Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 11:30 UTC
Behavioral task
behavioral1
Sample
4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe
Resource
win7-20240903-en
9 signatures
120 seconds
General
-
Target
4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe
-
Size
3.7MB
-
MD5
dd046b69e8d48ebf28c12b52eb1d4d0b
-
SHA1
234697c421a46f588c2674bad6a0ce2328c2751e
-
SHA256
4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d
-
SHA512
cc910d67380e2f62fb26d702f11c05ef2f73035f85ac8a166571335dfc089234a6127ee273e07622cadabfc783312329464ff313df6e0fafeb79ad927d1c98e2
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98O:U6XLq/qPPslzKx/dJg1ErmNx
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/536-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/224-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1124-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1784-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2840-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2656-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2088-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3460-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2956-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/552-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3688-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1636-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2780-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/512-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4816-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4804-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3504-117-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4908-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2668-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3628-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1020-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/396-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4636-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4340-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3416-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/880-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1132-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2620-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4572-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1800-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4728-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3160-240-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/836-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1004-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3504-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1736-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4412-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3968-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1572-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/312-318-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2372-331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2292-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-357-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1164-367-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3576-404-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4072-411-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4536-424-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4412-437-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1944-453-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4056-466-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5052-479-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/996-561-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2444-610-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3312-620-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4788-633-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4744-643-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1188-686-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5096-708-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/264-2000-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3800-2028-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 