Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 18:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
120 seconds
General
-
Target
53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe
-
Size
456KB
-
MD5
19a1c8ed562a373bb36090ce19bca350
-
SHA1
934d038f823d40a125b99903933022d02afd3eef
-
SHA256
53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3
-
SHA512
2e2ae9472869a52b48fc7fdabb06e86d5c20664210c39189557d625f319b9dbbe819be16a5a716d20d33dd0936ba7bc413ffe5b6e1704d138ea60788708396dd
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRj:q7Tc2NYHUrAwfMp3CDRj
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4984-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4576-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1544-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/400-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3432-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/984-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1224-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2948-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3680-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3888-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/216-73-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3332-79-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2828-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4580-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1632-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2540-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4752-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4880-112-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4084-128-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2004-138-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3540-144-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/792-156-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1588-161-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2516-167-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4740-178-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3308-185-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3828-189-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4964-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1996-197-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2100-204-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3880-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4536-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/812-222-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3156-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3876-236-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2228-249-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1112-256-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3468-260-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3928-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3024-271-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2084-278-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3288-294-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4372-298-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3612-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4368-312-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3096-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2680-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1520-336-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1716-355-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4512-368-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1504-381-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3696-424-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3340-431-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1712-459-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/468-472-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2676-556-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3416-560-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3956-570-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3080-583-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3472-602-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3512-741-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3552-959-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/392-978-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/512-1055-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4576 