Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 01:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe
Resource
win7-20240708-en
windows7-x64
7 signatures
120 seconds
General
-
Target
dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe
-
Size
456KB
-
MD5
656dc348691e88993ace2835252d4ac1
-
SHA1
481a28d2dbedaf72d434cfae0c5406fbb9836160
-
SHA256
dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f
-
SHA512
a1323ae911c9546573b5ccb7c08ca36e3ad6c2d2c252b0d983e5d319ab4850d6b7fbb970861d5911945b117c1ec42b98c144005e0180581201dde2b4f64fab05
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeLe:q7Tc2NYHUrAwfMp3CDLe
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/3932-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1440-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2232-23-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2132-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4032-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3100-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2076-40-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4980-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/984-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2140-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1704-72-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3720-155-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2672-264-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2408-281-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2844-268-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4016-248-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-244-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3432-237-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4008-233-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/724-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/464-213-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5000-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4984-205-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1620-195-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4676-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1276-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/900-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3588-172-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3384-166-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1244-144-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1504-138-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3020-127-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2516-121-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1780-112-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2852-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2940-88-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3308-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3952-53-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3952-297-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2092-304-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2236-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3848-317-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3648-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1564-355-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1444-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4424-423-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2532-430-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1624-437-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4740-463-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3392-485-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-498-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3996-523-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2952-548-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2508-561-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1308-586-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4736-644-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/440-669-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3328-688-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/528-758-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4688-831-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4320-1194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2316-1267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4472-1736-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3100 