224 fxfffrr.exe 1124 pvppd.exe 4164 nntnht.exe 1784 868440.exe 2840 lfrrrxx.exe 2656 xrrrrxr.exe 2088 ttbbbt.exe 3460 5rrrlxx.exe 2956 xfxrfrl.exe 5040 84022.exe 552 600606.exe 3688 4846040.exe 1636 2280044.exe 2780 lxlrrlf.exe 512 flrllll.exe 4816 pppdj.exe 4804 04000.exe 3580 hthbhn.exe 3504 hhtnnb.exe 2668 dvddd.exe 4908 20060.exe 3240 rrfxxff.exe 3628 ddjdv.exe 1020 2462660.exe 844 nhntnt.exe 396 28064.exe 4016 0484000.exe 2924 ddvdv.exe 4636 24060.exe 4340 frrrlrr.exe 536 86888.exe 772 1vddd.exe 3416 ppppj.exe 880 460202.exe 1132 406042.exe 1532 20808.exe 2620 88000.exe 3508 2022282.exe 2396 pjjjj.exe 4372 228882.exe 4572 pppjj.exe 1800 rfxxxxf.exe 2472 rffxlrr.exe 1596 080280.exe 2780 22040.exe 4728 rxllfll.exe 3160 nntttt.exe 836 480488.exe 5108 20480.exe 2808 064406.exe 796 60846.exe 1004 688822.exe 3504 hhbthh.exe 4872 00660.exe 1556 26642.exe 1972 644848.exe 1736 44660.exe 3172 082806.exe 4412 vvdpp.exe 3968 0060082.exe 792 xrlfrlx.exe 1572 2444482.exe 2908 xrlrlrx.exe 3260 jpvvp.exe -
resource yara_rule behavioral2/memory/536-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b87-3.dat upx behavioral2/memory/536-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b88-8.dat upx behavioral2/memory/224-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1124-12-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000600000001e4df-16.dat upx behavioral2/memory/4164-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e5b2-21.dat upx behavioral2/memory/1784-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e5b3-27.dat upx behavioral2/files/0x000300000001e5b4-32.dat upx behavioral2/memory/2840-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e5b5-38.dat upx behavioral2/memory/2656-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b85-43.dat upx behavioral2/memory/2088-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b89-50.dat upx behavioral2/memory/3460-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8a-59.dat upx behavioral2/memory/2956-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b8b-62.dat upx behavioral2/files/0x000a000000023b8c-67.dat upx behavioral2/memory/552-69-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e762-73.dat upx behavioral2/memory/3688-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b8f-79.dat upx behavioral2/memory/1636-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2780-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b90-87.dat upx behavioral2/memory/512-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b91-94.dat upx behavioral2/memory/4816-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b99-100.dat upx behavioral2/memory/4804-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b9b-104.dat upx behavioral2/memory/3580-106-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0012000000023ba7-110.dat upx behavioral2/files/0x0008000000023ba9-115.dat upx behavioral2/memory/3504-117-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023baf-122.dat upx behavioral2/memory/4908-125-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2668-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000e000000023bb4-128.dat upx behavioral2/files/0x0008000000023bb6-134.dat upx behavioral2/files/0x0008000000023bb9-139.dat upx behavioral2/memory/3628-140-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1020-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bba-146.dat upx behavioral2/files/0x0008000000023bbb-150.dat upx behavioral2/files/0x0009000000023bbd-155.dat upx behavioral2/memory/396-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bec-160.dat upx behavioral2/files/0x0008000000023bed-165.dat upx behavioral2/memory/2924-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bee-171.dat upx behavioral2/memory/4636-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bef-179.dat upx behavioral2/memory/4340-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023bf0-184.dat upx