hbhbnh.exe 1544 dvvjp.exe 400 tbhthb.exe 3432 djdpd.exe 984 jjdvj.exe 1224 tbbnhb.exe 2948 rlfrrll.exe 1616 dddvj.exe 4336 rrllfxx.exe 3680 hnnhtn.exe 3888 rfrfrlx.exe 216 bnhbtn.exe 3332 dppvp.exe 2828 jjpjp.exe 4580 hbbnbt.exe 1632 bhhtht.exe 2540 9rrfxrr.exe 4752 rffrrll.exe 4880 jdvpd.exe 1892 vjjvj.exe 4084 tbbnbt.exe 1248 dvvdp.exe 2004 9xxllxf.exe 3540 nbnbnh.exe 4532 9xrlfrl.exe 792 tbhbnh.exe 1588 vvdvj.exe 2516 7bnnbn.exe 4544 dpjdj.exe 4740 rxfrlfr.exe 3308 dpjvj.exe 3828 xlfrxrf.exe 4964 1frrrrf.exe 1996 pppjd.exe 3868 lxrffxl.exe 2100 1tbttn.exe 3880 5ppjv.exe 4536 vddvd.exe 4888 llrfrrf.exe 3656 bnnnbt.exe 812 httnhb.exe 4844 vvpdp.exe 3156 3rrfxrf.exe 3712 7nhhtn.exe 3876 dpvdp.exe 1428 7pvjp.exe 4244 xlxllxx.exe 4428 bhbnhb.exe 2228 nhbnbb.exe 4984 dpjdj.exe 1112 7fxlrll.exe 3468 5nhthb.exe 940 3bntht.exe 3928 xrfffxx.exe 3024 nnbttt.exe 1436 jdvpj.exe 2084 9xfxrrf.exe 3940 hthbtt.exe 464 7jdjv.exe 4152 jdpjj.exe 1036 xlxxffx.exe 3288 1hbbtt.exe 4372 dpdvj.exe 4952 fxfxlll.exe -
resource yara_rule behavioral2/memory/4984-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4576-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1544-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/400-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3432-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3432-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/984-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1224-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2948-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3680-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3888-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/216-73-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3332-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4580-87-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2828-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4580-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1632-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2540-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4752-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-112-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4084-128-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2004-138-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3540-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/792-156-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1588-161-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2516-167-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4740-178-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-185-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3828-189-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4964-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1996-197-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2100-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3880-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4536-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/812-222-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3156-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-236-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2228-249-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1112-256-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3468-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3928-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3024-271-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2084-278-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3288-294-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