Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 06:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe
-
Size
453KB
-
MD5
77de7dca40d32bdf68aa05e5896c0927
-
SHA1
1c4de4d3137661ba3be3e862afe5cb5ee0ff16a6
-
SHA256
b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816
-
SHA512
c40def558feafd4f4ca74b4f3263da803daf3c49aa76486389c44ac8ec3d3dd230af08f40a48f77cb735bd8a0825b6684c0056bf9d37ae86bdc0a03bbb79f59f
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeY:q7Tc2NYHUrAwfMp3CDY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/396-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2024-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4452-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2452-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2544-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4008-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4840-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3324-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4256-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2932-59-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4304-67-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2948-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4224-88-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3064-100-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1904-102-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/116-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/800-114-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/544-123-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/748-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1468-155-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3544-162-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1676-163-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2344-173-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5016-188-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/720-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2992-207-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3320-214-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2352-221-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1544-225-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4172-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2748-233-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4600-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1224-244-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1152-248-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2540-255-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2356-263-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2508-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1632-278-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3416-282-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/264-295-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3440-298-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4028-302-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/548-306-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4224-319-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2364-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1480-333-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2152-340-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1428-365-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1836-388-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4724-401-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4280-423-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1980-443-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2804-450-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/312-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4972-482-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4864-528-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3852-553-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3924-563-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1180-586-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/340-596-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3320-606-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4460-754-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3320-1573-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1292-1880-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2024 