Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2024, 19:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe
-
Size
456KB
-
MD5
00404ad5b01eee2d7827c3624414e681
-
SHA1
a0390086b21b51867f9288c9d259602954315d85
-
SHA256
0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f
-
SHA512
ba929e58f5395e3d2d8ba68527b04be580ac7ef9e0d46f73a78d4f7b73235b63093567f9072e16854c1602dee4457c7bab1efe1c5a6a460d14a57ade2c1fbb6e
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeV:q7Tc2NYHUrAwfMp3CDV
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/4280-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4428-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1476-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3976-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3324-24-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4920-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1664-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3872-53-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1104-58-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1668-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4604-68-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1780-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1536-88-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3200-93-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3952-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1624-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4012-106-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3440-127-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1500-139-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4928-145-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3980-156-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/232-172-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/780-184-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3344-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4188-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4784-195-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/812-201-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4284-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2264-219-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4448-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3944-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5088-259-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4180-262-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2284-275-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2784-282-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2392-285-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4200-291-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1932-298-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2368-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1512-312-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2696-322-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/772-345-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2636-349-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4868-374-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/404-387-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1352-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/812-410-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-417-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4280-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2924-431-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4648-456-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4252-508-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2692-542-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3492-560-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4188-606-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3268-646-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1516-659-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2844-693-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2780-760-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3344-1258-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4448-1622-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4428 