Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 03:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe
Resource
win7-20240729-en
7 signatures
150 seconds
General
-
Target
bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe
-
Size
456KB
-
MD5
9a0bedff174307b141898bd170b2cda4
-
SHA1
0d27a3d246ce88b9f71853a301fb7aaaaf2c4940
-
SHA256
bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948
-
SHA512
b0cf96d4af5a00dc9a002e1a9e2a7b3c856a731ed7ff9fbcfd02c8177f37e5442dc11955ee7365df72091809a2e47dca93b737757277ca836d67b2f6838e849a
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRF:q7Tc2NYHUrAwfMp3CDRF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/4576-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4644-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2500-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2720-20-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/960-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1436-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3692-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2876-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/368-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4944-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1892-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1476-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4324-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2940-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3052-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3984-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3116-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3728-123-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2968-135-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3404-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/636-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3392-161-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1308-166-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1728-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4924-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4560-194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1848-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2588-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2132-206-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3980-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5044-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4128-225-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2172-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2740-236-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2316-250-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3560-266-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3584-273-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2484-295-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5092-299-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3540-303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1276-307-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1172-318-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1840-325-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3960-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3728-333-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3280-340-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2584-371-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4516-375-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1976-379-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2228-392-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1708-462-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4676-481-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1684-530-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/784-537-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2808-604-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2652-737-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1728-747-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2808-808-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2804-833-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1844-891-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1264-989-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4576-1200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4644 