Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 01:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe
-
Size
454KB
-
MD5
dd0505d68214397e092bc13b917087d1
-
SHA1
66c3cfd2f7e28596df8b2f92195409ddc1f60ba6
-
SHA256
a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0
-
SHA512
a02fba83b03ae01f932689672bef2c230c5af6fcd6da91ff1bbecfce569522aaea07fbb06c7cdfd7705b9942acb57cb20923ce1f6c36d431da6d20e422c88d3d
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbew:q7Tc2NYHUrAwfMp3CDw
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2084-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4352-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4356-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5064-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4100-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4924-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2088-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4164-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1664-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1684-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2868-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3788-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4172-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4396-261-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4456-265-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4044-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4916-252-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4528-241-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4664-226-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/512-222-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1488-218-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1220-213-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4324-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/388-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2096-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4976-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4460-162-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2156-151-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/100-133-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2728-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4960-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3024-112-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3468-102-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2240-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3832-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3208-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3908-84-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3248-296-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4164-303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/728-307-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5100-317-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5004-321-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2764-328-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3908-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/100-357-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/464-361-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3464-377-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3044-399-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2196-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3360-443-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2268-445-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4456-452-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1068-474-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2352-481-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4960-539-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2880-546-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4656-568-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1980-581-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/768-609-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2632-676-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2576-929-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3032-1011-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/632-1270-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2264-1386-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4924 