4372-298-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-308-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3096-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2680-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1520-336-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1716-355-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4512-368-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1504-381-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3696-424-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3340-431-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1712-459-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-472-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3820-521-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2676-556-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3416-560-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3956-570-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3080-583-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3472-602-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3512-741-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fflxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fxxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xxrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlfrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lrlllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4576 4984 53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe 84 PID 4984 wrote to memory of 4576 4984 53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe 84 PID 4984 wrote to memory of 4576 4984 53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe 84 PID 4576 wrote to memory of 1544 4576 hbhbnh.exe 85 PID 4576 wrote to memory of 1544 4576 hbhbnh.exe 85 PID 4576 wrote to memory of 1544 4576 hbhbnh.exe 85 PID 1544 wrote to memory of 400 1544 dvvjp.exe 86 PID 1544 wrote to memory of 400 1544 dvvjp.exe 86 PID 1544 wrote to memory of 400 1544 dvvjp.exe 86 PID 400 wrote to memory of 3432 400 tbhthb.exe 87 PID 400 wrote to memory of 3432 400 tbhthb.exe 87 PID 400 wrote to memory of 3432 400 tbhthb.exe 87 PID 3432 wrote to memory of 984 3432 djdpd.exe 88 PID 3432 wrote to memory of 984 3432 djdpd.exe 88 PID 3432 wrote to memory of 984 3432 djdpd.exe 88 PID 984 wrote to memory of 1224 984 jjdvj.exe 89 PID 984 wrote to memory of 1224 984 jjdvj.exe 89 PID 984 wrote to memory of 1224 984 jjdvj.exe 89 PID 1224 wrote to memory of 2948 1224 tbbnhb.exe 90 PID 1224 wrote to memory of 2948 1224 tbbnhb.exe 90 PID 1224 wrote to memory of 2948 1224 tbbnhb.exe 90 PID 2948 wrote to memory of 1616 2948 rlfrrll.exe 91 PID 2948 wrote to memory of 1616 2948 rlfrrll.exe 91 PID 2948 wrote to memory of 1616 2948 rlfrrll.exe 91 PID 1616 wrote to memory of 4336 1616 dddvj.exe 92 PID 1616 wrote to memory of 4336 1616 dddvj.exe 92 PID 1616 wrote to memory of 4336 1616 dddvj.exe 92 PID 4336 wrote to memory of 3680 4336 rrllfxx.exe 93 PID 4336 wrote to memory of 3680 4336 rrllfxx.exe 93 PID 4336 wrote to memory of 3680 4336 rrllfxx.exe 93 PID 3680 wrote to memory of 3888 3680 hnnhtn.exe 94 PID 3680 wrote to memory of 3888 3680 hnnhtn.exe 94 PID 3680 wrote to memory of 3888 3680 hnnhtn.exe 94 PID 3888 wrote to memory of 216 3888 rfrfrlx.exe 95 PID 3888 wrote to memory of 216 3888 rfrfrlx.exe 95 PID 3888 wrote to memory of 216 3888 rfrfrlx.exe 95 PID 216 wrote to memory of 3332 216 bnhbtn.exe 96 PID 216 wrote to memory of 3332 216 bnhbtn.exe 96 PID 216 wrote to memory of 3332 216 bnhbtn.exe 96 PID 3332 wrote to memory of 2828 3332 dppvp.exe 97 PID 3332 wrote to memory of 2828 3332 dppvp.exe 97 PID 3332 wrote to memory of 2828 3332 dppvp.exe 97 PID 2828 wrote to memory of 4580 2828 jjpjp.exe 98 PID 2828 wrote to memory of 4580 2828 jjpjp.exe 98 PID 2828 wrote to memory of 4580 2828 jjpjp.exe 98 PID 4580 wrote to memory of 1632 4580 hbbnbt.exe 99 PID 4580 wrote to memory of 1632 4580 hbbnbt.exe 99 PID 4580 wrote to memory of 1632 4580 hbbnbt.exe 99 PID 1632 wrote to memory of 2540 1632 bhhtht.exe 