6448482.exe 2720 k02222.exe 2500 k44262.exe 960 a2860.exe 1436 88442.exe 3692 200448.exe 2876 5dvjd.exe 4944 282648.exe 368 ddjvd.exe 1892 6408480.exe 1476 hnhthb.exe 676 662248.exe 4324 k00208.exe 116 8886486.exe 2940 00426.exe 3052 rflxxll.exe 3000 7nthbb.exe 3116 bbbnht.exe 3984 7tnbnn.exe 3876 dvvjd.exe 3728 204860.exe 3404 q62000.exe 2968 3nnbnb.exe 4040 200864.exe 1684 206004.exe 636 2444648.exe 3392 1hhhbb.exe 1308 hbnnth.exe 2800 7pjvp.exe 1728 4406042.exe 4828 rlxrffx.exe 4924 nhtbth.exe 1164 hbthbn.exe 4560 m8884.exe 1848 ppdjv.exe 2588 i268626.exe 2132 0820824.exe 1228 fffxlfx.exe 3088 22444.exe 3608 840826.exe 3980 flfrlxr.exe 5044 684282.exe 4128 2288820.exe 2172 w24644.exe 4576 806482.exe 2740 dppdp.exe 5036 9ththb.exe 2720 hbbtnh.exe 396 vddpd.exe 2316 ttbnth.exe 1148 jvvvp.exe 1436 86200.exe 3840 lxxfrlx.exe 3080 6240640.exe 3560 ntbtbn.exe 3664 5jdvp.exe 3584 dpjvp.exe 4760 djjvj.exe 3880 4442640.exe 4532 dvvjd.exe 468 1jjdd.exe 1460 vjpjd.exe 676 xlfxfxf.exe 2484 4466666.exe -
resource yara_rule behavioral2/memory/4576-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4644-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2500-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2720-20-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/960-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1436-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3692-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2876-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/368-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1892-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1476-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2940-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3052-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3984-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3116-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-116-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3728-123-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2968-135-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3404-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/636-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3392-161-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1308-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1728-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4924-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4560-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1848-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2588-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-206-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3980-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5044-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4128-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2172-227-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2172-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-236-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2316-250-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3560-266-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3584-273-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2484-295-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5092-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3540-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1276-307-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1172-314-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1172-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1840-325-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3960-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