Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 01:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
120 seconds
General
-
Target
5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe
-
Size
454KB
-
MD5
92706b185a0a7917dc5a89d83c9d8c4c
-
SHA1
7ca2503787c32721b5a5c53d08d8a6282045b099
-
SHA256
5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c
-
SHA512
39e25fdf2fbb4f4bfe7ccf3fa5b4805570715e549b97d3543e2635aa8249519087bbd7688115e72f0c055796f7002b74d166bd5aa2bac661c92d35ee928e6448
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeS:q7Tc2NYHUrAwfMp3CDS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2216-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4456-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5092-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3364-43-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1948-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5032-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2420-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3136-14-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4736-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3532-65-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/116-76-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2580-83-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2768-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2096-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3588-110-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4120-117-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1128-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4424-137-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3936-146-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2352-165-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3856-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3456-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/536-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/676-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4316-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4368-205-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4216-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1628-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2040-223-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2852-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1492-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4648-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1744-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4388-249-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4376-253-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1220-266-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4500-282-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4588-292-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3532-305-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1928-309-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3208-325-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2424-344-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2632-348-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3404-355-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2640-392-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1776-396-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/880-400-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4452-413-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3604-417-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/740-421-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3004-431-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4456-471-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4980-478-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2036-521-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2580-525-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2840-538-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1880-557-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2864-672-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3828-694-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1648-792-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/436-895-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3252-1068-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/740-1217-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1760-1977-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3136 