Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 00:59
Behavioral task
behavioral1
Sample
867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
120 seconds
General
-
Target
867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe
-
Size
3.7MB
-
MD5
eed70076e7aaaff681ce2a491d92fd80
-
SHA1
3bbaa24306ffa9b4ee874e6b3c2d51a631d465dc
-
SHA256
867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5a
-
SHA512
d19332bc028b73ff20779793df9645ac70d4efbc1c8278779ffe13db4be41b57b6811915554577084b9f3d02d692610a73c0d77781c4cdd0e2102746382fe98a
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98H:U6XLq/qPPslzKx/dJg1ErmNY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 51 IoCs
resource yara_rule behavioral1/memory/2304-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1924-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1180-22-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1180-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2804-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2900-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2724-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2908-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2732-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2152-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2024-103-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1000-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2960-119-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2960-123-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2708-137-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2708-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2416-179-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/484-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3016-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/448-215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/300-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1300-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1856-248-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/1644-278-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1532-307-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2988-321-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2236-337-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2772-349-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2908-375-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/352-437-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/868-536-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2360-549-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/984-562-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2540-631-0x0000000000260000-0x0000000000287000-memory.dmp family_blackmoon behavioral1/memory/2576-713-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/2688-720-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1544-823-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2824-900-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/988-951-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2788-958-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2948-1045-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1788-1077-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1788-1093-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2548-1116-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/780-1123-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3032-1142-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3068-1228-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1780-1241-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 1924 xrrrrrl.exe 1180 dvpvp.exe 2804 hbbthn.exe 2724 btntbb.exe 2900 3rlxrrf.exe 2908 bbnthh.exe 2732 hthhhb.exe 2664 nhbhbb.exe 2152 dvpdp.exe 2024 pjvdp.exe 1000 1xxflrx.exe 2960 ppvdj.exe 2680 xrlfrxf.exe 2708 jdvdj.exe 2504 ppjdj.exe 1704 bnbnbn.exe 1056 btbnbb.exe 2416 7nbtbb.exe 484 5vjjv.exe 2372 nhhtnt.exe 3016 dvpdj.exe 448 rfrrxrl.exe 2800 rlrrffr.exe 1300 tthhtb.exe 300 nbtbhh.exe 1856 nnttbt.exe 880 5thnbb.exe 688 dvjvj.exe 1644 3pdjp.exe 2580 rllrxxl.exe 2992 jjvvd.exe 1280 llxlxrf.exe 1532 dpddj.exe 2988 ppjjv.exe 1576 nhttbt.exe 1984 fxrrflx.exe 2236 jjvvj.exe 2832 1vvjd.exe 2772 bntbbb.exe 2904 httnnb.exe 2752 fxrrfxl.exe 2908 5pjpd.exe 2852 3nbbbb.exe 2316 httnnt.exe 1852 llxxllr.exe 2720 pjddd.exe 1556 rflxflx.exe 2864 rfxrfxf.exe 1880 pjvjv.exe 2576 jjpdp.exe 2688 ttnhnt.exe 2876 btbhnb.exe 352 1rrxflf.exe 1784 xxxfllr.exe 2948 pdjpv.exe 2100 3jdjp.exe 1616 jdvvj.exe 2424 dpvjv.exe 2964 nnnhtb.exe 2032 tntbnb.exe 2164 xfrxrrx.exe 1464 lflrflx.exe 1944 pdpvd.exe 2592 jpdpd.exe -
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2304-7-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0007000000012117-5.dat upx behavioral1/memory/2304-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1924-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d18-18.dat upx behavioral1/files/0x0008000000016d21-28.dat upx behavioral1/memory/1180-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d31-37.dat upx behavioral1/memory/2804-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016cec-45.dat upx behavioral1/memory/2900-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2724-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d42-56.dat upx behavioral1/memory/2908-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d4a-66.dat upx behavioral1/files/0x0007000000016d5e-76.dat upx