Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 02:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
120 seconds
General
-
Target
5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe
-
Size
454KB
-
MD5
a9f916d5c86e3973c289c96cdc1090c0
-
SHA1
3ace1f81d6703f1ce07783762a0c76691012f3a4
-
SHA256
5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1
-
SHA512
f824d4ed84daa726a8915ee95a4311dddeb6fa856f8a1f66451fddd2d67d3a8f03d4584a4ac202df21f96d1f7a78588810cf96679176a7348b163eb272162910
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbet:q7Tc2NYHUrAwfMp3CDt
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2932-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3692-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2476-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1160-20-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1576-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5068-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4936-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4828-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2040-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3612-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4664-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3260-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2228-72-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3860-81-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3768-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2036-95-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3444-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4784-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1008-125-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/932-130-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1916-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2868-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4092-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3992-153-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/460-160-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2372-170-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2916-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4520-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4620-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5096-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5040-204-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1252-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/636-218-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3552-228-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2820-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4356-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2476-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2584-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1704-258-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2520-271-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3404-275-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3580-279-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1564-283-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3532-290-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/380-297-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1768-304-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4176-314-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4944-330-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4080-334-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4560-344-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1424-360-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3036-367-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4624-377-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1092-403-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2820-416-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2488-426-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4912-503-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1012-626-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/220-660-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4468-931-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2356-962-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4984-1240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1868-1442-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3692 