nnhhnb.exe 4456 dvdvd.exe 2420 jpjpj.exe 5092 3xffffl.exe 5032 nnbtbn.exe 4088 jjdvv.exe 3364 dvpjd.exe 1948 9rxxffl.exe 4736 ttnnhh.exe 3532 dvjdv.exe 3652 djjdv.exe 116 pppjd.exe 2580 1llfxrx.exe 3208 bhbtht.exe 4968 hbtnhb.exe 2768 3btnbb.exe 2096 rxxflff.exe 3588 pdvpj.exe 4120 ntntnh.exe 920 nnhbtn.exe 1128 bthbtn.exe 3504 xxxrffr.exe 4424 jvvvd.exe 3164 9lffffx.exe 3936 hhnnhb.exe 4656 5bntnb.exe 4284 5rxrrfx.exe 2352 nthbtn.exe 4164 lrrfxxr.exe 3856 hbbtbb.exe 3456 3ttnhh.exe 536 1lrrllf.exe 676 nhhhbb.exe 2012 rxlxxrl.exe 2128 rxxrrrl.exe 4316 1thhbb.exe 4368 vpvpd.exe 4216 rrrrlll.exe 3132 lflffff.exe 1628 nbhtnn.exe 636 jvdvp.exe 2040 dpvvp.exe 2852 xrrlfxr.exe 1492 bbbbtt.exe 1644 pvddp.exe 4648 dvjdd.exe 1744 rlxllll.exe 456 xlrfxxl.exe 4388 ddjjj.exe 4376 vvdvj.exe 3468 lxxxlfr.exe 2864 tttnhh.exe 3280 jddvj.exe 1220 7xxrlff.exe 5092 hbbtbb.exe 4184 7hnbbn.exe 4732 vppdv.exe 4964 rxfxllf.exe 4500 nnnhbn.exe 3764 dpjvp.exe 3140 fxffrlr.exe 4588 rllxrlx.exe 1216 nntbtn.exe 1052 pjvvd.exe -
resource yara_rule behavioral2/memory/2216-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4456-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5092-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-43-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1948-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5032-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2420-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2420-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3136-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4736-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3532-65-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/116-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2580-83-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2768-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2096-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3588-110-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4120-117-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1128-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4424-137-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3936-146-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2352-165-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3856-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3456-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/536-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/676-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4216-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1628-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2040-223-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2852-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1492-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4648-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1744-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4388-249-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4376-253-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-266-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-282-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4588-292-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3532-305-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1928-309-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-325-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2424-344-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2632-348-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3404-355-