behavioral2/memory/3416-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/880-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1132-199-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2620-205-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ffllrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrflxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rrllxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllrlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrlrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2804886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxlflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrlllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 600606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4820448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0486228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2222608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8466004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 084604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 682828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0686008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 844462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 880848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 802666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w02604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 646006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfffll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 224 536 4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe 85 PID 536 wrote to memory of 224 536 4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe 85 PID 536 wrote to memory of 224 536 4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe 85 PID 224 wrote to memory of 1124 224 fxfffrr.exe 86 PID 224 wrote to memory of 1124 224 fxfffrr.exe 86 PID 224 wrote to memory of 1124 224 fxfffrr.exe 86 PID 1124 wrote to memory of 4164 1124 pvppd.exe 87 PID 1124 wrote to memory of 4164 1124 pvppd.exe 87 PID 1124 wrote to memory of 4164 1124 pvppd.exe 87 PID 4164 wrote to memory of 1784 4164 nntnht.exe 88 PID 4164 wrote to memory of 1784 4164 nntnht.exe 88 PID 4164 wrote to memory of 1784 4164 nntnht.exe 88 PID 1784 wrote to memory of 2840 1784 868440.exe 89 PID 1784 wrote to memory of 2840 1784 868440.exe 89 PID 1784 wrote to memory of 2840 1784 868440.exe 89 PID 2840 wrote to memory of 2656 2840 lfrrrxx.exe 90 PID 2840 wrote to memory of 2656 2840 lfrrrxx.exe 90 PID 2840 wrote to memory of 2656 2840 lfrrrxx.exe 90 PID 2656 wrote to memory of 2088 2656 xrrrrxr.exe 91 PID 2656 wrote to memory of 2088 2656 xrrrrxr.exe 91 PID 2656 wrote to memory of 2088 2656 xrrrrxr.exe 91 PID 2088 wrote to memory of 3460 2088 ttbbbt.exe 92 PID 2088 wrote to memory of 3460 2088 ttbbbt.exe 92 PID 2088 wrote to memory of 3460 2088 ttbbbt.exe 92 PID 3460 wrote to memory of 2956 3460 5rrrlxx.exe 93 PID 3460 wrote to memory of 2956 3460 5rrrlxx.exe 93 PID 3460 wrote to memory of 2956 3460 5rrrlxx.exe 93 PID 2956 wrote to memory of 5040 2956 xfxrfrl.exe 94 PID 2956 wrote to memory of 5040 2956 xfxrfrl.exe 94 PID 2956 wrote to memory of 5040 2956 xfxrfrl.exe 94 PID 5040 wrote to memory of 552 5040 84022.exe 95 PID 5040 wrote to memory of 552 5040 84022.exe 95 PID 5040 wrote to memory of 552 5040 84022.exe 95 PID 552 wrote to memory of 3688 552 600606.exe 96 PID 552 wrote to memory of 3688 552 600606.exe 96 PID 552 wrote to memory of 3688 552 600606.exe 96 PID 3688 wrote to memory of 1636 3688 4846040.exe 97 PID 3688 wrote to memory of 1636 3688 4846040.exe 97 PID 3688 wrote to memory of 1636 3688 4846040.exe 97 PID 1636 wrote to memory of 2780 1636 2280044.exe 98 PID 1636 wrote to memory of 2780 1636 2280044.exe 98 PID 1636 wrote to memory of 2780 1636 2280044.exe 98 PID 2780 wrote to memory of 512 2780 lxlrrlf.exe 99 PID 2780 wrote to memory of 512 2780 lxlrrlf.exe 99 PID 2780 wrote to memory of 512 2780 lxlrrlf.exe 99 PID 512 wrote to memory of 4816 512 flrllll.exe 100 PID 512 wrote to memory of 4816 512 flrllll.exe 100 PID 512 wrote to memory of 4816 512 flrllll.exe 100 PID 4816 wrote to memory of 4804 