec:\bbnbhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\xrrffff.exec:\xrrffff.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\jvppp.exec:\jvppp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
\??\c:\htbtnt.exec:\htbtnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
\??\c:\ntbbnn.exec:\ntbbnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\djvvd.exec:\djvvd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\rrllffx.exec:\rrllffx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
\??\c:\tnbhbh.exec:\tnbhbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\lfrfxll.exec:\lfrfxll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\lllrlxx.exec:\lllrlxx.exe23⤵
- Executes dropped EXE
PID:1344 -
\??\c:\rlllfll.exec:\rlllfll.exe24⤵
- Executes dropped EXE
PID:3004 -
\??\c:\lrfffff.exec:\lrfffff.exe25⤵
- Executes dropped EXE
PID:4420 -
\??\c:\vpvvv.exec:\vpvvv.exe26⤵
- Executes dropped EXE
PID:5016 -
\??\c:\3bnnhn.exec:\3bnnhn.exe27⤵
- Executes dropped EXE
PID:4160 -
\??\c:\thbtnt.exec:\thbtnt.exe28⤵
- Executes dropped EXE
PID:5080 -
\??\c:\jpjjj.exec:\jpjjj.exe29⤵
- Executes dropped EXE
PID:3272 -
\??\c:\lfffrfl.exec:\lfffrfl.exe30⤵
- Executes dropped EXE
PID:2704 -
\??\c:\pjpvj.exec:\pjpvj.exe31⤵
- Executes dropped EXE
PID:2512 -
\??\c:\7jvvp.exec:\7jvvp.exe32⤵
- Executes dropped EXE
PID:3332 -
\??\c:\hntnnt.exec:\hntnnt.exe33⤵
- Executes dropped EXE
PID:2952 -
\??\c:\9dppp.exec:\9dppp.exe34⤵
- Executes dropped EXE
PID:4636 -
\??\c:\tbnbtt.exec:\tbnbtt.exe35⤵
- Executes dropped EXE
PID:2912 -
\??\c:\bnbbhh.exec:\bnbbhh.exe36⤵
- Executes dropped EXE
PID:3748 -
\??\c:\bbnnnh.exec:\bbnnnh.exe37⤵
- Executes dropped EXE
PID:4388 -
\??\c:\nbbbtt.exec:\nbbbtt.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428 -
\??\c:\vppjd.exec:\vppjd.exe39⤵
- Executes dropped EXE
PID:3528 -
\??\c:\jpvvv.exec:\jpvvv.exe40⤵
- Executes dropped EXE
PID:3256 -
\??\c:\vdddd.exec:\vdddd.exe41⤵
- Executes dropped EXE
PID:468 -
\??\c:\vvpdj.exec:\vvpdj.exe42⤵
- Executes dropped EXE
PID:1916 -
\??\c:\dvdjd.exec:\dvdjd.exe43⤵
- Executes dropped EXE
PID:2844 -
\??\c:\ddjvd.exec:\ddjvd.exe44⤵
- Executes dropped EXE
PID:864 -
\??\c:\vdpdp.exec:\vdpdp.exe45⤵
- Executes dropped EXE
PID:724 -
\??\c:\bbntbt.exec:\bbntbt.exe46⤵
- Executes dropped EXE
PID:3740 -
\??\c:\hhtnbh.exec:\hhtnbh.exe47⤵
- Executes dropped EXE
PID:2192 -
\??\c:\ntnbtn.exec:\ntnbtn.exe48⤵
- Executes dropped EXE
PID:3944 -
\??\c:\bbhnnt.exec:\bbhnnt.exe49⤵
- Executes dropped EXE
PID:4336 -
\??\c:\nbhnnn.exec:\nbhnnn.exe50⤵
- Executes dropped EXE
PID:4840 -
\??\c:\nnhhnt.exec:\nnhhnt.exe51⤵
- Executes dropped EXE
PID:1096 -
\??\c:\btbbtn.exec:\btbbtn.exe52⤵
- Executes dropped EXE
PID:3708 -
\??\c:\hbhnnn.exec:\hbhnnn.exe53⤵
- Executes dropped EXE
PID:2188 -
\??\c:\bnnhbh.exec:\bnnhbh.exe54⤵
- Executes dropped EXE
PID:4708 -
\??\c:\nnhhhh.exec:\nnhhhh.exe55⤵
- Executes dropped EXE
PID:4496 -
\??\c:\hbbbbt.exec:\hbbbbt.exe56⤵
- Executes dropped EXE
PID:1560 -
\??\c:\tnnnnn.exec:\tnnnnn.exe57⤵
- Executes dropped EXE
PID:3352 -
\??\c:\hbnntb.exec:\hbnntb.exe58⤵
- Executes dropped EXE
PID:3208 -
\??\c:\vjjdd.exec:\vjjdd.exe59⤵
- Executes dropped EXE
PID:1304 -
\??\c:\frfffll.exec:\frfffll.exe60⤵