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2640-392-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1776-396-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/880-400-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4452-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3604-417-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-421-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3004-431-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4456-471-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4980-478-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2036-521-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2580-525-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2840-538-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1880-557-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2864-672-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3828-694-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2332-719-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1648-792-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/436-895-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4528-1007-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xxrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrfxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1thbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vpdv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3136 2216 5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe 82 PID 2216 wrote to memory of 3136 2216 5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe 82 PID 2216 wrote to memory of 3136 2216 5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe 82 PID 3136 wrote to memory of 4456 3136 nnhhnb.exe 83 PID 3136 wrote to memory of 4456 3136 nnhhnb.exe 83 PID 3136 wrote to memory of 4456 3136 nnhhnb.exe 83 PID 4456 wrote to memory of 2420 4456 dvdvd.exe 84 PID 4456 wrote to memory of 2420 4456 dvdvd.exe 84 PID 4456 wrote to memory of 2420 4456 dvdvd.exe 84 PID 2420 wrote to memory of 5092 2420 jpjpj.exe 85 PID 2420 wrote to memory of 5092 2420 jpjpj.exe 85 PID 2420 wrote to memory of 5092 2420 jpjpj.exe 85 PID 5092 wrote to memory of 5032 5092 3xffffl.exe 86 PID 5092 wrote to memory of 5032 5092 3xffffl.exe 86 PID 5092 wrote to memory of 5032 5092 3xffffl.exe 86 PID 5032 wrote to memory of 4088 5032 nnbtbn.exe 87 PID 5032 wrote to memory of 4088 5032 nnbtbn.exe 87 PID 5032 wrote to memory of 4088 5032 nnbtbn.exe 87 PID 4088 wrote to memory of 3364 4088 jjdvv.exe 88 PID 4088 wrote to memory of 3364 4088 jjdvv.exe 88 PID 4088 wrote to memory of 3364 4088 jjdvv.exe 88 PID 3364 wrote to memory of 1948 3364 dvpjd.exe 89 PID 3364 wrote to memory of 1948 3364 dvpjd.exe 89 PID 3364 wrote to memory of 1948 3364 dvpjd.exe 89 PID 1948 wrote to memory of 4736 1948 9rxxffl.exe 90 PID 1948 wrote to memory of 4736 1948 9rxxffl.exe 90 PID 1948 wrote to memory of 4736 1948 9rxxffl.exe 90 PID 4736 wrote to memory of 3532 4736 ttnnhh.exe 91 PID 4736 wrote to memory of 3532 4736 ttnnhh.exe 91 PID 4736 wrote to memory of 3532 4736 ttnnhh.exe 91 PID 3532 wrote to memory of 3652 3532 dvjdv.exe 92 PID 3532 wrote to memory of 3652 3532 dvjdv.exe 92 PID 3532 wrote to memory of 3652 3532 dvjdv.exe 92 PID 3652 wrote to memory of 116 3652 djjdv.exe 93 PID 3652 wrote to memory of 116 3652 djjdv.exe 93 PID 3652 wrote to memory of 116 3652 djjdv.exe 93 PID 116 wrote to memory of 2580 116 pppjd.exe 94 PID 116 wrote to memory of 2580 116 pppjd.exe 94 PID 116 wrote to memory of 2580 116 pppjd.exe 94 PID 2580 wrote to memory of 3208 2580 1llfxrx.exe 95 PID 2580 wrote to memory of 3208 2580 1llfxrx.exe 95 PID 2580 wrote to memory of 3208 2580 1llfxrx.exe 95 PID 3208 wrote to memory of 4968 3208 bhbtht.exe 96 PID 3208 wrote to memory of 4968 3208 bhbtht.exe 96 PID 3208 wrote to memory of 4968 3208 bhbtht.exe 96 PID 4968 wrote to memory of 2768 4968 hbtnhb.exe 97 PID 4968 wrote to memory of 2768 4968 hbtnhb.exe 97 PID 4968 wrote to memory of 2768 4968 hbtnhb.exe 97 PID 2768 