lffrfrx.exe 1476 20246.exe 3324 g0608.exe 3976 httnnh.exe 4920 6044226.exe 1664 9tbhth.exe 1700 642842.exe 3872 2460444.exe 1104 htbttt.exe 1668 xllflll.exe 4604 c404822.exe 1780 lxxrllf.exe 5028 jjdpd.exe 1536 dpdpd.exe 3952 44204.exe 3200 6226000.exe 5080 6004884.exe 4012 3fxrlfx.exe 1624 o288826.exe 1672 llxfxxr.exe 3440 jdvvp.exe 312 40200.exe 1500 pdvjv.exe 4928 2688888.exe 3320 4060000.exe 3980 5xfffrr.exe 3188 frxrlfx.exe 1400 fxllrrx.exe 232 i460482.exe 404 60820.exe 780 00484.exe 3344 k88266.exe 4188 846422.exe 4784 c882882.exe 1352 42262.exe 812 xxffllr.exe 3704 3xxxrxx.exe 552 jddvp.exe 4284 0864646.exe 3308 lffxxrl.exe 2264 68482.exe 3848 28486.exe 4968 w62662.exe 1128 dpjdp.exe 3168 ppdvv.exe 3468 lxxrrrl.exe 4448 ttbttt.exe 500 xrxrllf.exe 3944 6042424.exe 2272 dvvpd.exe 2920 08464.exe 1596 pvpdp.exe 5088 22824.exe 4180 62066.exe 1896 rrxlrlx.exe 892 pvjvp.exe 3128 htnbnb.exe 2284 088226.exe 1916 068266.exe 2784 nbbnbh.exe 2392 pppjp.exe 1496 xxxxrxr.exe 4200 xrrlfxr.exe 1236 624260.exe -
resource yara_rule behavioral2/memory/4280-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4428-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1476-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4920-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3976-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3324-24-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4920-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1664-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-53-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1104-58-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1668-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1780-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1536-80-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3952-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1536-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3200-93-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3952-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1624-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4012-106-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3440-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-139-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-145-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3980-156-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/232-172-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/780-184-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3344-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4188-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-195-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/812-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4284-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2264-219-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4448-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3944-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5088-259-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4180-262-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2284-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2784-282-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2392-285-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4200-291-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1932-298-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2368-308-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1512-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2696-322-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-326-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/772-345-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2636-349-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4868-374