Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:36
Behavioral task
behavioral1
Sample
27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe
-
Size
3.7MB
-
MD5
ddf90800de4b47fb26c03f6f646346e2
-
SHA1
3bb32a60164c10721200549fd060708370a0f661
-
SHA256
27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04
-
SHA512
21ec966e1ca53c1191f94811701fb9c3f11fe465275eccacf4c01f16c00f2fd14b3b6bcc198b5686b6bd0e4ce414d6180eaca4c00ecb03a4785516bdf54ebfca
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98q1:U6XLq/qPPslzKx/dJg1ErmNb
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 52 IoCs
resource yara_rule behavioral1/memory/1596-0-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/612-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-26-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/2424-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2216-33-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2216-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2464-50-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2204-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-67-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2680-63-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2648-79-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2648-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2820-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2696-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2560-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2644-111-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2644-115-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2728-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1488-153-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1488-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1364-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/752-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2860-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2912-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3052-215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2884-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/324-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/896-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2008-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1436-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1860-295-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/612-332-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1016-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1940-357-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-379-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2764-387-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2524-401-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2508-451-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1688-459-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2636-466-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1960-480-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1556-505-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/1032-596-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2660-673-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2864-687-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1660-694-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1252-734-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1668-741-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2260-748-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/864-796-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/1092-802-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1616-823-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 612 dvppd.exe 2424 826666.exe 2216 xrfrfrf.exe 2464 848406.exe 2204 rfxflrr.exe 2680 64880.exe 2648 48628.exe 2820 464062.exe 2560 htbbhh.exe 2696 06802.exe 2644 86028.exe 2040 1djpv.exe 2700 rflllrr.exe 2728 jdpjd.exe 1488 42062.exe 1364 