ddvvd.exe 1440 hbnhbt.exe 4032 822600.exe 2232 djpjd.exe 2132 4060482.exe 2076 2084882.exe 4980 22842.exe 3952 ffllxxf.exe 984 rlllffx.exe 3308 6288882.exe 2140 xlrlflf.exe 1704 084268.exe 2164 484488.exe 4500 4660864.exe 2940 4468260.exe 3648 2064644.exe 4156 dvdpj.exe 1780 7vdvp.exe 2852 tnnhnn.exe 4528 ttnhtt.exe 2516 4804844.exe 3020 rfxrrrl.exe 1992 8282266.exe 1504 46226.exe 1244 1djdv.exe 1264 4248488.exe 3720 jdvpj.exe 2188 4426004.exe 3384 lxxrlfx.exe 3588 468266.exe 5016 4840448.exe 900 6466266.exe 1276 5xfxrrl.exe 4676 rxfrllf.exe 1620 60826.exe 2708 lflffff.exe 4464 rxxlfrl.exe 4984 4000484.exe 5000 dppdv.exe 464 i242260.exe 2264 hntnhb.exe 724 66648.exe 2812 xrxrlfx.exe 3564 i208282.exe 4268 48882.exe 4008 u804844.exe 3432 262226.exe 4296 nhhbbb.exe 552 402044.exe 4016 400044.exe 1728 hbbbtt.exe 4300 rllrflf.exe 4280 pdjdd.exe 4672 08488.exe 2672 420088.exe 2844 06044.exe 500 8622604.exe 2232 20660.exe 532 ffxfxfl.exe 2408 68224.exe 1196 68482.exe 4532 vvdvp.exe 1840 4082666.exe 3952 xxrlfff.exe -
resource yara_rule behavioral2/memory/3932-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1440-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2232-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4032-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4032-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3100-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2076-40-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4980-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/984-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2140-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1704-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3720-155-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2672-264-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2408-281-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2844-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4016-248-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-244-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3432-237-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4008-233-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/724-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/464-213-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4984-205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1620-195-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4676-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1276-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/900-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3588-172-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3384-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1244-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1504-138-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3020-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2516-121-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1780-112-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2852-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2940-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3952-53-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3952-297-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2092-304-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2236-308-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3848-317-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3648-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-330-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1564-355-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1444-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4424-423-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