-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/404-387-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1352-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/812-410-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-417-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4280-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2924-431-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4648-456-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4252-508-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-542-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1108-550-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3492-560-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4188-606-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3268-646-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1516-659-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2844-693-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflffxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k80024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0628282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k88266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i228660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 422648.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4428 4280 0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe 83 PID 4280 wrote to memory of 4428 4280 0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe 83 PID 4280 wrote to memory of 4428 4280 0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe 83 PID 4428 wrote to memory of 1476 4428 lffrfrx.exe 84 PID 4428 wrote to memory of 1476 4428 lffrfrx.exe 84 PID 4428 wrote to memory of 1476 4428 lffrfrx.exe 84 PID 1476 wrote to memory of 3324 1476 20246.exe 85 PID 1476 wrote to memory of 3324 1476 20246.exe 85 PID 1476 wrote to memory of 3324 1476 20246.exe 85 PID 3324 wrote to memory of 3976 3324 g0608.exe 86 PID 3324 wrote to memory of 3976 3324 g0608.exe 86 PID 3324 wrote to memory of 3976 3324 g0608.exe 86 PID 3976 wrote to memory of 4920 3976 httnnh.exe 87 PID 3976 wrote to memory of 4920 3976 httnnh.exe 87 PID 3976 wrote to memory of 4920 3976 httnnh.exe 87 PID 4920 wrote to memory of 1664 4920 6044226.exe 88 PID 4920 wrote to memory of 1664 4920 6044226.exe 88 PID 4920 wrote to memory of 1664 4920 6044226.exe 88 PID 1664 wrote to memory of 1700 1664 9tbhth.exe 89 PID 1664 wrote to memory of 1700 1664 9tbhth.exe 89 PID 1664 wrote to memory of 1700 1664 9tbhth.exe 89 PID 1700 wrote to memory of 3872 1700 642842.exe 90 PID 1700 wrote to memory of 3872 1700 642842.exe 90 PID 1700 wrote to memory of 3872 1700 642842.exe 90 PID 3872 wrote to memory of 1104 3872 2460444.exe 91 PID 3872 wrote to memory of 1104 3872 2460444.exe 91 PID 3872 wrote to memory of 1104 3872 2460444.exe 91 PID 1104 wrote to memory of 1668 1104 htbttt.exe 92 PID 1104 wrote to memory of 1668 1104 htbttt.exe 92 PID 1104 wrote to memory of 1668 1104 htbttt.exe 92 PID 1668 wrote to memory of 4604 1668 xllflll.exe 93 PID 1668 wrote to memory of 4604 1668 xllflll.exe 93 PID 1668 wrote to memory of 4604 1668 xllflll.exe 93 PID 4604 wrote to memory of 1780 4604 c404822.exe 94 PID 4604 wrote to memory of 1780 4604 c404822.exe 94 PID 4604 wrote to memory of 1780 4604 c404822.exe 94 PID 1780 wrote to memory of 5028 1780 lxxrllf.exe 95 PID 1780 wrote to memory of 5028 1780 lxxrllf.exe 95 PID 1780 wrote to memory of 5028 1780 lxxrllf.exe 95 PID 5028 wrote to memory of 1536 5028 jjdpd.exe 96 PID 5028 wrote to memory of 1536 5028 jjdpd.exe 96 PID 5028 wrote to memory of 1536 5028 jjdpd.exe 96 PID 1536 wrote to memory of 3952 1536 dpdpd.exe 97 PID 1536 wrote to memory of 3952 1536 dpdpd.exe 97 PID 1536 wrote to memory of 3952 1536 dpdpd.exe 97 PID 3952 wrote to memory of 3200 3952 44204.exe 98 PID 3952 wrote to memory of 3200 3952 44204.exe 98 PID 3952 wrote to memory of 3200 3952 44204.exe 98 PID 3200 wrote to memory of 5080 3200 6226000.exe 99 PID 3200 wrote to memory of 5080 3200 6226000.exe 