48066.exe 752 2602884.exe 2860 nbntbb.exe 2900 060062.exe 2912 0262888.exe 776 thhntt.exe 3052 lxxxllf.exe 2884 6404628.exe 604 xlrxrfr.exe 324 xlrxxlx.exe 2592 nbnhbb.exe 3056 q82282.exe 1720 0846284.exe 896 rffflfl.exe 1016 djvdj.exe 1860 bhtnnt.exe 2008 1ntbnn.exe 1436 4624066.exe 2360 608844.exe 1640 5rflxxl.exe 1592 xlrxfxx.exe 612 6426000.exe 2452 80622.exe 2176 860062.exe 1940 66446.exe 2712 pvjjv.exe 2788 jdppp.exe 2680 24682.exe 2764 frxxxrx.exe 2820 rfrxflf.exe 2524 2640840.exe 2692 ddvdp.exe 2224 g8684.exe 2572 e80022.exe 2040 08066.exe 2852 246228.exe 2728 bnthbh.exe 2776 hhhtnh.exe 2508 2466622.exe 2740 1dvvd.exe 1688 nbbnnt.exe 2636 0440222.exe 1184 1xffxxf.exe 1960 i866884.exe 332 4200628.exe 1448 w46000.exe 1556 m8062.exe 276 jddjj.exe 1080 6606840.exe -
resource yara_rule behavioral1/memory/1596-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000a00000001202c-9.dat upx behavioral1/memory/612-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1596-6-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0008000000015e8f-20.dat upx behavioral1/memory/612-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2424-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000015ef6-28.dat upx behavioral1/files/0x0008000000015f4f-39.dat upx behavioral1/memory/2216-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000015fdb-51.dat upx behavioral1/memory/2464-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000015d33-59.dat upx behavioral1/memory/2204-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2648-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016239-69.dat upx behavioral1/files/0x0007000000016307-80.dat upx behavioral1/memory/2648-78-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2820-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016485-88.dat upx behavioral1/memory/2696-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016621-99.dat upx behavioral1/memory/2560-97-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001925b-107.dat upx behavioral1/files/0x000500000001925d-117.dat upx behavioral1/files/0x000500000001930d-125.dat upx behavioral1/files/0x000500000001932a-133.dat upx behavioral1/files/0x0005000000019377-142.dat upx behavioral1/memory/2728-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001938a-154.dat upx behavioral1/memory/1488-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001938e-164.dat upx behavioral1/memory/1364-163-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001939c-172.dat upx behavioral1/memory/752-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001941b-181.dat upx behavioral1/memory/2860-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019429-190.dat upx behavioral1/files/0x000500000001946b-200.dat upx behavioral1/memory/776-199-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2912-197-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019481-208.dat upx behavioral1/files/0x0005000000019490-216.dat upx behavioral1/memory/3052-215-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001949d-226.dat upx behavioral1/memory/2884-224-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/324-235-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000194c6-234.dat upx behavioral1/files/0x00050000000194d0-244.dat upx behavioral1/memory/2592-243-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000194da-252.dat upx behavioral1/files/0x00050000000194e4-260.dat upx behavioral1/files/0x00050000000194e6-270.dat upx behavioral1/memory/1720-266-0x00000000002A0000-0x00000000002C7000-memory.dmp upx behavioral1/memory/896-277-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019551-278.dat upx behavioral1/files/0x000500000001955c-288.dat upx behavioral1/memory/1860-287-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019581-297.dat upx