3728-333-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3280-340-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2584-371-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4516-375-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1976-379-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2228-392-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1708-462-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4676-481-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1684-530-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/784-537-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2808-604-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2652-737-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1728-747-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2808-808-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2804-833-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1844-891-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1264-989-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4064022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxrflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4226666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 868660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4060882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2060048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rrxfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 4644 4576 bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe 83 PID 4576 wrote to memory of 4644 4576 bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe 83 PID 4576 wrote to memory of 4644 4576 bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe 83 PID 4644 wrote to memory of 2720 4644 6448482.exe 84 PID 4644 wrote to memory of 2720 4644 6448482.exe 84 PID 4644 wrote to memory of 2720 4644 6448482.exe 84 PID 2720 wrote to memory of 2500 2720 k02222.exe 85 PID 2720 wrote to memory of 2500 2720 k02222.exe 85 PID 2720 wrote to memory of 2500 2720 k02222.exe 85 PID 2500 wrote to memory of 960 2500 k44262.exe 86 PID 2500 wrote to memory of 960 2500 k44262.exe 86 PID 2500 wrote to memory of 960 2500 k44262.exe 86 PID 960 wrote to memory of 1436 960 a2860.exe 87 PID 960 wrote to memory of 1436 960 a2860.exe 87 PID 960 wrote to memory of 1436 960 a2860.exe 87 PID 1436 wrote to memory of 3692 1436 88442.exe 88 PID 1436 wrote to memory of 3692 1436 88442.exe 88 PID 1436 wrote to memory of 3692 1436 88442.exe 88 PID 3692 wrote to memory of 2876 3692 200448.exe 89 PID 3692 wrote to memory of 2876 3692 200448.exe 89 PID 3692 wrote to memory of 2876 3692 200448.exe 89 PID 2876 wrote to memory of 4944 2876 5dvjd.exe 90 PID 2876 wrote to memory of 4944 2876 5dvjd.exe 90 PID 2876 wrote to memory of 4944 2876 5dvjd.exe 90 PID 4944 wrote to memory of 368 4944 282648.exe 91 PID 4944 wrote to memory of 368 4944 282648.exe 91 PID 4944 wrote to memory of 368 4944 282648.exe 91 PID 368 wrote to memory of 1892 368 ddjvd.exe 92 PID 368 wrote to memory of 1892 368 ddjvd.exe 92 PID 368 wrote to memory of 1892 368 ddjvd.exe 92 PID 1892 wrote to memory of 1476 1892 6408480.exe 93 PID 1892 wrote to memory of 1476 1892 6408480.exe 93 PID 1892 wrote to memory of 1476 1892 6408480.exe 93 PID 1476 wrote to memory of 676 1476 hnhthb.exe 94 PID 1476 wrote to memory of 676 1476 hnhthb.exe 94 PID 1476 wrote to memory of 676 1476 hnhthb.exe 94 PID 676 wrote to memory of 4324 676 662248.exe 95 PID 676 wrote to memory of 4324 676 662248.exe 95 PID 676 wrote to memory of 4324 676 662248.exe 95 PID 4324 wrote to memory of 116 4324 k00208.exe 96 PID 4324 wrote to memory of 116 4324 k00208.exe 96 PID 4324 wrote to memory of 116 4324 k00208.exe 96 PID 116 wrote to memory of 2940 116 8886486.exe 97 PID 116 wrote to memory of 2940 116 8886486.exe 97 PID 116 wrote to memory of 2940 116 8886486.exe 97 PID 2940 wrote to memory of 3052 2940 00426.exe 98 PID 2940 wrote to memory of 3052 2940 00426.exe 98 PID 2940 wrote to memory of 3052 2940 00426.exe 98 PID 