2532-430-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1624-437-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4740-463-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3392-485-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5052-498-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3996-523-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-548-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2508-561-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1308-586-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4736-644-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/440-669-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3328-688-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/528-758-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4688-831-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2316-925-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4184-1133-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 006204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k84040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6608608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w66420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxllxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4000484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6048204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0864420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2664264.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3100 3932 dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe 85 PID 3932 wrote to memory of 3100 3932 dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe 85 PID 3932 wrote to memory of 3100 3932 dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe 85 PID 3100 wrote to memory of 1440 3100 ddvvd.exe 86 PID 3100 wrote to memory of 1440 3100 ddvvd.exe 86 PID 3100 wrote to memory of 1440 3100 ddvvd.exe 86 PID 1440 wrote to memory of 4032 1440 hbnhbt.exe 87 PID 1440 wrote to memory of 4032 1440 hbnhbt.exe 87 PID 1440 wrote to memory of 4032 1440 hbnhbt.exe 87 PID 4032 wrote to memory of 2232 4032 822600.exe 142 PID 4032 wrote to memory of 2232 4032 822600.exe 142 PID 4032 wrote to memory of 2232 4032 822600.exe 142 PID 2232 wrote to memory of 2132 2232 djpjd.exe 89 PID 2232 wrote to memory of 2132 2232 djpjd.exe 89 PID 2232 wrote to memory of 2132 2232 djpjd.exe 89 PID 2132 wrote to memory of 2076 2132 4060482.exe 90 PID 2132 wrote to memory of 2076 2132 4060482.exe 90 PID 2132 wrote to memory of 2076 2132 4060482.exe 90 PID 2076 wrote to memory of 4980 2076 2084882.exe 91 PID 2076 wrote to memory of 4980 2076 2084882.exe 91 PID 2076 wrote to memory of 4980 2076 2084882.exe 91 PID 4980 wrote to memory of 3952 4980 22842.exe 148 PID 4980 wrote to memory of 3952 4980 22842.exe 148 PID 4980 wrote to memory of 3952 4980 22842.exe 148 PID 3952 wrote to memory of 984 3952 ffllxxf.exe 93 PID 3952 wrote to memory of 984 3952 ffllxxf.exe 93 PID 3952 wrote to memory of 984 3952 ffllxxf.exe 93 PID 984 wrote to memory of 3308 984 rlllffx.exe 94 PID 984 wrote to memory of 3308 984 rlllffx.exe 94 PID 984 wrote to memory of 3308 984 rlllffx.exe 94 PID 3308 wrote to memory of 2140 3308 6288882.exe 95 PID 3308 wrote to memory of 2140 3308 6288882.exe 95 PID 3308 wrote to memory of 2140 3308 6288882.exe 95 PID 2140 wrote to memory of 1704 2140 xlrlflf.exe 96 PID 2140 wrote to memory of 1704 2140 xlrlflf.exe 96 PID 2140 wrote to memory of 1704 2140 xlrlflf.exe 96 PID 1704 wrote to memory of 2164 1704 084268.exe 97 PID 1704 wrote to memory of 2164 1704 084268.exe 97 PID 1704 wrote to memory of 2164 1704 084268.exe 97 PID 2164 wrote to memory of 4500 2164 484488.exe 98 PID 2164 wrote to memory of 4500 2164 484488.exe 98 PID 2164 wrote to memory of 4500 2164 484488.exe 98 PID 4500 wrote to memory of 2940 4500 4660864.exe 99 PID 4500 wrote to memory of 2940 4500 4660864.exe 99 PID 4500 wrote to memory of 2940 4500 4660864.exe 99 PID 2940 wrote to memory of 3648 2940 4468260.exe 157 PID 2940 wrote to memory of 3648 2940 4468260.exe 157 PID 2940 wrote to memory of 3648 2940 