behavioral1/memory/1436-305-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2008-304-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1436-312-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1640-319-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1860-295-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6024620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w48462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flflxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6484668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 220240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2268884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 646628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0882646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8028288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0848088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 842284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 486862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c400446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2662062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflxffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 246488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 612 1596 27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe 28 PID 1596 wrote to memory of 612 1596 27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe 28 PID 1596 wrote to memory of 612 1596 27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe 28 PID 1596 wrote to memory of 612 1596 27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe 28 PID 612 wrote to memory of 2424 612 dvppd.exe 29 PID 612 wrote to memory of 2424 612 dvppd.exe 29 PID 612 wrote to memory of 2424 612 dvppd.exe 29 PID 612 wrote to memory of 2424 612 dvppd.exe 29 PID 2424 wrote to memory of 2216 2424 826666.exe 30 PID 2424 wrote to memory of 2216 2424 826666.exe 30 PID 2424 wrote to memory of 2216 2424 826666.exe 30 PID 2424 wrote to memory of 2216 2424 826666.exe 30 PID 2216 wrote to memory of 2464 2216 xrfrfrf.exe 31 PID 2216 wrote to memory of 2464 2216 xrfrfrf.exe 31 PID 2216 wrote to memory of 2464 2216 xrfrfrf.exe 31 PID 2216 wrote to memory of 2464 2216 xrfrfrf.exe 31 PID 2464 wrote to memory of 2204 2464 848406.exe 32 PID 2464 wrote to memory of 2204 2464 848406.exe 32 PID 2464 wrote to memory of 2204 2464 848406.exe 32 PID 2464 wrote to memory of 2204 2464 848406.exe 32 PID 2204 wrote to memory of 2680 2204 rfxflrr.exe 70 PID 2204 wrote to memory of 2680 2204 rfxflrr.exe 70 PID 2204 wrote to memory of 2680 2204 rfxflrr.exe 70 PID 2204 wrote to memory of 2680 2204 rfxflrr.exe 70 PID 2680 wrote to memory of 2648 2680 64880.exe 34 PID 2680 wrote to memory of 2648 2680 64880.exe 34 PID 2680 wrote to memory of 2648 2680 64880.exe 34 PID 2680 wrote to memory of 2648 2680 64880.exe 34 PID 2648 wrote to memory of 2820 2648 48628.exe 72 PID 2648 wrote to memory of 2820 2648 48628.exe 72 PID 2648 wrote to memory of 2820 2648 48628.exe 72 PID 2648 wrote to memory of 2820 2648 48628.exe 72 PID 2820 wrote to memory of 2560 2820 464062.exe 159 PID 2820 wrote to memory of 2560 2820 464062.exe 159 PID 2820 wrote to memory of 2560 2820 464062.exe 159 PID 2820 wrote to memory of 2560 2820 464062.exe 159 PID 2560 wrote to memory of 2696 2560 htbbhh.exe 37 PID 2560 wrote to memory of 2696 2560 htbbhh.exe 37 PID 2560 wrote to memory of 2696 2560 htbbhh.exe 37 PID 2560 wrote to memory of 2696 2560 htbbhh.exe 37 PID 2696 wrote to memory of 2644 2696 06802.exe 38 PID 2696 wrote to memory of 2644 2696 06802.exe 38 PID 2696 wrote to memory of 2644 2696 06802.exe 38 PID 2696 wrote to memory of 2644 2696 06802.exe 38 PID 2644 wrote to memory of 2040 2644 86028.exe 77 PID 2644 wrote to memory of 2040 2644 86028.exe 77 PID 2644 wrote to memory of 2040 2644 86028.exe 77 PID 2644 wrote to memory of 2040 2644 86028.exe 77 PID 2040 wrote to memory of 2700 2040 1djpv.exe 40 PID 2040 wrote to memory of 2700 2040 1djpv.exe 40 PID 2040 wrote to memory of 2700 2040 1djpv.exe 40 PID 2040 wrote to memory of 2700 2040 1djpv.exe 40 PID 2700 wrote to memory of 2728 2700 rflllrr.exe 79 PID 2700 wrote to memory of 2728 2700 rflllrr.exe 79 PID 2700 wrote to memory of 2728 2700 rflllrr.exe 79 PID 2700 wrote to memory of 2728 2700 rflllrr.exe 79 PID 2728 wrote to memory of 1488 2728 jdpjd.exe 42 PID 2728 wrote to memory of 1488 2728 jdpjd.exe 42 PID 2728 wrote to memory of 1488 2728 jdpjd.exe 42 PID 2728 wrote to memory of 1488 2728 jdpjd.exe 42 PID 1488 wrote to memory of 1364 1488 42062.exe 169 PID 1488 wrote to memory of 1364 1488 42062.exe 169 PID 1488 wrote to memory of 1364 1488 42062.exe 169 PID 1488 wrote to memory of 1364 1488 42062.exe 169