100 PID 1632 wrote to memory of 2540 1632 bhhtht.exe 100 PID 1632 wrote to memory of 2540 1632 bhhtht.exe 100 PID 2540 wrote to memory of 4752 2540 9rrfxrr.exe 101 PID 2540 wrote to memory of 4752 2540 9rrfxrr.exe 101 PID 2540 wrote to memory of 4752 2540 9rrfxrr.exe 101 PID 4752 wrote to memory of 4880 4752 rffrrll.exe 102 PID 4752 wrote to memory of 4880 4752 rffrrll.exe 102 PID 4752 wrote to memory of 4880 4752 rffrrll.exe 102 PID 4880 wrote to memory of 1892 4880 jdvpd.exe 103 PID 4880 wrote to memory of 1892 4880 jdvpd.exe 103 PID 4880 wrote to memory of 1892 4880 jdvpd.exe 103 PID 1892 wrote to memory of 4084 1892 vjjvj.exe 104 PID 1892 wrote to memory of 4084 1892 vjjvj.exe 104 PID 1892 wrote to memory of 4084 1892 vjjvj.exe 104 PID 4084 wrote to memory of 1248 4084 tbbnbt.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe"C:\Users\Admin\AppData\Local\Temp\53b366779b6c0c9ae914bb22d2b7104ebae39282e4199bf77fa5cfb6b57ad8f3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\hbhbnh.exec:\hbhbnh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\dvvjp.exec:\dvvjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\tbhthb.exec:\tbhthb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\djdpd.exec:\djdpd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
\??\c:\jjdvj.exec:\jjdvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
\??\c:\tbbnhb.exec:\tbbnhb.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
\??\c:\rlfrrll.exec:\rlfrrll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\dddvj.exec:\dddvj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\rrllfxx.exec:\rrllfxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
\??\c:\hnnhtn.exec:\hnnhtn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\rfrfrlx.exec:\rfrfrlx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
\??\c:\bnhbtn.exec:\bnhbtn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\dppvp.exec:\dppvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
\??\c:\jjpjp.exec:\jjpjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\hbbnbt.exec:\hbbnbt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\bhhtht.exec:\bhhtht.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\9rrfxrr.exec:\9rrfxrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\rffrrll.exec:\rffrrll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\jdvpd.exec:\jdvpd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
\??\c:\vjjvj.exec:\vjjvj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\tbbnbt.exec:\tbbnbt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\dvvdp.exec:\dvvdp.exe23⤵
- Executes dropped EXE
PID:1248 -
\??\c:\9xxllxf.exec:\9xxllxf.exe24⤵
- Executes dropped EXE
PID:2004 -
\??\c:\nbnbnh.exec:\nbnbnh.exe25⤵
- Executes dropped EXE
PID:3540 -
\??\c:\9xrlfrl.exec:\9xrlfrl.exe26⤵
- Executes dropped EXE
PID:4532 -
\??\c:\tbhbnh.exec:\tbhbnh.exe27⤵
- Executes dropped EXE
PID:792 -
\??\c:\vvdvj.exec:\vvdvj.exe28⤵
- Executes dropped EXE
PID:1588 -
\??\c:\7bnnbn.exec:\7bnnbn.exe29⤵
- Executes dropped EXE
PID:2516 -
\??\c:\dpjdj.exec:\dpjdj.exe30⤵
- Executes dropped EXE
PID:4544 -
\??\c:\rxfrlfr.exec:\rxfrlfr.exe31⤵
- Executes dropped EXE
PID:4740 -
\??\c:\dpjvj.exec:\dpjvj.exe32⤵
- Executes dropped EXE
PID:3308 -
\??\c:\xlfrxrf.exec:\xlfrxrf.exe33⤵
- Executes dropped EXE
PID:3828 -
\??\c:\1frrrrf.exec:\1frrrrf.exe34⤵
- Executes dropped EXE
PID:4964 -
\??\c:\pppjd.exec:\pppjd.exe35⤵
- Executes dropped EXE
PID:1996 -
\??\c:\lxrffxl.exec:\lxrffxl.exe36⤵
- Executes dropped EXE
PID:3868 -
\??\c:\1tbttn.exec:\1tbttn.exe37⤵
- Executes dropped EXE
PID:2100 -
\??\c:\5ppjv.exec:\5ppjv.exe38⤵
- Executes dropped EXE
PID:3880 -
\??\c:\vddvd.exec:\vddvd.exe39⤵
- Executes dropped EXE
PID:4536 -
\??\c:\llrfrrf.exec:\llrfrrf.exe40⤵
- Executes dropped EXE
PID:4888 -
\??\c:\bnnnbt.exec:\bnnnbt.exe41⤵
- Executes dropped EXE
PID:3656 -
\??\c:\httnhb.exec:\httnhb.exe42⤵
- Executes dropped EXE
PID:812 -
\??\c:\vvpdp.exec:\vvpdp.exe43⤵
- Executes dropped EXE
PID:4844 -
\??\c:\3rrfxrf.exec:\3rrfxrf.exe44⤵
- Executes dropped EXE
PID:3156 -
\??\c:\7nhhtn.exec:\7nhhtn.exe45⤵