4468260.exe 157 PID 3648 wrote to memory of 4156 3648 2064644.exe 101 PID 3648 wrote to memory of 4156 3648 2064644.exe 101 PID 3648 wrote to memory of 4156 3648 2064644.exe 101 PID 4156 wrote to memory of 1780 4156 dvdpj.exe 102 PID 4156 wrote to memory of 1780 4156 dvdpj.exe 102 PID 4156 wrote to memory of 1780 4156 dvdpj.exe 102 PID 1780 wrote to memory of 2852 1780 7vdvp.exe 103 PID 1780 wrote to memory of 2852 1780 7vdvp.exe 103 PID 1780 wrote to memory of 2852 1780 7vdvp.exe 103 PID 2852 wrote to memory of 4528 2852 tnnhnn.exe 104 PID 2852 wrote to memory of 4528 2852 tnnhnn.exe 104 PID 2852 wrote to memory of 4528 2852 tnnhnn.exe 104 PID 4528 wrote to memory of 2516 4528 ttnhtt.exe 163 PID 4528 wrote to memory of 2516 4528 ttnhtt.exe 163 PID 4528 wrote to memory of 2516 4528 ttnhtt.exe 163 PID 2516 wrote to memory of 3020 2516 4804844.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe"C:\Users\Admin\AppData\Local\Temp\dd7d5b2aa1fccd3b9d5a05806a9e91cd1554143edcf4dea4e2eaf338ff25db2f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\ddvvd.exec:\ddvvd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\hbnhbt.exec:\hbnhbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\822600.exec:\822600.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
\??\c:\djpjd.exec:\djpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\4060482.exec:\4060482.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\2084882.exec:\2084882.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\22842.exec:\22842.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\ffllxxf.exec:\ffllxxf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
\??\c:\rlllffx.exec:\rlllffx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
\??\c:\6288882.exec:\6288882.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
\??\c:\xlrlflf.exec:\xlrlflf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\084268.exec:\084268.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\484488.exec:\484488.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\4660864.exec:\4660864.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\4468260.exec:\4468260.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\2064644.exec:\2064644.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
\??\c:\dvdpj.exec:\dvdpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
\??\c:\7vdvp.exec:\7vdvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\tnnhnn.exec:\tnnhnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\ttnhtt.exec:\ttnhtt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\4804844.exec:\4804844.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\rfxrrrl.exec:\rfxrrrl.exe23⤵
- Executes dropped EXE
PID:3020 -
\??\c:\8282266.exec:\8282266.exe24⤵
- Executes dropped EXE
PID:1992 -
\??\c:\46226.exec:\46226.exe25⤵
- Executes dropped EXE
PID:1504 -
\??\c:\1djdv.exec:\1djdv.exe26⤵
- Executes dropped EXE
PID:1244 -
\??\c:\4248488.exec:\4248488.exe27⤵
- Executes dropped EXE
PID:1264 -
\??\c:\jdvpj.exec:\jdvpj.exe28⤵
- Executes dropped EXE
PID:3720 -
\??\c:\4426004.exec:\4426004.exe29⤵
- Executes dropped EXE
PID:2188 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe30⤵
- Executes dropped EXE
PID:3384 -
\??\c:\468266.exec:\468266.exe31⤵
- Executes dropped EXE
PID:3588 -
\??\c:\4840448.exec:\4840448.exe32⤵
- Executes dropped EXE
PID:5016 -
\??\c:\6466266.exec:\6466266.exe33⤵
- Executes dropped EXE
PID:900 -
\??\c:\5xfxrrl.exec:\5xfxrrl.exe34⤵
- Executes dropped EXE
PID:1276 -
\??\c:\rxfrllf.exec:\rxfrllf.exe35⤵
- Executes dropped EXE
PID:4676 -
\??\c:\60826.exec:\60826.exe36⤵
- Executes dropped EXE
PID:1620 -
\??\c:\lflffff.exec:\lflffff.exe37⤵
- Executes dropped EXE
PID:2708 -
\??\c:\rxxlfrl.exec:\rxxlfrl.exe38⤵
- Executes dropped EXE
PID:4464 -
\??\c:\4000484.exec:\4000484.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4984 -
\??\c:\dppdv.exec:\dppdv.exe40⤵
- Executes dropped EXE
PID:5000 -
\??\c:\i242260.exec:\i242260.exe41⤵
- Executes dropped EXE
PID:464 -
\??\c:\hntnhb.exec:\hntnhb.exe42⤵
- Executes dropped EXE
PID:2264 -
\??\c:\66648.exec:\66648.exe43⤵
- Executes dropped EXE
PID:724 -