wrote to memory of 2096 2768 3btnbb.exe 98 PID 2768 wrote to memory of 2096 2768 3btnbb.exe 98 PID 2768 wrote to memory of 2096 2768 3btnbb.exe 98 PID 2096 wrote to memory of 3588 2096 rxxflff.exe 99 PID 2096 wrote to memory of 3588 2096 rxxflff.exe 99 PID 2096 wrote to memory of 3588 2096 rxxflff.exe 99 PID 3588 wrote to memory of 4120 3588 pdvpj.exe 100 PID 3588 wrote to memory of 4120 3588 pdvpj.exe 100 PID 3588 wrote to memory of 4120 3588 pdvpj.exe 100 PID 4120 wrote to memory of 920 4120 ntntnh.exe 101 PID 4120 wrote to memory of 920 4120 ntntnh.exe 101 PID 4120 wrote to memory of 920 4120 ntntnh.exe 101 PID 920 wrote to memory of 1128 920 nnhbtn.exe 102 PID 920 wrote to memory of 1128 920 nnhbtn.exe 102 PID 920 wrote to memory of 1128 920 nnhbtn.exe 102 PID 1128 wrote to memory of 3504 1128 bthbtn.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe"C:\Users\Admin\AppData\Local\Temp\5c4a0c40d4832b1aa6ae36a9d1185aae4b75027cd54755471949e325d93b8f5c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\nnhhnb.exec:\nnhhnb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
\??\c:\dvdvd.exec:\dvdvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\jpjpj.exec:\jpjpj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\3xffffl.exec:\3xffffl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\nnbtbn.exec:\nnbtbn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\jjdvv.exec:\jjdvv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\dvpjd.exec:\dvpjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
\??\c:\9rxxffl.exec:\9rxxffl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\ttnnhh.exec:\ttnnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\dvjdv.exec:\dvjdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\djjdv.exec:\djjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\pppjd.exec:\pppjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\1llfxrx.exec:\1llfxrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\bhbtht.exec:\bhbtht.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\hbtnhb.exec:\hbtnhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\3btnbb.exec:\3btnbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\rxxflff.exec:\rxxflff.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\pdvpj.exec:\pdvpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\ntntnh.exec:\ntntnh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
\??\c:\nnhbtn.exec:\nnhbtn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\bthbtn.exec:\bthbtn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\xxxrffr.exec:\xxxrffr.exe23⤵
- Executes dropped EXE
PID:3504 -
\??\c:\jvvvd.exec:\jvvvd.exe24⤵
- Executes dropped EXE
PID:4424 -
\??\c:\9lffffx.exec:\9lffffx.exe25⤵
- Executes dropped EXE
PID:3164 -
\??\c:\hhnnhb.exec:\hhnnhb.exe26⤵
- Executes dropped EXE
PID:3936 -
\??\c:\5bntnb.exec:\5bntnb.exe27⤵
- Executes dropped EXE
PID:4656 -
\??\c:\5rxrrfx.exec:\5rxrrfx.exe28⤵
- Executes dropped EXE
PID:4284 -
\??\c:\nthbtn.exec:\nthbtn.exe29⤵
- Executes dropped EXE
PID:2352 -
\??\c:\lrrfxxr.exec:\lrrfxxr.exe30⤵
- Executes dropped EXE
PID:4164 -
\??\c:\hbbtbb.exec:\hbbtbb.exe31⤵
- Executes dropped EXE
PID:3856 -
\??\c:\3ttnhh.exec:\3ttnhh.exe32⤵
- Executes dropped EXE
PID:3456 -
\??\c:\1lrrllf.exec:\1lrrllf.exe33⤵
- Executes dropped EXE
PID:536 -
\??\c:\nhhhbb.exec:\nhhhbb.exe34⤵
- Executes dropped EXE
PID:676 -
\??\c:\rxlxxrl.exec:\rxlxxrl.exe35⤵
- Executes dropped EXE
PID:2012 -
\??\c:\rxxrrrl.exec:\rxxrrrl.exe36⤵
- Executes dropped EXE
PID:2128 -
\??\c:\1thhbb.exec:\1thhbb.exe37⤵
- Executes dropped EXE
PID:4316 -
\??\c:\vpvpd.exec:\vpvpd.exe38⤵
- Executes dropped EXE
PID:4368 -
\??\c:\rrrrlll.exec:\rrrrlll.exe39⤵
- Executes dropped EXE
PID:4216 -
\??\c:\lflffff.exec:\lflffff.exe40⤵
- Executes dropped EXE
PID:3132 -
\??\c:\nbhtnn.exec:\nbhtnn.exe41⤵
- Executes dropped EXE
PID:1628 -
\??\c:\jvdvp.exec:\jvdvp.exe42⤵
- Executes dropped EXE
PID:636 -
\??\c:\dpvvp.exec:\dpvvp.exe43⤵
- Executes dropped EXE
PID:2040 -
\??\c:\xrrlfxr.exec:\xrrlfxr.exe44⤵
- Executes dropped EXE