4816 pppdj.exe 101 PID 4816 wrote to memory of 4804 4816 pppdj.exe 101 PID 4816 wrote to memory of 4804 4816 pppdj.exe 101 PID 4804 wrote to memory of 3580 4804 04000.exe 102 PID 4804 wrote to memory of 3580 4804 04000.exe 102 PID 4804 wrote to memory of 3580 4804 04000.exe 102 PID 3580 wrote to memory of 3504 3580 hthbhn.exe 105 PID 3580 wrote to memory of 3504 3580 hthbhn.exe 105 PID 3580 wrote to memory of 3504 3580 hthbhn.exe 105 PID 3504 wrote to memory of 2668 3504 hhtnnb.exe 107 PID 3504 wrote to memory of 2668 3504 hhtnnb.exe 107 PID 3504 wrote to memory of 2668 3504 hhtnnb.exe 107 PID 2668 wrote to memory of 4908 2668 dvddd.exe 109 PID 2668 wrote to memory of 4908 2668 dvddd.exe 109 PID 2668 wrote to memory of 4908 2668 dvddd.exe 109 PID 4908 wrote to memory of 3240 4908 20060.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe"C:\Users\Admin\AppData\Local\Temp\4ec200b1e8fcdbd55e44610c1d73482d8b3b96f5c24be9c9fd31133a7b7e6a5d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\fxfffrr.exec:\fxfffrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
\??\c:\pvppd.exec:\pvppd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\nntnht.exec:\nntnht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\868440.exec:\868440.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\lfrrrxx.exec:\lfrrrxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\xrrrrxr.exec:\xrrrrxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\ttbbbt.exec:\ttbbbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\5rrrlxx.exec:\5rrrlxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\xfxrfrl.exec:\xfxrfrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\84022.exec:\84022.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\600606.exec:\600606.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\4846040.exec:\4846040.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\2280044.exec:\2280044.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\lxlrrlf.exec:\lxlrrlf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\flrllll.exec:\flrllll.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
\??\c:\pppdj.exec:\pppdj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
\??\c:\04000.exec:\04000.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\hthbhn.exec:\hthbhn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\hhtnnb.exec:\hhtnnb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
\??\c:\dvddd.exec:\dvddd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\20060.exec:\20060.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
\??\c:\rrfxxff.exec:\rrfxxff.exe23⤵
- Executes dropped EXE
PID:3240 -
\??\c:\ddjdv.exec:\ddjdv.exe24⤵
- Executes dropped EXE
PID:3628 -
\??\c:\2462660.exec:\2462660.exe25⤵
- Executes dropped EXE
PID:1020 -
\??\c:\nhntnt.exec:\nhntnt.exe26⤵
- Executes dropped EXE
PID:844 -
\??\c:\28064.exec:\28064.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396 -
\??\c:\0484000.exec:\0484000.exe28⤵
- Executes dropped EXE
PID:4016 -
\??\c:\ddvdv.exec:\ddvdv.exe29⤵
- Executes dropped EXE
PID:2924 -
\??\c:\24060.exec:\24060.exe30⤵
- Executes dropped EXE
PID:4636 -
\??\c:\frrrlrr.exec:\frrrlrr.exe31⤵
- Executes dropped EXE
PID:4340 -
\??\c:\86888.exec:\86888.exe32⤵
- Executes dropped EXE
PID:536 -
\??\c:\1vddd.exec:\1vddd.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772 -
\??\c:\ppppj.exec:\ppppj.exe34⤵
- Executes dropped EXE
PID:3416 -
\??\c:\460202.exec:\460202.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:880 -
\??\c:\406042.exec:\406042.exe36⤵
- Executes dropped EXE
PID:1132 -
\??\c:\20808.exec:\20808.exe37⤵
- Executes dropped EXE
PID:1532 -
\??\c:\88000.exec:\88000.exe38⤵
- Executes dropped EXE
PID:2620 -
\??\c:\2022282.exec:\2022282.exe39⤵
- Executes dropped EXE
PID:3508 -
\??\c:\pjjjj.exec:\pjjjj.exe40⤵
- Executes dropped EXE
PID:2396 -
\??\c:\228882.exec:\228882.exe41⤵
- Executes dropped EXE
PID:4372 -
\??\c:\pppjj.exec:\pppjj.exe42⤵
- Executes dropped EXE
PID:4572 -
\??\c:\rfxxxxf.exec:\rfxxxxf.exe43⤵
- Executes dropped EXE
PID:1800 -
\??\c:\rffxlrr.exec:\rffxlrr.exe44⤵
- Executes dropped EXE
PID:2472 -
\??\c:\080280.exec:\080280.exe45⤵