2682264.exe 2476 o026666.exe 1160 u084888.exe 1576 240048.exe 4936 i626604.exe 5068 frxxrrx.exe 4828 pjpjv.exe 2040 jddvp.exe 3612 82486.exe 4664 dvvvp.exe 3260 dvdvj.exe 2228 s6828.exe 3860 flfrlfx.exe 3768 02422.exe 2036 dddvp.exe 3444 xfxlrll.exe 2908 3xxrlfx.exe 3784 48004.exe 4784 rfxrlfr.exe 1008 6886482.exe 932 626082.exe 1916 thhhbt.exe 2868 ffxrlfx.exe 4092 0248226.exe 3992 3xlxrfx.exe 460 8682086.exe 1620 djpvp.exe 2372 60482.exe 2916 60840.exe 4520 q22020.exe 3024 20606.exe 4620 1xxrxrf.exe 5104 nbthth.exe 5096 pdvjp.exe 5040 rfflrlx.exe 1252 8064866.exe 1904 ddvjd.exe 5112 djjvj.exe 636 i626482.exe 2800 o444826.exe 4432 680006.exe 3552 6248488.exe 2892 266602.exe 2820 002666.exe 4356 680668.exe 2476 22042.exe 2584 rfrllff.exe 2124 8662604.exe 3228 8660266.exe 3524 a0680.exe 1704 4848822.exe 4828 i426486.exe 4672 9rxrllf.exe 1440 442604.exe 2520 lfrlfll.exe 3404 tnhttt.exe 3580 8404448.exe 1564 5dddv.exe 4964 4208882.exe 3532 jdjdd.exe 3616 djjvj.exe 380 2244060.exe 3644 822482.exe 1768 9vvpd.exe -
resource yara_rule behavioral2/memory/2932-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3692-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2476-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1160-20-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1576-24-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1576-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5068-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4936-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4828-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2040-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4664-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3260-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2228-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3860-81-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3768-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2036-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3444-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-118-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1008-125-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/932-130-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1916-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2868-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4092-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3992-153-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/460-160-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-170-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2916-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4520-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4620-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5096-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1252-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/636-218-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3552-228-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2820-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4356-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2476-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2584-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1704-258-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2520-271-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3404-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3580-279-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1564-283-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3532-290-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/380-297-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1768-304-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4176-314-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-330-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4080-334-