ttbttt.exe 4356 04628.exe 4352 2222662.exe 4100 jvvdd.exe 5064 nntnnt.exe 2088 jdjdd.exe 4164 ntthbn.exe 1664 jpvpj.exe 1684 266464.exe 2868 bnnnhh.exe 3788 xxfrlrf.exe 3832 422604.exe 3908 828282.exe 3208 rllxfrr.exe 2240 nbtbhn.exe 3468 a0268.exe 3372 42248.exe 3024 lflffxr.exe 4960 htnbtn.exe 4376 5bhbtn.exe 2728 8004882.exe 100 rxfrlxr.exe 3172 28860.exe 3552 a6686.exe 2156 04482.exe 2584 bbtthb.exe 4460 vjjpj.exe 4976 llrlfxr.exe 4432 8828648.exe 2184 ttthhn.exe 2096 pddvp.exe 388 dvdvv.exe 884 frlffxr.exe 4944 g4642.exe 4324 4624026.exe 3200 vjjvv.exe 936 jdpvp.exe 4172 fflfrxr.exe 1220 88628.exe 1488 xflfrrx.exe 512 jjpdp.exe 4664 thhtbt.exe 3284 rfxrflf.exe 3196 42264.exe 5032 pvvpp.exe 3280 222644.exe 4528 s2482.exe 2508 a2206.exe 4544 40626.exe 4916 htbtbn.exe 1420 xrxrrrl.exe 4044 822666.exe 4456 bnbbtt.exe 1456 jdjjd.exe 688 u466444.exe 4760 flrfxrr.exe 2732 6026022.exe 1068 frlxfff.exe 1736 222284.exe 3852 lllxfrl.exe 1896 s8002.exe 3248 4468222.exe 3516 hhttnt.exe 4164 pjvvv.exe -
resource yara_rule behavioral2/memory/2084-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4356-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5064-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4100-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4924-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2088-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2088-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4164-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1664-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1684-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2868-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3788-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2240-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3372-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4172-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4396-261-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4456-265-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4044-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4916-252-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4528-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4664-226-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/512-222-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1488-218-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-213-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/388-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2096-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4460-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2156-151-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/100-133-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2728-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4960-118-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3024-112-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3468-102-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2240-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3832-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3908-84-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3832-73-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3248-296-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4164-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/728-307-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5100-317-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5004-321-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2764-328-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3908-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/100