\??\c:\xrxrlfx.exec:\xrxrlfx.exe44⤵
- Executes dropped EXE
PID:2812 -
\??\c:\i208282.exec:\i208282.exe45⤵
- Executes dropped EXE
PID:3564 -
\??\c:\48882.exec:\48882.exe46⤵
- Executes dropped EXE
PID:4268 -
\??\c:\u804844.exec:\u804844.exe47⤵
- Executes dropped EXE
PID:4008 -
\??\c:\262226.exec:\262226.exe48⤵
- Executes dropped EXE
PID:3432 -
\??\c:\nhhbbb.exec:\nhhbbb.exe49⤵
- Executes dropped EXE
PID:4296 -
\??\c:\402044.exec:\402044.exe50⤵
- Executes dropped EXE
PID:552 -
\??\c:\400044.exec:\400044.exe51⤵
- Executes dropped EXE
PID:4016 -
\??\c:\hbbbtt.exec:\hbbbtt.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
\??\c:\rllrflf.exec:\rllrflf.exe53⤵
- Executes dropped EXE
PID:4300 -
\??\c:\pdjdd.exec:\pdjdd.exe54⤵
- Executes dropped EXE
PID:4280 -
\??\c:\08488.exec:\08488.exe55⤵
- Executes dropped EXE
PID:4672 -
\??\c:\420088.exec:\420088.exe56⤵
- Executes dropped EXE
PID:2672 -
\??\c:\06044.exec:\06044.exe57⤵
- Executes dropped EXE
PID:2844 -
\??\c:\8622604.exec:\8622604.exe58⤵
- Executes dropped EXE
PID:500 -
\??\c:\20660.exec:\20660.exe59⤵
- Executes dropped EXE
PID:2232 -
\??\c:\ffxfxfl.exec:\ffxfxfl.exe60⤵
- Executes dropped EXE
PID:532 -
\??\c:\68224.exec:\68224.exe61⤵
- Executes dropped EXE
PID:2408 -
\??\c:\68482.exec:\68482.exe62⤵
- Executes dropped EXE
PID:1196 -
\??\c:\vvdvp.exec:\vvdvp.exe63⤵
- Executes dropped EXE
PID:4532 -
\??\c:\4082666.exec:\4082666.exe64⤵
- Executes dropped EXE
PID:1840 -
\??\c:\xxrlfff.exec:\xxrlfff.exe65⤵
- Executes dropped EXE
PID:3952 -
\??\c:\jjdvv.exec:\jjdvv.exe66⤵PID:3896
-
\??\c:\frrxrrl.exec:\frrxrrl.exe67⤵PID:2092
-
\??\c:\rfrrlff.exec:\rfrrlff.exe68⤵PID:2236
-
\??\c:\u842640.exec:\u842640.exe69⤵PID:700
-
\??\c:\6844400.exec:\6844400.exe70⤵PID:3304
-
\??\c:\rlfxlff.exec:\rlfxlff.exe71⤵PID:3848
-
\??\c:\6408422.exec:\6408422.exe72⤵PID:2340
-
\??\c:\1llxllr.exec:\1llxllr.exe73⤵PID:2152
-
\??\c:\rxxrrlx.exec:\rxxrrlx.exe74⤵PID:3648
-
\??\c:\bhbnbt.exec:\bhbnbt.exe75⤵PID:2872
-
\??\c:\rlrfxlf.exec:\rlrfxlf.exe76⤵PID:456
-
\??\c:\8220426.exec:\8220426.exe77⤵PID:776
-
\??\c:\062048.exec:\062048.exe78⤵PID:4148
-
\??\c:\e28642.exec:\e28642.exe79⤵PID:2972
-
\??\c:\6446040.exec:\6446040.exe80⤵PID:2516
-
\??\c:\4226486.exec:\4226486.exe81⤵PID:4000
-
\??\c:\68820.exec:\68820.exe82⤵PID:1564
-
\??\c:\5dppj.exec:\5dppj.exe83⤵PID:1444
-
\??\c:\648208.exec:\648208.exe84⤵PID:4352
-
\??\c:\6284264.exec:\6284264.exe85⤵PID:1264
-
\??\c:\pjpdj.exec:\pjpdj.exe86⤵PID:4572
-
\??\c:\46260.exec:\46260.exe87⤵PID:4732
-
\??\c:\60086.exec:\60086.exe88⤵PID:1804
-
\??\c:\868664.exec:\868664.exe89⤵PID:4848
-
\??\c:\2048604.exec:\2048604.exe90⤵PID:4264
-
\??\c:\xrffflr.exec:\xrffflr.exe91⤵PID:1856
-
\??\c:\44426.exec:\44426.exe92⤵PID:4568
-
\??\c:\frrrxfr.exec:\frrrxfr.exe93⤵PID:1620
-
\??\c:\jdjjv.exec:\jdjjv.exe94⤵PID:3860
-
\??\c:\pppdv.exec:\pppdv.exe95⤵PID:1228
-
\??\c:\6442864.exec:\6442864.exe96⤵PID:1844
-
\??\c:\tnhnbn.exec:\tnhnbn.exe97⤵PID:404
-
\??\c:\rlrffrx.exec:\rlrffrx.exe98⤵PID:4236
-
\??\c:\044208.exec:\044208.exe99⤵PID:464
-
\??\c:\08488.exec:\08488.exe100⤵PID:572
-
\??\c:\82826.exec:\82826.exe101⤵PID:4764
-
\??\c:\nhhthb.exec:\nhhthb.exe102⤵PID:1820
-
\??\c:\llfrfxl.exec:\llfrfxl.exe103⤵PID:2380
-
\??\c:\444426.exec:\444426.exe104⤵PID:4424
-
\??\c:\88868.exec:\88868.exe105⤵PID:4688
-
\??\c:\7nnbhn.exec:\7nnbhn.exe106⤵PID:2532
-
\??\c:\3llfrlf.exec:\3llfrlf.exe107⤵PID:4940
-
\??\c:\660004.exec:\660004.exe108⤵PID:1624
-
\??\c:\dvvjd.exec:\dvvjd.exe109⤵
- System Location Discovery: System Language Discovery
PID:4016 -
\??\c:\2464822.exec:\2464822.exe110⤵PID:2016
-
\??\c:\xxxrfxr.exec:\xxxrfxr.exe111⤵PID:2772
-
\??\c:\200426.exec:\200426.exe112⤵PID:4936
-
\??\c:\m2260.exec:\m2260.exe113⤵PID:1512
-
\??\c:\48860.exec:\48860.exe114⤵PID:3008
-
\??\c:\jdpjv.exec:\jdpjv.exe115⤵PID:4428
-
\??\c:\660042.exec:\660042.exe116⤵PID:440
-
\??\c:\8804264.exec:\8804264.exe117⤵PID:4740
-
\??\c:\vpdvp.exec:\vpdvp.exe118⤵PID:3064
-
\??\c:\22268.exec:\22268.exe119⤵PID:1732
-
\??\c:\68428.exec:\68428.exe120⤵PID:928
-
\??\c:\006686.exec:\006686.exe121⤵PID:3812
-
\??\c:\644804.exec:\644804.exe122⤵PID:3328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-