vvjjj.exe 4452 vpppp.exe 2452 8488888.exe 2544 bhbbnt.exe 4008 xrxxfrl.exe 4840 bhhbhn.exe 3324 2806202.exe 4256 rfxrrff.exe 2932 6222666.exe 4304 624488.exe 1860 266246.exe 976 nnhbtb.exe 2948 e24282.exe 4224 xflxrlx.exe 3064 226260.exe 116 g2484.exe 1904 o426284.exe 3008 w62662.exe 800 jjjpj.exe 544 06888.exe 748 u860668.exe 3156 606044.exe 3188 7rxrrff.exe 5096 0264444.exe 2644 xxxrxxf.exe 1468 frxflrr.exe 3544 04222.exe 1676 00446.exe 2344 fxxflrr.exe 232 4068640.exe 1620 828822.exe 5016 btnbnh.exe 2368 806008.exe 1572 vpdjv.exe 720 400602.exe 5092 vvvpv.exe 552 00646.exe 2992 xllrllx.exe 4676 48822.exe 3320 4840088.exe 4356 rrxllfx.exe 2352 0242824.exe 1544 00642.exe 4172 tthbbb.exe 2748 tthhnh.exe 4932 00048.exe 4600 260042.exe 1224 848222.exe 1152 rxrfxrr.exe 1204 2606802.exe 2540 hbhhnn.exe 964 s4222.exe 2356 808888.exe 2508 1jjjj.exe 2416 m8008.exe 4840 s0868.exe 1632 nhhhbb.exe 3416 0066044.exe 2116 606608.exe 3772 5vvpj.exe 884 880826.exe 264 xrlrlrl.exe 3440 024688.exe 4028 pdvdd.exe -
resource yara_rule behavioral2/memory/396-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4452-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2024-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4452-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2452-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2544-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4008-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4840-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3324-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4256-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2932-59-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4304-67-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2948-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4224-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3064-100-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1904-102-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/116-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/800-114-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-123-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/748-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1468-155-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3544-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1676-163-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2344-173-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5016-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/720-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2992-207-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3320-214-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2352-221-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1544-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4172-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2748-233-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4600-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1224-244-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1152-248-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2540-255-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-259-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2508-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1632-278-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3416-282-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/264-295-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3440-298-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-302-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/548-306-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4224-319-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2364-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1480-333-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2152-340-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1428-365