-357-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/464-361-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3464-377-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3044-399-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2196-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-443-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4456-452-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1068-474-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2352-481-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4960-539-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2880-546-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4656-568-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1980-581-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/768-609-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2632-676-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2576-929-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9frfrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4860666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0880866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6282044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrlxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o282626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 4924 2084 a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe 83 PID 2084 wrote to memory of 4924 2084 a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe 83 PID 2084 wrote to memory of 4924 2084 a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe 83 PID 4924 wrote to memory of 4356 4924 ttbttt.exe 84 PID 4924 wrote to memory of 4356 4924 ttbttt.exe 84 PID 4924 wrote to memory of 4356 4924 ttbttt.exe 84 PID 4356 wrote to memory of 4352 4356 04628.exe 85 PID 4356 wrote to memory of 4352 4356 04628.exe 85 PID 4356 wrote to memory of 4352 4356 04628.exe 85 PID 4352 wrote to memory of 4100 4352 2222662.exe 86 PID 4352 wrote to memory of 4100 4352 2222662.exe 86 PID 4352 wrote to memory of 4100 4352 2222662.exe 86 PID 4100 wrote to memory of 5064 4100 jvvdd.exe 87 PID 4100 wrote to memory of 5064 4100 jvvdd.exe 87 PID 4100 wrote to memory of 5064 4100 jvvdd.exe 87 PID 5064 wrote to memory of 2088 5064 nntnnt.exe 88 PID 5064 wrote to memory of 2088 5064 nntnnt.exe 88 PID 5064 wrote to memory of 2088 5064 nntnnt.exe 88 PID 2088 wrote to memory of 4164 2088 jdjdd.exe 89 PID 2088 wrote to memory of 4164 2088 jdjdd.exe 89 PID 2088 wrote to memory of 4164 2088 jdjdd.exe 89 PID 4164 wrote to memory of 1664 4164 ntthbn.exe 90 PID 4164 wrote to memory of 1664 4164 ntthbn.exe 90 PID 4164 wrote to memory of 1664 4164 ntthbn.exe 90 PID 1664 wrote to memory of 1684 1664 jpvpj.exe 91 PID 1664 wrote to memory of 1684 1664 jpvpj.exe 91 PID 1664 wrote to memory of 1684 1664 jpvpj.exe 91 PID 1684 wrote to memory of 2868 1684 266464.exe 92 PID 1684 wrote to memory of 2868 1684 266464.exe 92 PID 1684 wrote to memory of 2868 1684 266464.exe 92 PID 2868 wrote to memory of 3788 2868 bnnnhh.exe 93 PID 2868 wrote to memory of 3788 2868 bnnnhh.exe 93 PID 2868 wrote to memory of 3788 2868 bnnnhh.exe 93 PID 3788 wrote to memory of 3832 3788 xxfrlrf.exe 94 PID 3788 wrote to memory of 3832 3788 xxfrlrf.exe 94 PID 3788 wrote to memory of 3832 3788 xxfrlrf.exe 94 PID 3832 wrote to memory of 3908 3832 422604.exe 95 PID 3832 wrote to memory of 3908 3832 422604.exe 95 PID 3832 wrote to memory of 3908 3832 422604.exe 95 PID 3908 wrote to memory of 3208 3908 828282.exe 96 PID 3908 wrote to memory of 3208 3908 828282.exe 96 PID 3908 wrote to memory of 3208 3908 828282.exe 96 PID 3208 wrote to memory of 2240 3208 rllxfrr.exe 97 PID 3208 wrote to memory of 2240 3208 rllxfrr.exe 97 PID 3208 wrote to memory of 2240 3208 rllxfrr.exe 97 PID 2240 wrote to memory of 3468 2240 nbtbhn.exe 98 PID 2240 wrote to memory of 3468 2240 nbtbhn.exe 98 PID 2240 wrote to memory of 3468 2240 nbtbhn.exe 98 PID 3468 wrote to memory of 3372 3468 a0268.exe 99 PID 3468 wrote to memory of 3372 3468 a0268.exe 99 PID 3468 