3052 wrote to memory of 3000 3052 rflxxll.exe 99 PID 3052 wrote to memory of 3000 3052 rflxxll.exe 99 PID 3052 wrote to memory of 3000 3052 rflxxll.exe 99 PID 3000 wrote to memory of 3116 3000 7nthbb.exe 100 PID 3000 wrote to memory of 3116 3000 7nthbb.exe 100 PID 3000 wrote to memory of 3116 3000 7nthbb.exe 100 PID 3116 wrote to memory of 3984 3116 bbbnht.exe 101 PID 3116 wrote to memory of 3984 3116 bbbnht.exe 101 PID 3116 wrote to memory of 3984 3116 bbbnht.exe 101 PID 3984 wrote to memory of 3876 3984 7tnbnn.exe 102 PID 3984 wrote to memory of 3876 3984 7tnbnn.exe 102 PID 3984 wrote to memory of 3876 3984 7tnbnn.exe 102 PID 3876 wrote to memory of 3728 3876 dvvjd.exe 103 PID 3876 wrote to memory of 3728 3876 dvvjd.exe 103 PID 3876 wrote to memory of 3728 3876 dvvjd.exe 103 PID 3728 wrote to memory of 3404 3728 204860.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe"C:\Users\Admin\AppData\Local\Temp\bf48182886880d99b762e2924433f0a5196f32c4214b574ada2e21d7ecdc4948.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\6448482.exec:\6448482.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\k02222.exec:\k02222.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\k44262.exec:\k44262.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\a2860.exec:\a2860.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\88442.exec:\88442.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\200448.exec:\200448.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\5dvjd.exec:\5dvjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\282648.exec:\282648.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\ddjvd.exec:\ddjvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
\??\c:\6408480.exec:\6408480.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\hnhthb.exec:\hnhthb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\662248.exec:\662248.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\k00208.exec:\k00208.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\8886486.exec:\8886486.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\00426.exec:\00426.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\rflxxll.exec:\rflxxll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\7nthbb.exec:\7nthbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\bbbnht.exec:\bbbnht.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
\??\c:\7tnbnn.exec:\7tnbnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
\??\c:\dvvjd.exec:\dvvjd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\204860.exec:\204860.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\q62000.exec:\q62000.exe23⤵
- Executes dropped EXE
PID:3404 -
\??\c:\3nnbnb.exec:\3nnbnb.exe24⤵
- Executes dropped EXE
PID:2968 -
\??\c:\200864.exec:\200864.exe25⤵
- Executes dropped EXE
PID:4040 -
\??\c:\206004.exec:\206004.exe26⤵
- Executes dropped EXE
PID:1684 -
\??\c:\2444648.exec:\2444648.exe27⤵
- Executes dropped EXE
PID:636 -
\??\c:\1hhhbb.exec:\1hhhbb.exe28⤵
- Executes dropped EXE
PID:3392 -
\??\c:\hbnnth.exec:\hbnnth.exe29⤵
- Executes dropped EXE
PID:1308 -
\??\c:\7pjvp.exec:\7pjvp.exe30⤵
- Executes dropped EXE
PID:2800 -
\??\c:\4406042.exec:\4406042.exe31⤵
- Executes dropped EXE
PID:1728 -
\??\c:\rlxrffx.exec:\rlxrffx.exe32⤵
- Executes dropped EXE
PID:4828 -
\??\c:\nhtbth.exec:\nhtbth.exe33⤵
- Executes dropped EXE
PID:4924 -
\??\c:\hbthbn.exec:\hbthbn.exe34⤵
- Executes dropped EXE
PID:1164 -
\??\c:\m8884.exec:\m8884.exe35⤵
- Executes dropped EXE
PID:4560 -
\??\c:\ppdjv.exec:\ppdjv.exe36⤵
- Executes dropped EXE
PID:1848 -
\??\c:\i268626.exec:\i268626.exe37⤵
- Executes dropped EXE
PID:2588 -
\??\c:\0820824.exec:\0820824.exe38⤵
- Executes dropped EXE
PID:2132 -
\??\c:\fffxlfx.exec:\fffxlfx.exe39⤵
- Executes dropped EXE
PID:1228 -
\??\c:\22444.exec:\22444.exe40⤵
- Executes dropped EXE
PID:3088 -
\??\c:\840826.exec:\840826.exe41⤵
- Executes dropped EXE
PID:3608 -
\??\c:\flfrlxr.exec:\flfrlxr.exe42⤵
- Executes dropped EXE
PID:3980 -
\??\c:\684282.exec:\684282.exe43⤵
- Executes dropped EXE
PID:5044 -
\??\c:\2288820.exec:\2288820.exe44⤵