-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1836-388-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4724-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4280-423-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2612-424-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1980-443-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2804-450-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/312-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4972-482-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4864-528-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3852-553-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3924-563-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1180-582-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1180-586-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/340-596-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0860006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxrxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8400006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 822448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxffxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e02882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 042660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c404866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rxrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffflfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 646040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 400602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2604246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 2024 396 b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe 85 PID 396 wrote to memory of 2024 396 b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe 85 PID 396 wrote to memory of 2024 396 b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe 85 PID 2024 wrote to memory of 4452 2024 vvjjj.exe 86 PID 2024 wrote to memory of 4452 2024 vvjjj.exe 86 PID 2024 wrote to memory of 4452 2024 vvjjj.exe 86 PID 4452 wrote to memory of 2452 4452 vpppp.exe 87 PID 4452 wrote to memory of 2452 4452 vpppp.exe 87 PID 4452 wrote to memory of 2452 4452 vpppp.exe 87 PID 2452 wrote to memory of 2544 2452 8488888.exe 88 PID 2452 wrote to memory of 2544 2452 8488888.exe 88 PID 2452 wrote to memory of 2544 2452 8488888.exe 88 PID 2544 wrote to memory of 4008 2544 bhbbnt.exe 89 PID 2544 wrote to memory of 4008 2544 bhbbnt.exe 89 PID 2544 wrote to memory of 4008 2544 bhbbnt.exe 89 PID 4008 wrote to memory of 4840 4008 xrxxfrl.exe 90 PID 4008 wrote to memory of 4840 4008 xrxxfrl.exe 90 PID 4008 wrote to memory of 4840 4008 xrxxfrl.exe 90 PID 4840 wrote to memory of 3324 4840 bhhbhn.exe 91 PID 4840 wrote to memory of 3324 4840 bhhbhn.exe 91 PID 4840 wrote to memory of 3324 4840 bhhbhn.exe 91 PID 3324 wrote to memory of 4256 3324 2806202.exe 92 PID 3324 wrote to memory of 4256 3324 2806202.exe 92 PID 3324 wrote to memory of 4256 3324 2806202.exe 92 PID 4256 wrote to memory of 2932 4256 rfxrrff.exe 93 PID 4256 wrote to memory of 2932 4256 rfxrrff.exe 93 PID 4256 wrote to memory of 2932 4256 rfxrrff.exe 93 PID 2932 wrote to memory of 4304 2932 6222666.exe 94 PID 2932 wrote to memory of 4304 2932 6222666.exe 94 PID 2932 wrote to memory of 4304 2932 6222666.exe 94 PID 4304 wrote to memory of 1860 4304 624488.exe 95 PID 4304 wrote to memory of 1860 4304 624488.exe 95 PID 4304 wrote to memory of 1860 4304 624488.exe 95 PID 1860 wrote to memory of 976 1860 266246.exe 96 PID 1860 wrote to memory of 976 1860 266246.exe 96 PID 1860 wrote to memory of 976 1860 266246.exe 96 PID 976 wrote to memory of 2948 976 nnhbtb.exe 97 PID 976 wrote to memory of 2948 976 nnhbtb.exe 97 PID 976 wrote to memory of 2948 976 nnhbtb.exe 97 PID 2948 wrote to memory of 4224 2948 e24282.exe 98 PID 2948 wrote to memory of 4224 2948 e24282.exe 98 PID 2948 wrote to memory of 4224 2948 e24282.exe 98 PID 4224 wrote to memory of 3064 4224 xflxrlx.exe 99 PID 4224 wrote to memory of 3064 4224 xflxrlx.exe 99 PID 4224 wrote to memory of 3064 4224 xflxrlx.exe 99 PID 3064 wrote to memory of 116 3064 226260.exe 100 PID 3064 