wrote to memory of 3372 3468 a0268.exe 99 PID 3372 wrote to memory of 3024 3372 42248.exe 100 PID 3372 wrote to memory of 3024 3372 42248.exe 100 PID 3372 wrote to memory of 3024 3372 42248.exe 100 PID 3024 wrote to memory of 4960 3024 lflffxr.exe 101 PID 3024 wrote to memory of 4960 3024 lflffxr.exe 101 PID 3024 wrote to memory of 4960 3024 lflffxr.exe 101 PID 4960 wrote to memory of 4376 4960 htnbtn.exe 102 PID 4960 wrote to memory of 4376 4960 htnbtn.exe 102 PID 4960 wrote to memory of 4376 4960 htnbtn.exe 102 PID 4376 wrote to memory of 2728 4376 5bhbtn.exe 103 PID 4376 wrote to memory of 2728 4376 5bhbtn.exe 103 PID 4376 wrote to memory of 2728 4376 5bhbtn.exe 103 PID 2728 wrote to memory of 100 2728 8004882.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe"C:\Users\Admin\AppData\Local\Temp\a860770a1163f7c0ed45645994cce2d597240f69a408f1244493850532323bd0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\ttbttt.exec:\ttbttt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\04628.exec:\04628.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\2222662.exec:\2222662.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\jvvdd.exec:\jvvdd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
\??\c:\nntnnt.exec:\nntnnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\jdjdd.exec:\jdjdd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\ntthbn.exec:\ntthbn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\jpvpj.exec:\jpvpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\266464.exec:\266464.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\bnnnhh.exec:\bnnnhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\xxfrlrf.exec:\xxfrlrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\422604.exec:\422604.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\828282.exec:\828282.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\rllxfrr.exec:\rllxfrr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\nbtbhn.exec:\nbtbhn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\a0268.exec:\a0268.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\42248.exec:\42248.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
\??\c:\lflffxr.exec:\lflffxr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\htnbtn.exec:\htnbtn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
\??\c:\5bhbtn.exec:\5bhbtn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\8004882.exec:\8004882.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\rxfrlxr.exec:\rxfrlxr.exe23⤵
- Executes dropped EXE
PID:100 -
\??\c:\28860.exec:\28860.exe24⤵
- Executes dropped EXE
PID:3172 -
\??\c:\a6686.exec:\a6686.exe25⤵
- Executes dropped EXE
PID:3552 -
\??\c:\04482.exec:\04482.exe26⤵
- Executes dropped EXE
PID:2156 -
\??\c:\bbtthb.exec:\bbtthb.exe27⤵
- Executes dropped EXE
PID:2584 -
\??\c:\vjjpj.exec:\vjjpj.exe28⤵
- Executes dropped EXE
PID:4460 -
\??\c:\llrlfxr.exec:\llrlfxr.exe29⤵
- Executes dropped EXE
PID:4976 -
\??\c:\8828648.exec:\8828648.exe30⤵
- Executes dropped EXE
PID:4432 -
\??\c:\ttthhn.exec:\ttthhn.exe31⤵
- Executes dropped EXE
PID:2184 -
\??\c:\pddvp.exec:\pddvp.exe32⤵
- Executes dropped EXE
PID:2096 -
\??\c:\dvdvv.exec:\dvdvv.exe33⤵
- Executes dropped EXE
PID:388 -
\??\c:\frlffxr.exec:\frlffxr.exe34⤵
- Executes dropped EXE
PID:884 -
\??\c:\g4642.exec:\g4642.exe35⤵
- Executes dropped EXE
PID:4944 -
\??\c:\4624026.exec:\4624026.exe36⤵
- Executes dropped EXE
PID:4324 -
\??\c:\vjjvv.exec:\vjjvv.exe37⤵
- Executes dropped EXE
PID:3200 -
\??\c:\jdpvp.exec:\jdpvp.exe38⤵
- Executes dropped EXE
PID:936 -
\??\c:\fflfrxr.exec:\fflfrxr.exe39⤵
- Executes dropped EXE
PID:4172 -
\??\c:\88628.exec:\88628.exe40⤵
- Executes dropped EXE
PID:1220 -
\??\c:\xflfrrx.exec:\xflfrrx.exe41⤵
- Executes dropped EXE
PID:1488 -
\??\c:\jjpdp.exec:\jjpdp.exe42⤵
- Executes dropped EXE
PID:512 -
\??\c:\thhtbt.exec:\thhtbt.exe43⤵
- Executes dropped EXE
PID:4664 -
\??\c:\rfxrflf.exec:\rfxrflf.exe44⤵
- Executes dropped EXE
PID:3284 -
\??\c:\42264.exec:\42264.exe45⤵
- Executes dropped EXE
PID:3196 -
\??\c:\pvvpp.exec:\pvvpp.exe46⤵