- Executes dropped EXE
PID:4128 -
\??\c:\w24644.exec:\w24644.exe45⤵
- Executes dropped EXE
PID:2172 -
\??\c:\806482.exec:\806482.exe46⤵
- Executes dropped EXE
PID:4576 -
\??\c:\dppdp.exec:\dppdp.exe47⤵
- Executes dropped EXE
PID:2740 -
\??\c:\9ththb.exec:\9ththb.exe48⤵
- Executes dropped EXE
PID:5036 -
\??\c:\hbbtnh.exec:\hbbtnh.exe49⤵
- Executes dropped EXE
PID:2720 -
\??\c:\vddpd.exec:\vddpd.exe50⤵
- Executes dropped EXE
PID:396 -
\??\c:\ttbnth.exec:\ttbnth.exe51⤵
- Executes dropped EXE
PID:2316 -
\??\c:\jvvvp.exec:\jvvvp.exe52⤵
- Executes dropped EXE
PID:1148 -
\??\c:\86200.exec:\86200.exe53⤵
- Executes dropped EXE
PID:1436 -
\??\c:\lxxfrlx.exec:\lxxfrlx.exe54⤵
- Executes dropped EXE
PID:3840 -
\??\c:\6240640.exec:\6240640.exe55⤵
- Executes dropped EXE
PID:3080 -
\??\c:\ntbtbn.exec:\ntbtbn.exe56⤵
- Executes dropped EXE
PID:3560 -
\??\c:\5jdvp.exec:\5jdvp.exe57⤵
- Executes dropped EXE
PID:3664 -
\??\c:\dpjvp.exec:\dpjvp.exe58⤵
- Executes dropped EXE
PID:3584 -
\??\c:\djjvj.exec:\djjvj.exe59⤵
- Executes dropped EXE
PID:4760 -
\??\c:\4442640.exec:\4442640.exe60⤵
- Executes dropped EXE
PID:3880 -
\??\c:\dvvjd.exec:\dvvjd.exe61⤵
- Executes dropped EXE
PID:4532 -
\??\c:\1jjdd.exec:\1jjdd.exe62⤵
- Executes dropped EXE
PID:468 -
\??\c:\vjpjd.exec:\vjpjd.exe63⤵
- Executes dropped EXE
PID:1460 -
\??\c:\xlfxfxf.exec:\xlfxfxf.exe64⤵
- Executes dropped EXE
PID:676 -
\??\c:\4466666.exec:\4466666.exe65⤵
- Executes dropped EXE
PID:2484 -
\??\c:\u668826.exec:\u668826.exe66⤵PID:5092
-
\??\c:\pjvvj.exec:\pjvvj.exe67⤵PID:3540
-
\??\c:\e28048.exec:\e28048.exe68⤵PID:1276
-
\??\c:\24426.exec:\24426.exe69⤵PID:3428
-
\??\c:\2804220.exec:\2804220.exe70⤵PID:3000
-
\??\c:\vvpdd.exec:\vvpdd.exe71⤵PID:1172
-
\??\c:\frrfrfx.exec:\frrfrfx.exe72⤵PID:1832
-
\??\c:\tbtnbh.exec:\tbtnbh.exe73⤵PID:1840
-
\??\c:\jpvdd.exec:\jpvdd.exe74⤵PID:3960
-
\??\c:\640264.exec:\640264.exe75⤵PID:3728
-
\??\c:\0842260.exec:\0842260.exe76⤵PID:4836
-
\??\c:\7dpdp.exec:\7dpdp.exe77⤵PID:3280
-
\??\c:\0820260.exec:\0820260.exe78⤵PID:976
-
\??\c:\ttbnbn.exec:\ttbnbn.exe79⤵PID:3740
-
\??\c:\84486.exec:\84486.exe80⤵PID:3676
-
\??\c:\k84208.exec:\k84208.exe81⤵PID:784
-
\??\c:\7lrlxxl.exec:\7lrlxxl.exe82⤵PID:3216
-
\??\c:\9vpdp.exec:\9vpdp.exe83⤵PID:428
-
\??\c:\frfrffr.exec:\frfrffr.exe84⤵PID:1448
-
\??\c:\w62204.exec:\w62204.exe85⤵PID:4088
-
\??\c:\dpvpj.exec:\dpvpj.exe86⤵PID:4112
-
\??\c:\jjpdj.exec:\jjpdj.exe87⤵PID:2584
-
\??\c:\vppdd.exec:\vppdd.exe88⤵PID:4516
-
\??\c:\vjdpd.exec:\vjdpd.exe89⤵PID:1976
-
\??\c:\22080.exec:\22080.exe90⤵PID:4160
-
\??\c:\8626026.exec:\8626026.exe91⤵PID:1472
-
\??\c:\pjvpj.exec:\pjvpj.exe92⤵PID:1020
-
\??\c:\k40484.exec:\k40484.exe93⤵PID:2228
-
\??\c:\xlfxxrr.exec:\xlfxxrr.exe94⤵PID:1360
-
\??\c:\jjjjp.exec:\jjjjp.exe95⤵PID:4612
-
\??\c:\1nhtnh.exec:\1nhtnh.exe96⤵PID:4712
-
\??\c:\pddvj.exec:\pddvj.exe97⤵PID:3468
-
\??\c:\5jjvj.exec:\5jjvj.exe98⤵PID:1048
-
\??\c:\2048260.exec:\2048260.exe99⤵PID:4696
-
\??\c:\8648884.exec:\8648884.exe100⤵PID:4864
-
\??\c:\jvdpp.exec:\jvdpp.exe101⤵PID:4328
-
\??\c:\04448.exec:\04448.exe102⤵PID:2028
-
\??\c:\xlrlfxr.exec:\xlrlfxr.exe103⤵PID:4644
-
\??\c:\k00822.exec:\k00822.exe104⤵PID:1592
-
\??\c:\4026666.exec:\4026666.exe105⤵PID:1076
-
\??\c:\6282048.exec:\6282048.exe106⤵PID:2720
-
\??\c:\8664260.exec:\8664260.exe107⤵PID:940
-
\??\c:\28444.exec:\28444.exe108⤵PID:4540
-
\??\c:\fxffffl.exec:\fxffffl.exe109⤵PID:1148
-
\??\c:\7frrxrf.exec:\7frrxrf.exe110⤵PID:1436
-
\??\c:\nbhthb.exec:\nbhthb.exe111⤵PID:3840
-
\??\c:\q80826.exec:\q80826.exe112⤵PID:3544
-
\??\c:\840482.exec:\840482.exe113⤵PID:3560
-
\??\c:\6482228.exec:\6482228.exe114⤵PID:2124
-
\??\c:\04064.exec:\04064.exe115⤵PID:4340
-
\??\c:\08826.exec:\08826.exe116⤵PID:1708
-
\??\c:\jdjvj.exec:\jdjvj.exe117⤵PID:4880
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe118⤵PID:788
-
\??\c:\2882048.exec:\2882048.exe119⤵PID:468
-
\??\c:\jjjdd.exec:\jjjdd.exe120⤵PID:2476
-
\??\c:\tnhtnb.exec:\tnhtnb.exe121⤵PID:212
-
\??\c:\pjdpj.exec:\pjdpj.exe122⤵PID:4676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-