99 PID 3200 wrote to memory of 5080 3200 6226000.exe 99 PID 5080 wrote to memory of 4012 5080 6004884.exe 100 PID 5080 wrote to memory of 4012 5080 6004884.exe 100 PID 5080 wrote to memory of 4012 5080 6004884.exe 100 PID 4012 wrote to memory of 1624 4012 3fxrlfx.exe 101 PID 4012 wrote to memory of 1624 4012 3fxrlfx.exe 101 PID 4012 wrote to memory of 1624 4012 3fxrlfx.exe 101 PID 1624 wrote to memory of 1672 1624 o288826.exe 102 PID 1624 wrote to memory of 1672 1624 o288826.exe 102 PID 1624 wrote to memory of 1672 1624 o288826.exe 102 PID 1672 wrote to memory of 3440 1672 llxfxxr.exe 103 PID 1672 wrote to memory of 3440 1672 llxfxxr.exe 103 PID 1672 wrote to memory of 3440 1672 llxfxxr.exe 103 PID 3440 wrote to memory of 312 3440 jdvvp.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe"C:\Users\Admin\AppData\Local\Temp\0a5dac6ecfd0cdec2991de5193df5bf75de9eca2e841f6effee758cb74caf41f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
\??\c:\lffrfrx.exec:\lffrfrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
\??\c:\20246.exec:\20246.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\g0608.exec:\g0608.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
\??\c:\httnnh.exec:\httnnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\6044226.exec:\6044226.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\9tbhth.exec:\9tbhth.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\642842.exec:\642842.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\2460444.exec:\2460444.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
\??\c:\htbttt.exec:\htbttt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\xllflll.exec:\xllflll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\c404822.exec:\c404822.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
\??\c:\lxxrllf.exec:\lxxrllf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\jjdpd.exec:\jjdpd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\dpdpd.exec:\dpdpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\44204.exec:\44204.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
\??\c:\6226000.exec:\6226000.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\6004884.exec:\6004884.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\3fxrlfx.exec:\3fxrlfx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\o288826.exec:\o288826.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\llxfxxr.exec:\llxfxxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\jdvvp.exec:\jdvvp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\40200.exec:\40200.exe23⤵
- Executes dropped EXE
PID:312 -
\??\c:\pdvjv.exec:\pdvjv.exe24⤵
- Executes dropped EXE
PID:1500 -
\??\c:\2688888.exec:\2688888.exe25⤵
- Executes dropped EXE
PID:4928 -
\??\c:\4060000.exec:\4060000.exe26⤵
- Executes dropped EXE
PID:3320 -
\??\c:\5xfffrr.exec:\5xfffrr.exe27⤵
- Executes dropped EXE
PID:3980 -
\??\c:\frxrlfx.exec:\frxrlfx.exe28⤵
- Executes dropped EXE
PID:3188 -
\??\c:\fxllrrx.exec:\fxllrrx.exe29⤵
- Executes dropped EXE
PID:1400 -
\??\c:\i460482.exec:\i460482.exe30⤵
- Executes dropped EXE
PID:232 -
\??\c:\60820.exec:\60820.exe31⤵
- Executes dropped EXE
PID:404 -
\??\c:\00484.exec:\00484.exe32⤵
- Executes dropped EXE
PID:780 -
\??\c:\k88266.exec:\k88266.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3344 -
\??\c:\846422.exec:\846422.exe34⤵
- Executes dropped EXE
PID:4188 -
\??\c:\c882882.exec:\c882882.exe35⤵
- Executes dropped EXE
PID:4784 -
\??\c:\42262.exec:\42262.exe36⤵
- Executes dropped EXE
PID:1352 -
\??\c:\xxffllr.exec:\xxffllr.exe37⤵
- Executes dropped EXE
PID:812 -
\??\c:\3xxxrxx.exec:\3xxxrxx.exe38⤵
- Executes dropped EXE
PID:3704 -
\??\c:\jddvp.exec:\jddvp.exe39⤵
- Executes dropped EXE
PID:552 -
\??\c:\0864646.exec:\0864646.exe40⤵
- Executes dropped EXE
PID:4284 -
\??\c:\lffxxrl.exec:\lffxxrl.exe41⤵
- Executes dropped EXE
PID:3308 -
\??\c:\68482.exec:\68482.exe42⤵
- Executes dropped EXE
PID:2264 -
\??\c:\28486.exec:\28486.exe43⤵
- Executes dropped EXE
PID:3848 -
\??\c:\w62662.exec:\w62662.exe44⤵