- Executes dropped EXE
PID:2412 -
\??\c:\xxllffx.exec:\xxllffx.exe61⤵
- Executes dropped EXE
PID:2648 -
\??\c:\lflxrxf.exec:\lflxrxf.exe62⤵
- Executes dropped EXE
PID:556 -
\??\c:\rfllffl.exec:\rfllffl.exe63⤵
- Executes dropped EXE
PID:1648 -
\??\c:\rfrlfff.exec:\rfrlfff.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868 -
\??\c:\rllfxxr.exec:\rllfxxr.exe65⤵
- Executes dropped EXE
PID:1436 -
\??\c:\rrllflx.exec:\rrllflx.exe66⤵PID:3564
-
\??\c:\frllrrx.exec:\frllrrx.exe67⤵PID:3832
-
\??\c:\xrfffll.exec:\xrfffll.exe68⤵PID:5116
-
\??\c:\nnnnhb.exec:\nnnnhb.exe69⤵PID:4816
-
\??\c:\hhnnhh.exec:\hhnnhh.exe70⤵PID:3440
-
\??\c:\xrflrrf.exec:\xrflrrf.exe71⤵PID:3132
-
\??\c:\htnhbb.exec:\htnhbb.exe72⤵
- System Location Discovery: System Language Discovery
PID:672 -
\??\c:\tbtbtb.exec:\tbtbtb.exe73⤵PID:2084
-
\??\c:\nbbbth.exec:\nbbbth.exe74⤵PID:2628
-
\??\c:\9bnhnt.exec:\9bnhnt.exe75⤵PID:1396
-
\??\c:\nnnbbh.exec:\nnnbbh.exe76⤵PID:1348
-
\??\c:\ntnnnt.exec:\ntnnnt.exe77⤵PID:3024
-
\??\c:\bhntbh.exec:\bhntbh.exe78⤵PID:4956
-
\??\c:\hbnnhh.exec:\hbnnhh.exe79⤵
- System Location Discovery: System Language Discovery
PID:3928 -
\??\c:\thhbhn.exec:\thhbhn.exe80⤵PID:4224
-
\??\c:\btbttn.exec:\btbttn.exe81⤵PID:368
-
\??\c:\9dddv.exec:\9dddv.exe82⤵
- System Location Discovery: System Language Discovery
PID:3048 -
\??\c:\djddj.exec:\djddj.exe83⤵PID:4936
-
\??\c:\pjdvv.exec:\pjdvv.exe84⤵PID:1768
-
\??\c:\jjddd.exec:\jjddd.exe85⤵PID:2052
-
\??\c:\ppjjp.exec:\ppjjp.exe86⤵PID:952
-
\??\c:\vjpjd.exec:\vjpjd.exe87⤵PID:5072
-
\??\c:\jvpjj.exec:\jvpjj.exe88⤵PID:2132
-
\??\c:\jdppv.exec:\jdppv.exe89⤵PID:4716
-
\??\c:\rllffff.exec:\rllffff.exe90⤵PID:4388
-
\??\c:\xllrrrr.exec:\xllrrrr.exe91⤵PID:4144
-
\??\c:\llrllll.exec:\llrllll.exe92⤵PID:1656
-
\??\c:\xxfffll.exec:\xxfffll.exe93⤵PID:4576
-
\??\c:\1lrrxfl.exec:\1lrrxfl.exe94⤵PID:3904
-
\??\c:\lrlllrx.exec:\lrlllrx.exe95⤵PID:3092
-
\??\c:\rfrrffl.exec:\rfrrffl.exe96⤵PID:2196
-
\??\c:\ntbbbb.exec:\ntbbbb.exe97⤵PID:3020
-
\??\c:\nnhhnt.exec:\nnhhnt.exe98⤵PID:1752
-
\??\c:\lxrlffx.exec:\lxrlffx.exe99⤵PID:3952
-
\??\c:\hnnnnt.exec:\hnnnnt.exe100⤵PID:624
-
\??\c:\hnbnhb.exec:\hnbnhb.exe101⤵PID:3620
-
\??\c:\5bnhbb.exec:\5bnhbb.exe102⤵PID:3868
-
\??\c:\btnntb.exec:\btnntb.exe103⤵PID:3040
-
\??\c:\hbhhnn.exec:\hbhhnn.exe104⤵PID:3328
-
\??\c:\xffffrr.exec:\xffffrr.exe105⤵PID:4068
-
\??\c:\rxffrxx.exec:\rxffrxx.exe106⤵PID:2640
-
\??\c:\frxflrr.exec:\frxflrr.exe107⤵PID:2072
-
\??\c:\llrxllr.exec:\llrxllr.exe108⤵PID:4400
-
\??\c:\9hnhnn.exec:\9hnhnn.exe109⤵PID:2932
-
\??\c:\bhtthn.exec:\bhtthn.exe110⤵PID:3448
-
\??\c:\tbnhhb.exec:\tbnhhb.exe111⤵PID:1976
-
\??\c:\nhttbb.exec:\nhttbb.exe112⤵PID:1172
-
\??\c:\thhnhn.exec:\thhnhn.exe113⤵PID:644
-
\??\c:\1tttnt.exec:\1tttnt.exe114⤵PID:3128
-
\??\c:\thnnbt.exec:\thnnbt.exe115⤵PID:1224
-
\??\c:\thbtnt.exec:\thbtnt.exe116⤵
- System Location Discovery: System Language Discovery
PID:3912 -
\??\c:\nhtnnh.exec:\nhtnnh.exe117⤵PID:4816
-
\??\c:\rffrlxx.exec:\rffrlxx.exe118⤵PID:4300
-
\??\c:\rlrllff.exec:\rlrllff.exe119⤵PID:3132
-
\??\c:\5frrlrr.exec:\5frrlrr.exe120⤵PID:4712
-
\??\c:\hhnnhb.exec:\hhnnhb.exe121⤵PID:2792
-
\??\c:\rllrllr.exec:\rllrllr.exe122⤵PID:1520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-