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4560-344-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1424-360-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3036-367-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4624-377-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1092-403-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2820-416-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2488-426-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4760-487-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4912-503-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4520-549-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1012-626-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/220-660-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4468-931-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-962-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 800224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 642884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 208648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 880422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e82042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2244060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2466448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2282666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 244242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 864208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0200.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3692 2932 5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe 83 PID 2932 wrote to memory of 3692 2932 5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe 83 PID 2932 wrote to memory of 3692 2932 5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe 83 PID 3692 wrote to memory of 2476 3692 2682264.exe 84 PID 3692 wrote to memory of 2476 3692 2682264.exe 84 PID 3692 wrote to memory of 2476 3692 2682264.exe 84 PID 2476 wrote to memory of 1160 2476 o026666.exe 85 PID 2476 wrote to memory of 1160 2476 o026666.exe 85 PID 2476 wrote to memory of 1160 2476 o026666.exe 85 PID 1160 wrote to memory of 1576 1160 u084888.exe 86 PID 1160 wrote to memory of 1576 1160 u084888.exe 86 PID 1160 wrote to memory of 1576 1160 u084888.exe 86 PID 1576 wrote to memory of 4936 1576 240048.exe 87 PID 1576 wrote to memory of 4936 1576 240048.exe 87 PID 1576 wrote to memory of 4936 1576 240048.exe 87 PID 4936 wrote to memory of 5068 4936 i626604.exe 88 PID 4936 wrote to memory of 5068 4936 i626604.exe 88 PID 4936 wrote to memory of 5068 4936 i626604.exe 88 PID 5068 wrote to memory of 4828 5068 frxxrrx.exe 89 PID 5068 wrote to memory of 4828 5068 frxxrrx.exe 89 PID 5068 wrote to memory of 4828 5068 frxxrrx.exe 89 PID 4828 wrote to memory of 2040 4828 pjpjv.exe 90 PID 4828 wrote to memory of 2040 4828 pjpjv.exe 90 PID 4828 wrote to memory of 2040 4828 pjpjv.exe 90 PID 2040 wrote to memory of 3612 2040 jddvp.exe 91 PID 2040 wrote to memory of 3612 2040 jddvp.exe 91 PID 2040 wrote to memory of 3612 2040 jddvp.exe 91 PID 3612 wrote to memory of 4664 3612 82486.exe 92 PID 3612 wrote to memory of 4664 3612 82486.exe 92 PID 3612 wrote to memory of 4664 3612 82486.exe 92 PID 4664 wrote to memory of 3260 4664 dvvvp.exe 93 PID 4664 wrote to memory of 3260 4664 dvvvp.exe 93 PID 4664 wrote to memory of 3260 4664 dvvvp.exe 93 PID 3260 wrote to memory of 2228 3260 dvdvj.exe 94 PID 3260 wrote to memory of 2228 3260 dvdvj.exe 94 PID 3260 wrote to memory of 2228 3260 dvdvj.exe 94 PID 2228 wrote to memory of 3860 2228 s6828.exe 95 PID 2228 wrote to memory of 3860 2228 s6828.exe 95 PID 2228 wrote to memory of 3860 2228 s6828.exe 95 PID 3860 wrote to memory of 3768 3860 flfrlfx.exe 96 PID 3860 wrote to memory of 3768 3860 flfrlfx.exe 96 PID 3860 wrote to memory of 3768 3860 flfrlfx.exe 96 PID 3768 wrote to memory of 2036 3768 02422.exe 97 PID 3768 wrote to memory of 2036 3768 02422.exe 97 PID 3768 wrote to memory of 2036 3768 02422.exe 97 PID 2036 wrote to memory of 3444 2036 dddvp.exe 98 PID 2036 wrote to memory of 3444 2036 dddvp.exe 98 PID 2036 wrote to memory of 