- Executes dropped EXE
PID:4968 -
\??\c:\dpjdp.exec:\dpjdp.exe45⤵
- Executes dropped EXE
PID:1128 -
\??\c:\ppdvv.exec:\ppdvv.exe46⤵
- Executes dropped EXE
PID:3168 -
\??\c:\lxxrrrl.exec:\lxxrrrl.exe47⤵
- Executes dropped EXE
PID:3468 -
\??\c:\ttbttt.exec:\ttbttt.exe48⤵
- Executes dropped EXE
PID:4448 -
\??\c:\xrxrllf.exec:\xrxrllf.exe49⤵
- Executes dropped EXE
PID:500 -
\??\c:\6042424.exec:\6042424.exe50⤵
- Executes dropped EXE
PID:3944 -
\??\c:\dvvpd.exec:\dvvpd.exe51⤵
- Executes dropped EXE
PID:2272 -
\??\c:\08464.exec:\08464.exe52⤵
- Executes dropped EXE
PID:2920 -
\??\c:\pvpdp.exec:\pvpdp.exe53⤵
- Executes dropped EXE
PID:1596 -
\??\c:\22824.exec:\22824.exe54⤵
- Executes dropped EXE
PID:5088 -
\??\c:\62066.exec:\62066.exe55⤵
- Executes dropped EXE
PID:4180 -
\??\c:\rrxlrlx.exec:\rrxlrlx.exe56⤵
- Executes dropped EXE
PID:1896 -
\??\c:\pvjvp.exec:\pvjvp.exe57⤵
- Executes dropped EXE
PID:892 -
\??\c:\htnbnb.exec:\htnbnb.exe58⤵
- Executes dropped EXE
PID:3128 -
\??\c:\088226.exec:\088226.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284 -
\??\c:\068266.exec:\068266.exe60⤵
- Executes dropped EXE
PID:1916 -
\??\c:\nbbnbh.exec:\nbbnbh.exe61⤵
- Executes dropped EXE
PID:2784 -
\??\c:\pppjp.exec:\pppjp.exe62⤵
- Executes dropped EXE
PID:2392 -
\??\c:\xxxxrxr.exec:\xxxxrxr.exe63⤵
- Executes dropped EXE
PID:1496 -
\??\c:\xrrlfxr.exec:\xrrlfxr.exe64⤵
- Executes dropped EXE
PID:4200 -
\??\c:\624260.exec:\624260.exe65⤵
- Executes dropped EXE
PID:1236 -
\??\c:\9tbbhh.exec:\9tbbhh.exe66⤵PID:1932
-
\??\c:\g0682.exec:\g0682.exe67⤵PID:2112
-
\??\c:\9ppdv.exec:\9ppdv.exe68⤵PID:4836
-
\??\c:\288822.exec:\288822.exe69⤵PID:2368
-
\??\c:\rxxxrff.exec:\rxxxrff.exe70⤵PID:1512
-
\??\c:\pdjvj.exec:\pdjvj.exe71⤵PID:4736
-
\??\c:\lxxrlll.exec:\lxxrlll.exe72⤵PID:3032
-
\??\c:\w84404.exec:\w84404.exe73⤵PID:2696
-
\??\c:\hhhnbh.exec:\hhhnbh.exe74⤵PID:4012
-
\??\c:\tnttbb.exec:\tnttbb.exe75⤵PID:2692
-
\??\c:\tnbttt.exec:\tnbttt.exe76⤵PID:1256
-
\??\c:\c808226.exec:\c808226.exe77⤵PID:684
-
\??\c:\26204.exec:\26204.exe78⤵PID:1108
-
\??\c:\40220.exec:\40220.exe79⤵PID:4656
-
\??\c:\jddpd.exec:\jddpd.exe80⤵PID:772
-
\??\c:\000088.exec:\000088.exe81⤵PID:2636
-
\??\c:\thnnhh.exec:\thnnhh.exe82⤵PID:1164
-
\??\c:\q84826.exec:\q84826.exe83⤵PID:4108
-
\??\c:\btthnt.exec:\btthnt.exe84⤵PID:1344
-
\??\c:\9pjvv.exec:\9pjvv.exe85⤵PID:2612
-
\??\c:\ttnhtt.exec:\ttnhtt.exe86⤵PID:3816
-
\??\c:\rrxrxxf.exec:\rrxrxxf.exe87⤵PID:3584
-
\??\c:\ttnnbt.exec:\ttnnbt.exe88⤵PID:2780
-
\??\c:\620422.exec:\620422.exe89⤵PID:4868
-
\??\c:\djdvd.exec:\djdvd.exe90⤵PID:4132
-
\??\c:\m2426.exec:\m2426.exe91⤵PID:4696
-
\??\c:\bttnnn.exec:\bttnnn.exe92⤵PID:2040
-
\??\c:\4688260.exec:\4688260.exe93⤵PID:404
-
\??\c:\hhbntt.exec:\hhbntt.exe94⤵PID:3092
-
\??\c:\7nnhtt.exec:\7nnhtt.exe95⤵PID:1812
-
\??\c:\vdvjp.exec:\vdvjp.exe96⤵PID:3552
-
\??\c:\hhtnnn.exec:\hhtnnn.exe97⤵PID:3804
-
\??\c:\600400.exec:\600400.exe98⤵PID:4784
-
\??\c:\04868.exec:\04868.exe99⤵PID:1352
-
\??\c:\bbbhtt.exec:\bbbhtt.exe100⤵PID:812
-
\??\c:\8066442.exec:\8066442.exe101⤵PID:3704
-
\??\c:\m6066.exec:\m6066.exe102⤵PID:552
-
\??\c:\xrrlxxr.exec:\xrrlxxr.exe103⤵PID:1040
-
\??\c:\8888226.exec:\8888226.exe104⤵PID:3936
-
\??\c:\s8606.exec:\s8606.exe105⤵PID:4280
-
\??\c:\0282260.exec:\0282260.exe106⤵PID:2924
-
\??\c:\bnnhnn.exec:\bnnhnn.exe107⤵PID:4636
-
\??\c:\062260.exec:\062260.exe108⤵PID:1128
-
\??\c:\02448.exec:\02448.exe109⤵PID:1572
-
\??\c:\a2608.exec:\a2608.exe110⤵PID:3720
-
\??\c:\5nbbtt.exec:\5nbbtt.exe111⤵PID:3260
-
\??\c:\9xxrrrr.exec:\9xxrrrr.exe112⤵PID:4536
-
\??\c:\g8882.exec:\g8882.exe113⤵PID:4908
-
\??\c:\pjppp.exec:\pjppp.exe114⤵PID:4648
-
\??\c:\frxrllf.exec:\frxrllf.exe115⤵PID:4228
-
\??\c:\nthnhh.exec:\nthnhh.exe116⤵PID:4400
-
\??\c:\60042.exec:\60042.exe117⤵PID:4960
-
\??\c:\btnnhh.exec:\btnnhh.exe118⤵PID:4104
-
\??\c:\pvddp.exec:\pvddp.exe119⤵PID:3484
-
\??\c:\8444226.exec:\8444226.exe120⤵PID:3420
-
\??\c:\22226.exec:\22226.exe121⤵PID:1864
-
\??\c:\rfllllr.exec:\rfllllr.exe122⤵PID:3568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-