wrote to memory of 116 3064 226260.exe 100 PID 3064 wrote to memory of 116 3064 226260.exe 100 PID 116 wrote to memory of 1904 116 g2484.exe 101 PID 116 wrote to memory of 1904 116 g2484.exe 101 PID 116 wrote to memory of 1904 116 g2484.exe 101 PID 1904 wrote to memory of 3008 1904 o426284.exe 102 PID 1904 wrote to memory of 3008 1904 o426284.exe 102 PID 1904 wrote to memory of 3008 1904 o426284.exe 102 PID 3008 wrote to memory of 800 3008 w62662.exe 103 PID 3008 wrote to memory of 800 3008 w62662.exe 103 PID 3008 wrote to memory of 800 3008 w62662.exe 103 PID 800 wrote to memory of 544 800 jjjpj.exe 104 PID 800 wrote to memory of 544 800 jjjpj.exe 104 PID 800 wrote to memory of 544 800 jjjpj.exe 104 PID 544 wrote to memory of 748 544 06888.exe 105 PID 544 wrote to memory of 748 544 06888.exe 105 PID 544 wrote to memory of 748 544 06888.exe 105 PID 748 wrote to memory of 3156 748 u860668.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe"C:\Users\Admin\AppData\Local\Temp\b4f3c48ca7895db0f92f30c10a6aa457a8c4e796d97c59be7ccb550ab3978816.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\vvjjj.exec:\vvjjj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\vpppp.exec:\vpppp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\8488888.exec:\8488888.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\bhbbnt.exec:\bhbbnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\xrxxfrl.exec:\xrxxfrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\bhhbhn.exec:\bhhbhn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\2806202.exec:\2806202.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
\??\c:\rfxrrff.exec:\rfxrrff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
\??\c:\6222666.exec:\6222666.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\624488.exec:\624488.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
\??\c:\266246.exec:\266246.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\nnhbtb.exec:\nnhbtb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:976 -
\??\c:\e24282.exec:\e24282.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\xflxrlx.exec:\xflxrlx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\226260.exec:\226260.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\g2484.exec:\g2484.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\o426284.exec:\o426284.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\w62662.exec:\w62662.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\jjjpj.exec:\jjjpj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
\??\c:\06888.exec:\06888.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\u860668.exec:\u860668.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\606044.exec:\606044.exe23⤵
- Executes dropped EXE
PID:3156 -
\??\c:\7rxrrff.exec:\7rxrrff.exe24⤵
- Executes dropped EXE
PID:3188 -
\??\c:\0264444.exec:\0264444.exe25⤵
- Executes dropped EXE
PID:5096 -
\??\c:\xxxrxxf.exec:\xxxrxxf.exe26⤵
- Executes dropped EXE
PID:2644 -
\??\c:\frxflrr.exec:\frxflrr.exe27⤵
- Executes dropped EXE
PID:1468 -
\??\c:\04222.exec:\04222.exe28⤵
- Executes dropped EXE
PID:3544 -
\??\c:\00446.exec:\00446.exe29⤵
- Executes dropped EXE
PID:1676 -
\??\c:\fxxflrr.exec:\fxxflrr.exe30⤵
- Executes dropped EXE
PID:2344 -
\??\c:\4068640.exec:\4068640.exe31⤵
- Executes dropped EXE
PID:232 -
\??\c:\828822.exec:\828822.exe32⤵
- Executes dropped EXE
PID:1620 -
\??\c:\btnbnh.exec:\btnbnh.exe33⤵
- Executes dropped EXE
PID:5016 -
\??\c:\806008.exec:\806008.exe34⤵
- Executes dropped EXE
PID:2368 -
\??\c:\vpdjv.exec:\vpdjv.exe35⤵
- Executes dropped EXE
PID:1572 -
\??\c:\400602.exec:\400602.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:720 -
\??\c:\vvvpv.exec:\vvvpv.exe37⤵
- Executes dropped EXE
PID:5092 -
\??\c:\00646.exec:\00646.exe38⤵
- Executes dropped EXE
PID:552 -
\??\c:\xllrllx.exec:\xllrllx.exe39⤵
- Executes dropped EXE
PID:2992 -
\??\c:\48822.exec:\48822.exe40⤵
- Executes dropped EXE
PID:4676 -
\??\c:\4840088.exec:\4840088.exe41⤵
- Executes dropped EXE
PID:3320 -
\??\c:\rrxllfx.exec:\rrxllfx.exe42⤵
- Executes dropped EXE
PID:4356 -
\??\c:\0242824.exec:\0242824.exe43⤵
- Executes dropped EXE
PID:2352 -
\??\c:\00642.exec:\00642.exe44⤵
- Executes dropped EXE