3444 2036 dddvp.exe 98 PID 3444 wrote to memory of 2908 3444 xfxlrll.exe 99 PID 3444 wrote to memory of 2908 3444 xfxlrll.exe 99 PID 3444 wrote to memory of 2908 3444 xfxlrll.exe 99 PID 2908 wrote to memory of 3784 2908 3xxrlfx.exe 100 PID 2908 wrote to memory of 3784 2908 3xxrlfx.exe 100 PID 2908 wrote to memory of 3784 2908 3xxrlfx.exe 100 PID 3784 wrote to memory of 4784 3784 48004.exe 101 PID 3784 wrote to memory of 4784 3784 48004.exe 101 PID 3784 wrote to memory of 4784 3784 48004.exe 101 PID 4784 wrote to memory of 1008 4784 rfxrlfr.exe 102 PID 4784 wrote to memory of 1008 4784 rfxrlfr.exe 102 PID 4784 wrote to memory of 1008 4784 rfxrlfr.exe 102 PID 1008 wrote to memory of 932 1008 6886482.exe 103 PID 1008 wrote to memory of 932 1008 6886482.exe 103 PID 1008 wrote to memory of 932 1008 6886482.exe 103 PID 932 wrote to memory of 1916 932 626082.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe"C:\Users\Admin\AppData\Local\Temp\5fb3097d208c2769733bb5e83e667fda96b9b7cecf17d2311cd2cda44ab1f0c1N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\2682264.exec:\2682264.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\o026666.exec:\o026666.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\u084888.exec:\u084888.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
\??\c:\240048.exec:\240048.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\i626604.exec:\i626604.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\frxxrrx.exec:\frxxrrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\pjpjv.exec:\pjpjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\jddvp.exec:\jddvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\82486.exec:\82486.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\dvvvp.exec:\dvvvp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\dvdvj.exec:\dvdvj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
\??\c:\s6828.exec:\s6828.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\flfrlfx.exec:\flfrlfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\02422.exec:\02422.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\dddvp.exec:\dddvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\xfxlrll.exec:\xfxlrll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
\??\c:\3xxrlfx.exec:\3xxrlfx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\48004.exec:\48004.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
\??\c:\rfxrlfr.exec:\rfxrlfr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\6886482.exec:\6886482.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\626082.exec:\626082.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\thhhbt.exec:\thhhbt.exe23⤵
- Executes dropped EXE
PID:1916 -
\??\c:\ffxrlfx.exec:\ffxrlfx.exe24⤵
- Executes dropped EXE
PID:2868 -
\??\c:\0248226.exec:\0248226.exe25⤵
- Executes dropped EXE
PID:4092 -
\??\c:\3xlxrfx.exec:\3xlxrfx.exe26⤵
- Executes dropped EXE
PID:3992 -
\??\c:\8682086.exec:\8682086.exe27⤵
- Executes dropped EXE
PID:460 -
\??\c:\djpvp.exec:\djpvp.exe28⤵
- Executes dropped EXE
PID:1620 -
\??\c:\60482.exec:\60482.exe29⤵
- Executes dropped EXE
PID:2372 -
\??\c:\60840.exec:\60840.exe30⤵
- Executes dropped EXE
PID:2916 -
\??\c:\q22020.exec:\q22020.exe31⤵
- Executes dropped EXE
PID:4520 -
\??\c:\20606.exec:\20606.exe32⤵
- Executes dropped EXE
PID:3024 -
\??\c:\1xxrxrf.exec:\1xxrxrf.exe33⤵
- Executes dropped EXE
PID:4620 -
\??\c:\nbthth.exec:\nbthth.exe34⤵
- Executes dropped EXE
PID:5104 -
\??\c:\pdvjp.exec:\pdvjp.exe35⤵
- Executes dropped EXE
PID:5096 -
\??\c:\rfflrlx.exec:\rfflrlx.exe36⤵
- Executes dropped EXE
PID:5040 -
\??\c:\8064866.exec:\8064866.exe37⤵
- Executes dropped EXE
PID:1252 -
\??\c:\ddvjd.exec:\ddvjd.exe38⤵
- Executes dropped EXE
PID:1904 -
\??\c:\djjvj.exec:\djjvj.exe39⤵
- Executes dropped EXE
PID:5112 -
\??\c:\i626482.exec:\i626482.exe40⤵
- Executes dropped EXE
PID:636 -
\??\c:\o444826.exec:\o444826.exe41⤵
- Executes dropped EXE
PID:2800 -
\??\c:\680006.exec:\680006.exe42⤵
- Executes dropped EXE
PID:4432 -
\??\c:\6248488.exec:\6248488.exe43⤵
- Executes dropped EXE
PID:3552 -
\??\c:\266602.exec:\266602.exe44⤵
- Executes dropped EXE
PID:2892 -