- Executes dropped EXE
PID:1596 -
\??\c:\22040.exec:\22040.exe46⤵
- Executes dropped EXE
PID:2780 -
\??\c:\rxllfll.exec:\rxllfll.exe47⤵
- Executes dropped EXE
PID:4728 -
\??\c:\nntttt.exec:\nntttt.exe48⤵
- Executes dropped EXE
PID:3160 -
\??\c:\480488.exec:\480488.exe49⤵
- Executes dropped EXE
PID:836 -
\??\c:\20480.exec:\20480.exe50⤵
- Executes dropped EXE
PID:5108 -
\??\c:\064406.exec:\064406.exe51⤵
- Executes dropped EXE
PID:2808 -
\??\c:\60846.exec:\60846.exe52⤵
- Executes dropped EXE
PID:796 -
\??\c:\688822.exec:\688822.exe53⤵
- Executes dropped EXE
PID:1004 -
\??\c:\hhbthh.exec:\hhbthh.exe54⤵
- Executes dropped EXE
PID:3504 -
\??\c:\00660.exec:\00660.exe55⤵
- Executes dropped EXE
PID:4872 -
\??\c:\26642.exec:\26642.exe56⤵
- Executes dropped EXE
PID:1556 -
\??\c:\644848.exec:\644848.exe57⤵
- Executes dropped EXE
PID:1972 -
\??\c:\44660.exec:\44660.exe58⤵
- Executes dropped EXE
PID:1736 -
\??\c:\082806.exec:\082806.exe59⤵
- Executes dropped EXE
PID:3172 -
\??\c:\vvdpp.exec:\vvdpp.exe60⤵
- Executes dropped EXE
PID:4412 -
\??\c:\0060082.exec:\0060082.exe61⤵
- Executes dropped EXE
PID:3968 -
\??\c:\xrlfrlx.exec:\xrlfrlx.exe62⤵
- Executes dropped EXE
PID:792 -
\??\c:\2444482.exec:\2444482.exe63⤵
- Executes dropped EXE
PID:1572 -
\??\c:\xrlrlrx.exec:\xrlrlrx.exe64⤵
- Executes dropped EXE
PID:2908 -
\??\c:\jpvvp.exec:\jpvvp.exe65⤵
- Executes dropped EXE
PID:3260 -
\??\c:\xrxxxff.exec:\xrxxxff.exe66⤵PID:396
-
\??\c:\662468.exec:\662468.exe67⤵PID:2316
-
\??\c:\880000.exec:\880000.exe68⤵PID:3084
-
\??\c:\xxllxrf.exec:\xxllxrf.exe69⤵PID:3332
-
\??\c:\pvpdv.exec:\pvpdv.exe70⤵PID:2924
-
\??\c:\hhhhnh.exec:\hhhhnh.exe71⤵PID:312
-
\??\c:\hnbtnh.exec:\hnbtnh.exe72⤵PID:4472
-
\??\c:\80606.exec:\80606.exe73⤵PID:4900
-
\??\c:\u400884.exec:\u400884.exe74⤵PID:316
-
\??\c:\rxxlflx.exec:\rxxlflx.exe75⤵PID:2372
-
\??\c:\64482.exec:\64482.exe76⤵PID:4396
-
\??\c:\046626.exec:\046626.exe77⤵PID:2292
-
\??\c:\thhbtt.exec:\thhbtt.exe78⤵PID:4416
-
\??\c:\ntbtbb.exec:\ntbtbb.exe79⤵PID:4420
-
\??\c:\bbnbtt.exec:\bbnbtt.exe80⤵PID:756
-
\??\c:\202648.exec:\202648.exe81⤵PID:1920
-
\??\c:\vpdjd.exec:\vpdjd.exe82⤵PID:400
-
\??\c:\lffxrfx.exec:\lffxrfx.exe83⤵PID:5040
-
\??\c:\llfxrrl.exec:\llfxrrl.exe84⤵PID:4512
-
\??\c:\btbnhb.exec:\btbnhb.exe85⤵PID:2396
-
\??\c:\lflfffl.exec:\lflfffl.exe86⤵PID:1164
-
\??\c:\hhnnnt.exec:\hhnnnt.exe87⤵PID:4572
-
\??\c:\xrxxrlr.exec:\xrxxrlr.exe88⤵PID:1800
-
\??\c:\062042.exec:\062042.exe89⤵PID:2472
-
\??\c:\28860.exec:\28860.exe90⤵PID:1668
-
\??\c:\0486228.exec:\0486228.exe91⤵
- System Location Discovery: System Language Discovery
PID:3524 -
\??\c:\i268086.exec:\i268086.exe92⤵PID:1604
-
\??\c:\g0220.exec:\g0220.exe93⤵PID:4816
-
\??\c:\668666.exec:\668666.exe94⤵PID:788
-
\??\c:\044600.exec:\044600.exe95⤵PID:4508
-
\??\c:\06420.exec:\06420.exe96⤵PID:2624
-
\??\c:\vdjdv.exec:\vdjdv.exe97⤵PID:1188
-
\??\c:\686606.exec:\686606.exe98⤵PID:3576
-
\??\c:\44622.exec:\44622.exe99⤵PID:3656
-
\??\c:\jvjdd.exec:\jvjdd.exe100⤵PID:4072
-
\??\c:\42248.exec:\42248.exe101⤵PID:1816
-
\??\c:\26226.exec:\26226.exe102⤵PID:4500
-
\??\c:\lxfxrxf.exec:\lxfxrxf.exe103⤵PID:4708
-
\??\c:\7bbttt.exec:\7bbttt.exe104⤵PID:4536
-
\??\c:\20024.exec:\20024.exe105⤵PID:4320
-
\??\c:\jdddd.exec:\jdddd.exe106⤵PID:1568
-
\??\c:\2022288.exec:\2022288.exe107⤵PID:4100
-
\??\c:\4648888.exec:\4648888.exe108⤵PID:4412
-
\??\c:\06888.exec:\06888.exe109⤵PID:1772
-
\??\c:\rrxxrff.exec:\rrxxrff.exe110⤵PID:3484
-
\??\c:\8466004.exec:\8466004.exe111⤵
- System Location Discovery: System Language Discovery
PID:4892 -
\??\c:\pjvdd.exec:\pjvdd.exe112⤵PID:4104
-
\??\c:\tttnnh.exec:\tttnnh.exe113⤵PID:1944
-
\??\c:\0084222.exec:\0084222.exe114⤵PID:3260
-
\??\c:\42282.exec:\42282.exe115⤵PID:4016
-
\??\c:\httntt.exec:\httntt.exe116⤵
- System Location Discovery: System Language Discovery
PID:2996 -
\??\c:\vpppj.exec:\vpppj.exe117⤵PID:4056
-
\??\c:\pjpvv.exec:\pjpvv.exe118⤵PID:4324
-
\??\c:\jdjjj.exec:\jdjjj.exe119⤵PID:3780
-
\??\c:\httttt.exec:\httttt.exe120⤵PID:2184
-
\??\c:\2604606.exec:\2604606.exe121⤵PID:5052
-
\??\c:\vjvvj.exec:\vjvvj.exe122⤵PID:4900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-