PID:2852 -
\??\c:\bbbbtt.exec:\bbbbtt.exe45⤵
- Executes dropped EXE
PID:1492 -
\??\c:\pvddp.exec:\pvddp.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
\??\c:\dvjdd.exec:\dvjdd.exe47⤵
- Executes dropped EXE
PID:4648 -
\??\c:\rlxllll.exec:\rlxllll.exe48⤵
- Executes dropped EXE
PID:1744 -
\??\c:\xlrfxxl.exec:\xlrfxxl.exe49⤵
- Executes dropped EXE
PID:456 -
\??\c:\ddjjj.exec:\ddjjj.exe50⤵
- Executes dropped EXE
PID:4388 -
\??\c:\vvdvj.exec:\vvdvj.exe51⤵
- Executes dropped EXE
PID:4376 -
\??\c:\lxxxlfr.exec:\lxxxlfr.exe52⤵
- Executes dropped EXE
PID:3468 -
\??\c:\tttnhh.exec:\tttnhh.exe53⤵
- Executes dropped EXE
PID:2864 -
\??\c:\jddvj.exec:\jddvj.exe54⤵
- Executes dropped EXE
PID:3280 -
\??\c:\7xxrlff.exec:\7xxrlff.exe55⤵
- Executes dropped EXE
PID:1220 -
\??\c:\hbbtbb.exec:\hbbtbb.exe56⤵
- Executes dropped EXE
PID:5092 -
\??\c:\7hnbbn.exec:\7hnbbn.exe57⤵
- Executes dropped EXE
PID:4184 -
\??\c:\vppdv.exec:\vppdv.exe58⤵
- Executes dropped EXE
PID:4732 -
\??\c:\rxfxllf.exec:\rxfxllf.exe59⤵
- Executes dropped EXE
PID:4964 -
\??\c:\nnnhbn.exec:\nnnhbn.exe60⤵
- Executes dropped EXE
PID:4500 -
\??\c:\dpjvp.exec:\dpjvp.exe61⤵
- Executes dropped EXE
PID:3764 -
\??\c:\fxffrlr.exec:\fxffrlr.exe62⤵
- Executes dropped EXE
PID:3140 -
\??\c:\rllxrlx.exec:\rllxrlx.exe63⤵
- Executes dropped EXE
PID:4588 -
\??\c:\nntbtn.exec:\nntbtn.exe64⤵
- Executes dropped EXE
PID:1216 -
\??\c:\pjvvd.exec:\pjvvd.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1052 -
\??\c:\xrrlxrf.exec:\xrrlxrf.exe66⤵PID:1620
-
\??\c:\hbbbtt.exec:\hbbbtt.exe67⤵PID:3532
-
\??\c:\htbnnb.exec:\htbnnb.exe68⤵PID:1928
-
\??\c:\jdjjd.exec:\jdjjd.exe69⤵PID:4176
-
\??\c:\fxffxll.exec:\fxffxll.exe70⤵PID:2008
-
\??\c:\tbhbtn.exec:\tbhbtn.exe71⤵PID:2540
-
\??\c:\jppdp.exec:\jppdp.exe72⤵PID:2680
-
\??\c:\pjvpj.exec:\pjvpj.exe73⤵PID:3208
-
\??\c:\rrxxlll.exec:\rrxxlll.exe74⤵PID:2228
-
\??\c:\tnnbnh.exec:\tnnbnh.exe75⤵PID:3124
-
\??\c:\7vvjv.exec:\7vvjv.exe76⤵PID:2400
-
\??\c:\xrxrrrr.exec:\xrxrrrr.exe77⤵PID:2800
-
\??\c:\ttbhtt.exec:\ttbhtt.exe78⤵PID:3588
-
\??\c:\5bthtn.exec:\5bthtn.exe79⤵PID:2424
-
\??\c:\vvpjd.exec:\vvpjd.exe80⤵PID:2632
-
\??\c:\fxxrlff.exec:\fxxrlff.exe81⤵PID:2992
-
\??\c:\7bhthb.exec:\7bhthb.exe82⤵PID:3404
-
\??\c:\pjdjd.exec:\pjdjd.exe83⤵PID:4004
-
\??\c:\vppjv.exec:\vppjv.exe84⤵PID:4084
-
\??\c:\rlrfrfr.exec:\rlrfrfr.exe85⤵PID:5024
-
\??\c:\tnnhbt.exec:\tnnhbt.exe86⤵PID:2732
-
\??\c:\jppjv.exec:\jppjv.exe87⤵PID:3936
-
\??\c:\jddvp.exec:\jddvp.exe88⤵PID:4028
-
\??\c:\flxrlfl.exec:\flxrlfl.exe89⤵PID:8
-
\??\c:\nbthbt.exec:\nbthbt.exe90⤵PID:404
-
\??\c:\1hhnnh.exec:\1hhnnh.exe91⤵PID:3032
-
\??\c:\pjddd.exec:\pjddd.exe92⤵PID:2876
-
\??\c:\xxxrfxx.exec:\xxxrfxx.exe93⤵PID:1552
-
\??\c:\nhnbnh.exec:\nhnbnh.exe94⤵PID:2640
-
\??\c:\vjpjv.exec:\vjpjv.exe95⤵PID:1776
-
\??\c:\dddvp.exec:\dddvp.exe96⤵PID:880
-
\??\c:\xrrfrlx.exec:\xrrfrlx.exe97⤵PID:1580
-
\??\c:\bntnhh.exec:\bntnhh.exe98⤵PID:3152
-
\??\c:\dppdp.exec:\dppdp.exe99⤵PID:1848
-
\??\c:\frrfxxl.exec:\frrfxxl.exe100⤵PID:4452
-
\??\c:\nhnhhh.exec:\nhnhhh.exe101⤵PID:3604
-
\??\c:\jjjpd.exec:\jjjpd.exe102⤵PID:740
-
\??\c:\lrrfrlx.exec:\lrrfrlx.exe103⤵PID:2716
-
\??\c:\1nhthh.exec:\1nhthh.exe104⤵PID:1276
-
\??\c:\bntnht.exec:\bntnht.exe105⤵PID:3004
-
\??\c:\vpppd.exec:\vpppd.exe106⤵PID:3632
-
\??\c:\1rrlxxl.exec:\1rrlxxl.exe107⤵PID:1004
-
\??\c:\hbbtnn.exec:\hbbtnn.exe108⤵PID:3596
-
\??\c:\vppjd.exec:\vppjd.exe109⤵PID:860
-
\??\c:\9vpdv.exec:\9vpdv.exe110⤵PID:64
-
\??\c:\7xrlxxr.exec:\7xrlxxr.exe111⤵PID:516
-
\??\c:\nbnhnh.exec:\nbnhnh.exe112⤵PID:716
-
\??\c:\bbbhhn.exec:\bbbhhn.exe113⤵PID:1744
-
\??\c:\9jdvp.exec:\9jdvp.exe114⤵PID:1864
-
\??\c:\rlrfxxr.exec:\rlrfxxr.exe115⤵PID:320
-
\??\c:\rlrxrfx.exec:\rlrxrfx.exe116⤵PID:1940
-
\??\c:\nhhbtn.exec:\nhhbtn.exe117⤵PID:4740
-
\??\c:\pdjpp.exec:\pdjpp.exe118⤵PID:4456
-
\??\c:\jdjdv.exec:\jdjdv.exe119⤵PID:2420
-
\??\c:\lflxrxr.exec:\lflxrxr.exe120⤵PID:4980
-
\??\c:\bbbtnt.exec:\bbbtnt.exe121⤵PID:3436
-
\??\c:\dddvp.exec:\dddvp.exe122⤵PID:3860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-