- Executes dropped EXE
PID:5032 -
\??\c:\222644.exec:\222644.exe47⤵
- Executes dropped EXE
PID:3280 -
\??\c:\s2482.exec:\s2482.exe48⤵
- Executes dropped EXE
PID:4528 -
\??\c:\a2206.exec:\a2206.exe49⤵
- Executes dropped EXE
PID:2508 -
\??\c:\40626.exec:\40626.exe50⤵
- Executes dropped EXE
PID:4544 -
\??\c:\htbtbn.exec:\htbtbn.exe51⤵
- Executes dropped EXE
PID:4916 -
\??\c:\xrxrrrl.exec:\xrxrrrl.exe52⤵
- Executes dropped EXE
PID:1420 -
\??\c:\822666.exec:\822666.exe53⤵
- Executes dropped EXE
PID:4044 -
\??\c:\4026000.exec:\4026000.exe54⤵PID:4396
-
\??\c:\bnbbtt.exec:\bnbbtt.exe55⤵
- Executes dropped EXE
PID:4456 -
\??\c:\jdjjd.exec:\jdjjd.exe56⤵
- Executes dropped EXE
PID:1456 -
\??\c:\u466444.exec:\u466444.exe57⤵
- Executes dropped EXE
PID:688 -
\??\c:\flrfxrr.exec:\flrfxrr.exe58⤵
- Executes dropped EXE
PID:4760 -
\??\c:\6026022.exec:\6026022.exe59⤵
- Executes dropped EXE
PID:2732 -
\??\c:\frlxfff.exec:\frlxfff.exe60⤵
- Executes dropped EXE
PID:1068 -
\??\c:\222284.exec:\222284.exe61⤵
- Executes dropped EXE
PID:1736 -
\??\c:\lllxfrl.exec:\lllxfrl.exe62⤵
- Executes dropped EXE
PID:3852 -
\??\c:\s8002.exec:\s8002.exe63⤵
- Executes dropped EXE
PID:1896 -
\??\c:\4468222.exec:\4468222.exe64⤵
- Executes dropped EXE
PID:3248 -
\??\c:\hhttnt.exec:\hhttnt.exe65⤵
- Executes dropped EXE
PID:3516 -
\??\c:\pjvvv.exec:\pjvvv.exe66⤵
- Executes dropped EXE
PID:4164 -
\??\c:\02469jd.exec:\02469jd.exe67⤵PID:728
-
\??\c:\rfffxrx.exec:\rfffxrx.exe68⤵PID:1664
-
\??\c:\0404668.exec:\0404668.exe69⤵PID:1472
-
\??\c:\pdpjd.exec:\pdpjd.exe70⤵PID:5100
-
\??\c:\s4226.exec:\s4226.exe71⤵PID:5004
-
\??\c:\4248006.exec:\4248006.exe72⤵PID:5060
-
\??\c:\20226.exec:\20226.exe73⤵PID:2764
-
\??\c:\22404.exec:\22404.exe74⤵PID:3908
-
\??\c:\488224.exec:\488224.exe75⤵PID:3340
-
\??\c:\rrrlxfx.exec:\rrrlxfx.exe76⤵
- System Location Discovery: System Language Discovery
PID:2496 -
\??\c:\s6806.exec:\s6806.exe77⤵PID:1844
-
\??\c:\860848.exec:\860848.exe78⤵PID:3024
-
\??\c:\64080.exec:\64080.exe79⤵PID:1792
-
\??\c:\pjvpp.exec:\pjvpp.exe80⤵PID:2728
-
\??\c:\6048022.exec:\6048022.exe81⤵PID:4692
-
\??\c:\fxfxlff.exec:\fxfxlff.exe82⤵PID:100
-
\??\c:\e86088.exec:\e86088.exe83⤵PID:464
-
\??\c:\hbbttn.exec:\hbbttn.exe84⤵PID:2156
-
\??\c:\bnnbbt.exec:\bnnbbt.exe85⤵PID:920
-
\??\c:\7fxrffr.exec:\7fxrffr.exe86⤵PID:4524
-
\??\c:\6446868.exec:\6446868.exe87⤵PID:4056
-
\??\c:\88466.exec:\88466.exe88⤵PID:3464
-
\??\c:\4282666.exec:\4282666.exe89⤵PID:3412
-
\??\c:\bbtntt.exec:\bbtntt.exe90⤵PID:5108
-
\??\c:\02800.exec:\02800.exe91⤵PID:2264
-
\??\c:\rflfrrl.exec:\rflfrrl.exe92⤵PID:1224
-
\??\c:\i066004.exec:\i066004.exe93⤵PID:4868
-
\??\c:\s6042.exec:\s6042.exe94⤵PID:2360
-
\??\c:\444462.exec:\444462.exe95⤵PID:3044
-
\??\c:\62442.exec:\62442.exe96⤵PID:2004
-
\??\c:\lflfffx.exec:\lflfffx.exe97⤵PID:3448
-
\??\c:\o002426.exec:\o002426.exe98⤵PID:932
-
\??\c:\bbthtn.exec:\bbthtn.exe99⤵PID:2120
-
\??\c:\tbthtt.exec:\tbthtt.exe100⤵PID:632
-
\??\c:\htnhbt.exec:\htnhbt.exe101⤵PID:1608
-
\??\c:\nbhhbn.exec:\nbhhbn.exe102⤵PID:3640
-
\??\c:\nhtbnb.exec:\nhtbnb.exe103⤵PID:3280
-
\??\c:\dddvv.exec:\dddvv.exe104⤵PID:2196
-
\??\c:\fllfllf.exec:\fllfllf.exe105⤵PID:3064
-
\??\c:\28468.exec:\28468.exe106⤵PID:4736
-
\??\c:\pddvp.exec:\pddvp.exe107⤵PID:456
-
\??\c:\3pjvd.exec:\3pjvd.exe108⤵PID:3028
-
\??\c:\btnbhn.exec:\btnbhn.exe109⤵PID:3360
-
\??\c:\nbbtnh.exec:\nbbtnh.exe110⤵PID:4044
-
\??\c:\7dvdp.exec:\7dvdp.exe111⤵PID:2268
-
\??\c:\606606.exec:\606606.exe112⤵PID:4456
-
\??\c:\4468802.exec:\4468802.exe113⤵PID:4848
-
\??\c:\bbhbbh.exec:\bbhbbh.exe114⤵PID:3880
-
\??\c:\pjjdv.exec:\pjjdv.exe115⤵PID:3032
-
\??\c:\jjdvp.exec:\jjdvp.exe116⤵PID:1144
-
\??\c:\hbbtnh.exec:\hbbtnh.exe117⤵
- System Location Discovery: System Language Discovery
PID:2220 -
\??\c:\g8422.exec:\g8422.exe118⤵PID:4484
-
\??\c:\i206684.exec:\i206684.exe119⤵PID:1068
-
\??\c:\26260.exec:\26260.exe120⤵PID:436
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe121⤵PID:2352
-
\??\c:\444004.exec:\444004.exe122⤵PID:4360
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-