Processes
-
C:\Users\Admin\AppData\Local\Temp\27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe"C:\Users\Admin\AppData\Local\Temp\27b54fbd039a92ee53eeb9a7bb255dc79675f8ed5a4f2c6f1d8fe7f7af0beb04.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\dvppd.exec:\dvppd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:612 -
\??\c:\826666.exec:\826666.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\xrfrfrf.exec:\xrfrfrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\848406.exec:\848406.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\rfxflrr.exec:\rfxflrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\64880.exec:\64880.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\48628.exec:\48628.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\464062.exec:\464062.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\htbbhh.exec:\htbbhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\06802.exec:\06802.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\86028.exec:\86028.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\1djpv.exec:\1djpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\rflllrr.exec:\rflllrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\jdpjd.exec:\jdpjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\42062.exec:\42062.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
\??\c:\48066.exec:\48066.exe17⤵
- Executes dropped EXE
PID:1364 -
\??\c:\2602884.exec:\2602884.exe18⤵
- Executes dropped EXE
PID:752 -
\??\c:\nbntbb.exec:\nbntbb.exe19⤵
- Executes dropped EXE
PID:2860 -
\??\c:\060062.exec:\060062.exe20⤵
- Executes dropped EXE
PID:2900 -
\??\c:\0262888.exec:\0262888.exe21⤵
- Executes dropped EXE
PID:2912 -
\??\c:\thhntt.exec:\thhntt.exe22⤵
- Executes dropped EXE
PID:776 -
\??\c:\lxxxllf.exec:\lxxxllf.exe23⤵
- Executes dropped EXE
PID:3052 -
\??\c:\6404628.exec:\6404628.exe24⤵
- Executes dropped EXE
PID:2884 -
\??\c:\xlrxrfr.exec:\xlrxrfr.exe25⤵
- Executes dropped EXE
PID:604 -
\??\c:\xlrxxlx.exec:\xlrxxlx.exe26⤵
- Executes dropped EXE
PID:324 -
\??\c:\nbnhbb.exec:\nbnhbb.exe27⤵
- Executes dropped EXE
PID:2592 -
\??\c:\q82282.exec:\q82282.exe28⤵
- Executes dropped EXE
PID:3056 -
\??\c:\0846284.exec:\0846284.exe29⤵
- Executes dropped EXE
PID:1720 -
\??\c:\rffflfl.exec:\rffflfl.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896 -
\??\c:\djvdj.exec:\djvdj.exe31⤵
- Executes dropped EXE
PID:1016 -
\??\c:\bhtnnt.exec:\bhtnnt.exe32⤵
- Executes dropped EXE
PID:1860 -
\??\c:\1ntbnn.exec:\1ntbnn.exe33⤵
- Executes dropped EXE
PID:2008 -
\??\c:\4624066.exec:\4624066.exe34⤵
- Executes dropped EXE
PID:1436 -
\??\c:\608844.exec:\608844.exe35⤵
- Executes dropped EXE
PID:2360 -
\??\c:\5rflxxl.exec:\5rflxxl.exe36⤵
- Executes dropped EXE
PID:1640 -
\??\c:\xlrxfxx.exec:\xlrxfxx.exe37⤵
- Executes dropped EXE
PID:1592 -
\??\c:\6426000.exec:\6426000.exe38⤵
- Executes dropped EXE
PID:612 -
\??\c:\80622.exec:\80622.exe39⤵
- Executes dropped EXE
PID:2452 -
\??\c:\860062.exec:\860062.exe40⤵
- Executes dropped EXE
PID:2176 -
\??\c:\66446.exec:\66446.exe41⤵
- Executes dropped EXE
PID:1940 -
\??\c:\pvjjv.exec:\pvjjv.exe42⤵
- Executes dropped EXE
PID:2712 -
\??\c:\jdppp.exec:\jdppp.exe43⤵
- Executes dropped EXE
PID:2788 -
\??\c:\24682.exec:\24682.exe44⤵
- Executes dropped EXE
PID:2680 -
\??\c:\frxxxrx.exec:\frxxxrx.exe45⤵
- Executes dropped EXE
PID:2764 -
\??\c:\rfrxflf.exec:\rfrxflf.exe46⤵
- Executes dropped EXE
PID:2820 -
\??\c:\2640840.exec:\2640840.exe47⤵