PID:1544 -
\??\c:\tthbbb.exec:\tthbbb.exe45⤵
- Executes dropped EXE
PID:4172 -
\??\c:\tthhnh.exec:\tthhnh.exe46⤵
- Executes dropped EXE
PID:2748 -
\??\c:\00048.exec:\00048.exe47⤵
- Executes dropped EXE
PID:4932 -
\??\c:\260042.exec:\260042.exe48⤵
- Executes dropped EXE
PID:4600 -
\??\c:\848222.exec:\848222.exe49⤵
- Executes dropped EXE
PID:1224 -
\??\c:\rxrfxrr.exec:\rxrfxrr.exe50⤵
- Executes dropped EXE
PID:1152 -
\??\c:\2606802.exec:\2606802.exe51⤵
- Executes dropped EXE
PID:1204 -
\??\c:\hbhhnn.exec:\hbhhnn.exe52⤵
- Executes dropped EXE
PID:2540 -
\??\c:\s4222.exec:\s4222.exe53⤵
- Executes dropped EXE
PID:964 -
\??\c:\808888.exec:\808888.exe54⤵
- Executes dropped EXE
PID:2356 -
\??\c:\1jjjj.exec:\1jjjj.exe55⤵
- Executes dropped EXE
PID:2508 -
\??\c:\m8008.exec:\m8008.exe56⤵
- Executes dropped EXE
PID:2416 -
\??\c:\s0868.exec:\s0868.exe57⤵
- Executes dropped EXE
PID:4840 -
\??\c:\nhhhbb.exec:\nhhhbb.exe58⤵
- Executes dropped EXE
PID:1632 -
\??\c:\0066044.exec:\0066044.exe59⤵
- Executes dropped EXE
PID:3416 -
\??\c:\606608.exec:\606608.exe60⤵
- Executes dropped EXE
PID:2116 -
\??\c:\5vvpj.exec:\5vvpj.exe61⤵
- Executes dropped EXE
PID:3772 -
\??\c:\880826.exec:\880826.exe62⤵
- Executes dropped EXE
PID:884 -
\??\c:\xrlrlrl.exec:\xrlrlrl.exe63⤵
- Executes dropped EXE
PID:264 -
\??\c:\024688.exec:\024688.exe64⤵
- Executes dropped EXE
PID:3440 -
\??\c:\pdvdd.exec:\pdvdd.exe65⤵
- Executes dropped EXE
PID:4028 -
\??\c:\4824868.exec:\4824868.exe66⤵PID:548
-
\??\c:\60044.exec:\60044.exe67⤵PID:976
-
\??\c:\448086.exec:\448086.exe68⤵PID:3984
-
\??\c:\btttnn.exec:\btttnn.exe69⤵PID:3252
-
\??\c:\xxlflfx.exec:\xxlflfx.exe70⤵PID:4224
-
\??\c:\vpjdd.exec:\vpjdd.exe71⤵
- System Location Discovery: System Language Discovery
PID:5100 -
\??\c:\i804444.exec:\i804444.exe72⤵PID:5108
-
\??\c:\024442.exec:\024442.exe73⤵PID:2364
-
\??\c:\bbbbhb.exec:\bbbbhb.exe74⤵PID:1480
-
\??\c:\8820826.exec:\8820826.exe75⤵PID:648
-
\??\c:\c404866.exec:\c404866.exe76⤵
- System Location Discovery: System Language Discovery
PID:2152 -
\??\c:\frfffll.exec:\frfffll.exe77⤵PID:2652
-
\??\c:\204440.exec:\204440.exe78⤵PID:3740
-
\??\c:\q04826.exec:\q04826.exe79⤵PID:748
-
\??\c:\rrrlrlr.exec:\rrrlrlr.exe80⤵PID:5040
-
\??\c:\g4448.exec:\g4448.exe81⤵PID:4648
-
\??\c:\rlfflrx.exec:\rlfflrx.exe82⤵PID:1344
-
\??\c:\8006424.exec:\8006424.exe83⤵PID:3972
-
\??\c:\a8228.exec:\a8228.exe84⤵PID:1428
-
\??\c:\llflffl.exec:\llflffl.exe85⤵PID:1720
-
\??\c:\2066288.exec:\2066288.exe86⤵PID:1468
-
\??\c:\jddjj.exec:\jddjj.exe87⤵PID:824
-
\??\c:\408888.exec:\408888.exe88⤵PID:2976
-
\??\c:\446622.exec:\446622.exe89⤵PID:4380
-
\??\c:\6622660.exec:\6622660.exe90⤵PID:1552
-
\??\c:\408488.exec:\408488.exe91⤵PID:1836
-
\??\c:\jjpjd.exec:\jjpjd.exe92⤵PID:1620
-
\??\c:\6480806.exec:\6480806.exe93⤵PID:4040
-
\??\c:\82020.exec:\82020.exe94⤵PID:4448
-
\??\c:\jpjvj.exec:\jpjvj.exe95⤵PID:4724
-
\??\c:\26664.exec:\26664.exe96⤵PID:1920
-
\??\c:\djdpp.exec:\djdpp.exe97⤵PID:4940
-
\??\c:\hbbtnh.exec:\hbbtnh.exe98⤵PID:3876
-
\??\c:\4640684.exec:\4640684.exe99⤵PID:1556
-
\??\c:\7vvdj.exec:\7vvdj.exe100⤵PID:3736
-
\??\c:\bntbhb.exec:\bntbhb.exe101⤵PID:2124
-
\??\c:\vvdjd.exec:\vvdjd.exe102⤵PID:4280
-
\??\c:\m0600.exec:\m0600.exe103⤵PID:2612
-
\??\c:\44242.exec:\44242.exe104⤵PID:4876
-
\??\c:\3ntntt.exec:\3ntntt.exe105⤵PID:3548
-
\??\c:\pdpdd.exec:\pdpdd.exe106⤵PID:4372
-
\??\c:\040000.exec:\040000.exe107⤵PID:4396
-
\??\c:\ntnbbt.exec:\ntnbbt.exe108⤵PID:1980
-
\??\c:\rfrffll.exec:\rfrffll.exe109⤵PID:1608
-
\??\c:\8086666.exec:\8086666.exe110⤵PID:2804
-
\??\c:\jdjdv.exec:\jdjdv.exe111⤵PID:1488
-
\??\c:\fxfxlfx.exec:\fxfxlfx.exe112⤵PID:880
-
\??\c:\rlffxlf.exec:\rlffxlf.exe113⤵
- System Location Discovery: System Language Discovery
PID:312 -
\??\c:\828066.exec:\828066.exe114⤵PID:3040
-
\??\c:\xlrlxxf.exec:\xlrlxxf.exe115⤵PID:372
-
\??\c:\djpjd.exec:\djpjd.exe116⤵PID:1136
-
\??\c:\e68822.exec:\e68822.exe117⤵PID:1092
-
\??\c:\620046.exec:\620046.exe118⤵PID:4920
-
\??\c:\402440.exec:\402440.exe119⤵PID:2416
-
\??\c:\xxxxrff.exec:\xxxxrff.exe120⤵PID:2248
-
\??\c:\hnnbtt.exec:\hnnbtt.exe121⤵PID:4972
-
\??\c:\082642.exec:\082642.exe122⤵PID:1816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-