\??\c:\002666.exec:\002666.exe45⤵
- Executes dropped EXE
PID:2820 -
\??\c:\680668.exec:\680668.exe46⤵
- Executes dropped EXE
PID:4356 -
\??\c:\22042.exec:\22042.exe47⤵
- Executes dropped EXE
PID:2476 -
\??\c:\rfrllff.exec:\rfrllff.exe48⤵
- Executes dropped EXE
PID:2584 -
\??\c:\8662604.exec:\8662604.exe49⤵
- Executes dropped EXE
PID:2124 -
\??\c:\8660266.exec:\8660266.exe50⤵
- Executes dropped EXE
PID:3228 -
\??\c:\a0680.exec:\a0680.exe51⤵
- Executes dropped EXE
PID:3524 -
\??\c:\4848822.exec:\4848822.exe52⤵
- Executes dropped EXE
PID:1704 -
\??\c:\i426486.exec:\i426486.exe53⤵
- Executes dropped EXE
PID:4828 -
\??\c:\9rxrllf.exec:\9rxrllf.exe54⤵
- Executes dropped EXE
PID:4672 -
\??\c:\442604.exec:\442604.exe55⤵
- Executes dropped EXE
PID:1440 -
\??\c:\lfrlfll.exec:\lfrlfll.exe56⤵
- Executes dropped EXE
PID:2520 -
\??\c:\tnhttt.exec:\tnhttt.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3404 -
\??\c:\8404448.exec:\8404448.exe58⤵
- Executes dropped EXE
PID:3580 -
\??\c:\5dddv.exec:\5dddv.exe59⤵
- Executes dropped EXE
PID:1564 -
\??\c:\4208882.exec:\4208882.exe60⤵
- Executes dropped EXE
PID:4964 -
\??\c:\jdjdd.exec:\jdjdd.exe61⤵
- Executes dropped EXE
PID:3532 -
\??\c:\djjvj.exec:\djjvj.exe62⤵
- Executes dropped EXE
PID:3616 -
\??\c:\2244060.exec:\2244060.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:380 -
\??\c:\822482.exec:\822482.exe64⤵
- Executes dropped EXE
PID:3644 -
\??\c:\9vvpd.exec:\9vvpd.exe65⤵
- Executes dropped EXE
PID:1768 -
\??\c:\g8866.exec:\g8866.exe66⤵PID:4156
-
\??\c:\pvvjv.exec:\pvvjv.exe67⤵PID:512
-
\??\c:\vjvpp.exec:\vjvpp.exe68⤵
- System Location Discovery: System Language Discovery
PID:4176 -
\??\c:\8004822.exec:\8004822.exe69⤵PID:328
-
\??\c:\lxlxrfx.exec:\lxlxrfx.exe70⤵PID:2092
-
\??\c:\68826.exec:\68826.exe71⤵PID:932
-
\??\c:\nhtnhh.exec:\nhtnhh.exe72⤵PID:3916
-
\??\c:\42608.exec:\42608.exe73⤵PID:4944
-
\??\c:\0804040.exec:\0804040.exe74⤵PID:4080
-
\??\c:\60848.exec:\60848.exe75⤵PID:1624
-
\??\c:\5dpjd.exec:\5dpjd.exe76⤵PID:3408
-
\??\c:\9djdv.exec:\9djdv.exe77⤵PID:4560
-
\??\c:\hbhhhh.exec:\hbhhhh.exe78⤵PID:3032
-
\??\c:\c282000.exec:\c282000.exe79⤵PID:4456
-
\??\c:\rlxrfxr.exec:\rlxrfxr.exe80⤵PID:1620
-
\??\c:\a6260.exec:\a6260.exe81⤵PID:4908
-
\??\c:\4664264.exec:\4664264.exe82⤵PID:1424
-
\??\c:\k20086.exec:\k20086.exe83⤵PID:2432
-
\??\c:\0040480.exec:\0040480.exe84⤵PID:3036
-
\??\c:\vvvvd.exec:\vvvvd.exe85⤵PID:4296
-
\??\c:\8486820.exec:\8486820.exe86⤵PID:4896
-
\??\c:\62884.exec:\62884.exe87⤵PID:4624
-
\??\c:\40680.exec:\40680.exe88⤵
- System Location Discovery: System Language Discovery
PID:5104 -
\??\c:\48488.exec:\48488.exe89⤵PID:3184
-
\??\c:\hhntbt.exec:\hhntbt.exe90⤵PID:1876
-
\??\c:\1tthtn.exec:\1tthtn.exe91⤵PID:1252
-
\??\c:\u608604.exec:\u608604.exe92⤵PID:2416
-
\??\c:\btnbnh.exec:\btnbnh.exe93⤵PID:180
-
\??\c:\k44866.exec:\k44866.exe94⤵PID:3924
-
\??\c:\1hhbnn.exec:\1hhbnn.exe95⤵PID:1092
-
\??\c:\i282048.exec:\i282048.exe96⤵PID:4432
-
\??\c:\rllxlfx.exec:\rllxlfx.exe97⤵PID:2932
-
\??\c:\9lfrfxl.exec:\9lfrfxl.exe98⤵PID:2360
-
\??\c:\a2264.exec:\a2264.exe99⤵PID:2820
-
\??\c:\020804.exec:\020804.exe100⤵PID:4356
-
\??\c:\tnhbnn.exec:\tnhbnn.exe101⤵PID:1616
-
\??\c:\pvvjp.exec:\pvvjp.exe102⤵PID:2488
-
\??\c:\tntnbb.exec:\tntnbb.exe103⤵PID:3204
-
\??\c:\s0640.exec:\s0640.exe104⤵PID:4536
-
\??\c:\btnbnh.exec:\btnbnh.exe105⤵PID:4496
-
\??\c:\htbthh.exec:\htbthh.exe106⤵PID:1900
-
\??\c:\640882.exec:\640882.exe107⤵PID:2600
-
\??\c:\k28884.exec:\k28884.exe108⤵PID:1596
-
\??\c:\206206.exec:\206206.exe109⤵PID:2224
-
\??\c:\rxrlxrl.exec:\rxrlxrl.exe110⤵PID:5056
-
\??\c:\tnthhb.exec:\tnthhb.exe111⤵PID:3688
-
\??\c:\866640.exec:\866640.exe112⤵PID:1440
-
\??\c:\3nnbhh.exec:\3nnbhh.exe113⤵PID:1164
-
\??\c:\pvdpd.exec:\pvdpd.exe114⤵PID:4240
-
\??\c:\rxfrlxl.exec:\rxfrlxl.exe115⤵PID:4648
-
\??\c:\djvpj.exec:\djvpj.exe116⤵PID:2864
-
\??\c:\xxfxxxr.exec:\xxfxxxr.exe117⤵PID:1552
-
\??\c:\tnhbnn.exec:\tnhbnn.exe118⤵PID:3680
-
\??\c:\xxffxff.exec:\xxffxff.exe119⤵PID:1480
-
\??\c:\u060044.exec:\u060044.exe120⤵PID:3808
-
\??\c:\46208.exec:\46208.exe121⤵PID:3180
-
\??\c:\i066004.exec:\i066004.exe122⤵PID:4108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-