- Executes dropped EXE
PID:2524 -
\??\c:\ddvdp.exec:\ddvdp.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692 -
\??\c:\g8684.exec:\g8684.exe49⤵
- Executes dropped EXE
PID:2224 -
\??\c:\e80022.exec:\e80022.exe50⤵
- Executes dropped EXE
PID:2572 -
\??\c:\08066.exec:\08066.exe51⤵
- Executes dropped EXE
PID:2040 -
\??\c:\246228.exec:\246228.exe52⤵
- Executes dropped EXE
PID:2852 -
\??\c:\bnthbh.exec:\bnthbh.exe53⤵
- Executes dropped EXE
PID:2728 -
\??\c:\hhhtnh.exec:\hhhtnh.exe54⤵
- Executes dropped EXE
PID:2776 -
\??\c:\2466622.exec:\2466622.exe55⤵
- Executes dropped EXE
PID:2508 -
\??\c:\1dvvd.exec:\1dvvd.exe56⤵
- Executes dropped EXE
PID:2740 -
\??\c:\nbbnnt.exec:\nbbnnt.exe57⤵
- Executes dropped EXE
PID:1688 -
\??\c:\0440222.exec:\0440222.exe58⤵
- Executes dropped EXE
PID:2636 -
\??\c:\1xffxxf.exec:\1xffxxf.exe59⤵
- Executes dropped EXE
PID:1184 -
\??\c:\i866884.exec:\i866884.exe60⤵
- Executes dropped EXE
PID:1960 -
\??\c:\4200628.exec:\4200628.exe61⤵
- Executes dropped EXE
PID:332 -
\??\c:\w46000.exec:\w46000.exe62⤵
- Executes dropped EXE
PID:1448 -
\??\c:\m8062.exec:\m8062.exe63⤵
- Executes dropped EXE
PID:1556 -
\??\c:\jddjj.exec:\jddjj.exe64⤵
- Executes dropped EXE
PID:276 -
\??\c:\6606840.exec:\6606840.exe65⤵
- Executes dropped EXE
PID:1080 -
\??\c:\jvjjv.exec:\jvjjv.exe66⤵PID:1092
-
\??\c:\02684.exec:\02684.exe67⤵PID:1552
-
\??\c:\lxlllrl.exec:\lxlllrl.exe68⤵PID:1748
-
\??\c:\9rfllrr.exec:\9rfllrr.exe69⤵PID:1256
-
\??\c:\flxflfr.exec:\flxflfr.exe70⤵PID:1752
-
\??\c:\g8066.exec:\g8066.exe71⤵PID:2992
-
\??\c:\bhnhbt.exec:\bhnhbt.exe72⤵PID:896
-
\??\c:\e62806.exec:\e62806.exe73⤵PID:1684
-
\??\c:\rfxflrr.exec:\rfxflrr.exe74⤵PID:3000
-
\??\c:\8028288.exec:\8028288.exe75⤵
- System Location Discovery: System Language Discovery
PID:888 -
\??\c:\jvjpv.exec:\jvjpv.exe76⤵PID:1440
-
\??\c:\xlxxfll.exec:\xlxxfll.exe77⤵PID:1528
-
\??\c:\i282844.exec:\i282844.exe78⤵PID:1032
-
\??\c:\88062.exec:\88062.exe79⤵PID:1908
-
\??\c:\8062222.exec:\8062222.exe80⤵PID:2376
-
\??\c:\5jdvd.exec:\5jdvd.exe81⤵PID:2232
-
\??\c:\nbnthn.exec:\nbnthn.exe82⤵PID:2460
-
\??\c:\3hnhnb.exec:\3hnhnb.exe83⤵PID:2176
-
\??\c:\9fffxxx.exec:\9fffxxx.exe84⤵PID:1940
-
\??\c:\c840604.exec:\c840604.exe85⤵PID:2712
-
\??\c:\5jppd.exec:\5jppd.exe86⤵PID:1884
-
\??\c:\6406288.exec:\6406288.exe87⤵PID:2780
-
\??\c:\9hhttt.exec:\9hhttt.exe88⤵PID:2684
-
\??\c:\240404.exec:\240404.exe89⤵PID:2660
-
\??\c:\m0884.exec:\m0884.exe90⤵
- System Location Discovery: System Language Discovery
PID:1880 -
\??\c:\3fxfrxf.exec:\3fxfrxf.exe91⤵PID:2864
-
\??\c:\8688440.exec:\8688440.exe92⤵PID:1652
-
\??\c:\dpppd.exec:\dpppd.exe93⤵
- System Location Discovery: System Language Discovery
PID:1660 -
\??\c:\w44040.exec:\w44040.exe94⤵PID:1504
-
\??\c:\c680444.exec:\c680444.exe95⤵PID:1672
-
\??\c:\806288.exec:\806288.exe96⤵PID:1668
-
\??\c:\444488.exec:\444488.exe97⤵PID:2624
-
\??\c:\c006842.exec:\c006842.exe98⤵PID:1252
-
\??\c:\46840.exec:\46840.exe99⤵PID:2888
-
\??\c:\xfllrrx.exec:\xfllrrx.exe100⤵PID:2260
-
\??\c:\060224.exec:\060224.exe101⤵PID:3032
-
\??\c:\00822.exec:\00822.exe102⤵PID:332
-
\??\c:\1hnhnn.exec:\1hnhnn.exe103⤵PID:2928
-
\??\c:\680600.exec:\680600.exe104⤵PID:864
-
\??\c:\20222.exec:\20222.exe105⤵PID:2420
-
\??\c:\9djdp.exec:\9djdp.exe106⤵PID:1836
-
\??\c:\468664.exec:\468664.exe107⤵PID:2120
-
\??\c:\5pppp.exec:\5pppp.exe108⤵PID:1092
-
\??\c:\pvjpv.exec:\pvjpv.exe109⤵PID:1376
-
\??\c:\frfxxfl.exec:\frfxxfl.exe110⤵PID:940
-
\??\c:\6044622.exec:\6044622.exe111⤵PID:1616
-
\??\c:\4468466.exec:\4468466.exe112⤵PID:2320
-
\??\c:\04224.exec:\04224.exe113⤵PID:1936
-
\??\c:\680684.exec:\680684.exe114⤵PID:2352
-
\??\c:\82468.exec:\82468.exe115⤵PID:1548
-
\??\c:\446806.exec:\446806.exe116⤵PID:2104
-
\??\c:\pddpj.exec:\pddpj.exe117⤵PID:2964
-
\??\c:\9pvvd.exec:\9pvvd.exe118⤵PID:2844
-
\??\c:\082620.exec:\082620.exe119⤵PID:2324
-
\??\c:\42080.exec:\42080.exe120⤵PID:1972
-
\??\c:\dvdjp.exec:\dvdjp.exe121⤵PID:1032
-
\??\c:\624268.exec:\624268.exe122⤵PID:1908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-