- Executes dropped EXE
PID:3712 -
\??\c:\dpvdp.exec:\dpvdp.exe46⤵
- Executes dropped EXE
PID:3876 -
\??\c:\7pvjp.exec:\7pvjp.exe47⤵
- Executes dropped EXE
PID:1428 -
\??\c:\xlxllxx.exec:\xlxllxx.exe48⤵
- Executes dropped EXE
PID:4244 -
\??\c:\bhbnhb.exec:\bhbnhb.exe49⤵
- Executes dropped EXE
PID:4428 -
\??\c:\nhbnbb.exec:\nhbnbb.exe50⤵
- Executes dropped EXE
PID:2228 -
\??\c:\dpjdj.exec:\dpjdj.exe51⤵
- Executes dropped EXE
PID:4984 -
\??\c:\7fxlrll.exec:\7fxlrll.exe52⤵
- Executes dropped EXE
PID:1112 -
\??\c:\5nhthb.exec:\5nhthb.exe53⤵
- Executes dropped EXE
PID:3468 -
\??\c:\3bntht.exec:\3bntht.exe54⤵
- Executes dropped EXE
PID:940 -
\??\c:\xrfffxx.exec:\xrfffxx.exe55⤵
- Executes dropped EXE
PID:3928 -
\??\c:\nnbttt.exec:\nnbttt.exe56⤵
- Executes dropped EXE
PID:3024 -
\??\c:\jdvpj.exec:\jdvpj.exe57⤵
- Executes dropped EXE
PID:1436 -
\??\c:\9xfxrrf.exec:\9xfxrrf.exe58⤵
- Executes dropped EXE
PID:2084 -
\??\c:\hthbtt.exec:\hthbtt.exe59⤵
- Executes dropped EXE
PID:3940 -
\??\c:\7jdjv.exec:\7jdjv.exe60⤵
- Executes dropped EXE
PID:464 -
\??\c:\jdpjj.exec:\jdpjj.exe61⤵
- Executes dropped EXE
PID:4152 -
\??\c:\xlxxffx.exec:\xlxxffx.exe62⤵
- Executes dropped EXE
PID:1036 -
\??\c:\1hbbtt.exec:\1hbbtt.exe63⤵
- Executes dropped EXE
PID:3288 -
\??\c:\dpdvj.exec:\dpdvj.exe64⤵
- Executes dropped EXE
PID:4372 -
\??\c:\fxfxlll.exec:\fxfxlll.exe65⤵
- Executes dropped EXE
PID:4952 -
\??\c:\1hnhtt.exec:\1hnhtt.exe66⤵
- System Location Discovery: System Language Discovery
PID:2168 -
\??\c:\tntbtt.exec:\tntbtt.exe67⤵PID:3612
-
\??\c:\dvvvp.exec:\dvvvp.exe68⤵PID:4368
-
\??\c:\7flffrl.exec:\7flffrl.exe69⤵PID:3096
-
\??\c:\bthhtt.exec:\bthhtt.exe70⤵PID:4792
-
\??\c:\ddpdj.exec:\ddpdj.exe71⤵PID:1276
-
\??\c:\vpvpd.exec:\vpvpd.exe72⤵PID:668
-
\??\c:\llrrrrl.exec:\llrrrrl.exe73⤵PID:2680
-
\??\c:\ttnhhb.exec:\ttnhhb.exe74⤵PID:2452
-
\??\c:\9jpjv.exec:\9jpjv.exe75⤵PID:3512
-
\??\c:\vdpvp.exec:\vdpvp.exe76⤵PID:1520
-
\??\c:\rffrrll.exec:\rffrrll.exe77⤵PID:4556
-
\??\c:\btbtbh.exec:\btbtbh.exe78⤵PID:4752
-
\??\c:\7vvvv.exec:\7vvvv.exe79⤵PID:944
-
\??\c:\3xrfrrf.exec:\3xrfrrf.exe80⤵PID:4236
-
\??\c:\nhhbtt.exec:\nhhbtt.exe81⤵PID:4216
-
\??\c:\vddvp.exec:\vddvp.exe82⤵PID:1716
-
\??\c:\dpjpj.exec:\dpjpj.exe83⤵PID:5044
-
\??\c:\lxfrfxl.exec:\lxfrfxl.exe84⤵PID:316
-
\??\c:\llrfxrl.exec:\llrfxrl.exe85⤵PID:4512
-
\??\c:\bnhhnh.exec:\bnhhnh.exe86⤵PID:3988
-
\??\c:\jpvjp.exec:\jpvjp.exe87⤵PID:4944
-
\??\c:\1rlxllx.exec:\1rlxllx.exe88⤵PID:2836
-
\??\c:\rffrfxl.exec:\rffrfxl.exe89⤵PID:1504
-
\??\c:\nbnbnh.exec:\nbnbnh.exe90⤵PID:3108
-
\??\c:\ppvjv.exec:\ppvjv.exe91⤵
- System Location Discovery: System Language Discovery
PID:1312 -
\??\c:\vjdpd.exec:\vjdpd.exe92⤵PID:3464
-
\??\c:\7xxlfxr.exec:\7xxlfxr.exe93⤵PID:4732
-
\??\c:\bbhbtn.exec:\bbhbtn.exe94⤵PID:3696
-
\??\c:\jpvpp.exec:\jpvpp.exe95⤵PID:4248
-
\??\c:\rfxrfxx.exec:\rfxrfxx.exe96⤵PID:4432
-
\??\c:\rllfrrl.exec:\rllfrrl.exe97⤵PID:1200
-
\??\c:\7nnhbt.exec:\7nnhbt.exe98⤵PID:2928
-
\??\c:\pdvjj.exec:\pdvjj.exe99⤵PID:4168
-
\??\c:\flrrlrl.exec:\flrrlrl.exe100⤵PID:3392
-
\??\c:\1tthhb.exec:\1tthhb.exe101⤵PID:3788
-
\??\c:\pjvjd.exec:\pjvjd.exe102⤵PID:4064
-
\??\c:\pdjdd.exec:\pdjdd.exe103⤵PID:4464
-
\??\c:\xxfxllf.exec:\xxfxllf.exe104⤵PID:3716
-
\??\c:\tnbttb.exec:\tnbttb.exe105⤵PID:3340
-
\??\c:\pjjpj.exec:\pjjpj.exe106⤵PID:2196
-
\??\c:\1xfrxrf.exec:\1xfrxrf.exe107⤵PID:3420
-
\??\c:\htbtnh.exec:\htbtnh.exe108⤵PID:640
-
\??\c:\3nthth.exec:\3nthth.exe109⤵PID:540
-
\??\c:\1ddvd.exec:\1ddvd.exe110⤵PID:1008
-
\??\c:\9jjvj.exec:\9jjvj.exe111⤵PID:880
-
\??\c:\fllfxrf.exec:\fllfxrf.exe112⤵PID:1428
-
\??\c:\hbbtbt.exec:\hbbtbt.exe113⤵PID:4416
-
\??\c:\ddddp.exec:\ddddp.exe114⤵PID:1712
-
\??\c:\3vpdp.exec:\3vpdp.exe115⤵PID:2228
-
\??\c:\xffxxrr.exec:\xffxxrr.exe116⤵PID:4604
-
\??\c:\thhthb.exec:\thhthb.exe117⤵PID:1112
-
\??\c:\hnnbhb.exec:\hnnbhb.exe118⤵PID:468
-
\??\c:\pvjvd.exec:\pvjvd.exe119⤵PID:400
-
\??\c:\lllxlrf.exec:\lllxlrf.exe120⤵PID:2604
-
\??\c:\fflfrfx.exec:\fflfrfx.exe121⤵PID:4872
-
\??\c:\9nnhtn.exec:\9nnhtn.exe122⤵PID:1196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-