behavioral1/memory/2732-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2664-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2152-85-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d68-84.dat upx behavioral1/files/0x00050000000186ea-94.dat upx behavioral1/memory/2152-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186ee-104.dat upx behavioral1/memory/2024-103-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1000-105-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000186fd-112.dat upx behavioral1/memory/2960-123-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018728-124.dat upx behavioral1/files/0x000500000001873d-132.dat upx behavioral1/memory/2708-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2680-131-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018784-143.dat upx behavioral1/memory/2708-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001878f-151.dat upx behavioral1/memory/1704-158-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x00050000000187a5-159.dat upx behavioral1/files/0x0006000000019023-167.dat upx behavioral1/files/0x000500000001925e-180.dat upx behavioral1/memory/2416-179-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/484-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019261-189.dat upx behavioral1/files/0x0005000000019282-197.dat upx behavioral1/files/0x0005000000019334-206.dat upx behavioral1/memory/3016-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/448-215-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019350-216.dat upx behavioral1/files/0x00050000000193b4-226.dat upx behavioral1/files/0x00050000000193c2-236.dat upx behavioral1/memory/300-237-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1300-234-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000193e1-244.dat upx behavioral1/files/0x000500000001941e-253.dat upx behavioral1/files/0x0005000000019427-261.dat upx behavioral1/files/0x0005000000019431-270.dat upx behavioral1/files/0x0005000000019441-279.dat upx behavioral1/memory/1644-278-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001944f-288.dat upx behavioral1/memory/2580-287-0x0000000001F10000-0x0000000001F37000-memory.dmp upx behavioral1/files/0x0005000000019461-298.dat upx behavioral1/memory/1532-307-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2988-321-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2236-334-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2236-337-0x00000000002A0000-0x00000000002C7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrfflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btntbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnntnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xlffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xxfllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5frrxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xfffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rxlflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxllxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xllrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xrrfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lflrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lxlfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrllrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1tttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xfrfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxrfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hthnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhtt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1924 2304 867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe 30 PID 2304 wrote to memory of 1924 2304 867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe 30 PID 2304 wrote to memory of 1924 2304 867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe 30 PID 2304 wrote to memory of 1924 2304 867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe 30 PID 1924 wrote to memory of 1180 1924 xrrrrrl.exe 31 PID 1924 wrote to memory of 1180 1924 xrrrrrl.exe 31 PID 1924 wrote to memory of 1180 1924 xrrrrrl.exe 31 PID 1924 wrote to memory of 1180 1924 xrrrrrl.exe 31 PID 1180 wrote to memory of 2804 1180 dvpvp.exe 32 PID 1180 wrote to memory of 2804 1180 dvpvp.exe 32 PID 1180 wrote to memory of 2804 1180 dvpvp.exe 32 PID 1180 wrote to memory of 2804 1180 dvpvp.exe 32 PID 2804 wrote to memory of 2724 2804 hbbthn.exe 33 PID 2804 wrote to memory of 2724 2804 hbbthn.exe 33 PID 2804 wrote to memory of 2724 2804 hbbthn.exe 33 PID 2804 wrote to memory of 2724 2804 hbbthn.exe 33 PID 2724 wrote to memory of 2900 2724 btntbb.exe 34 PID 2724 wrote to memory of 2900 2724 btntbb.exe 34 PID 2724 wrote to memory of 2900 2724 btntbb.exe 34 PID 2724 wrote to memory of 2900 2724 btntbb.exe 34 PID 2900 wrote to memory of 2908 2900 3rlxrrf.exe 35 PID 2900 wrote to memory of 2908 2900 3rlxrrf.exe 35 PID 2900 wrote to memory of 2908 2900 3rlxrrf.exe 35 PID 2900 wrote to memory of 2908 2900 3rlxrrf.exe 35 PID 2908 wrote to memory of 2732 2908 bbnthh.exe 36 PID 2908 wrote to memory of 2732 2908 bbnthh.exe 36 PID 2908 wrote to memory of 2732 2908 bbnthh.exe 36 PID 2908 wrote to memory of 2732 2908 bbnthh.exe 36 PID 2732 wrote to memory of 2664 2732 hthhhb.exe 37 PID 2732 wrote to memory of 2664 2732 hthhhb.exe 37 PID 2732 wrote to memory of 2664 2732 hthhhb.exe 37 PID 2732 wrote to memory of 2664 2732 hthhhb.exe 37 PID 2664 wrote to memory of 2152 2664 nhbhbb.exe 38 PID 2664 wrote to memory of 2152 2664 nhbhbb.exe 38 PID 2664 wrote to memory of 2152 2664 nhbhbb.exe 38 PID 2664 wrote to memory of 2152 2664 nhbhbb.exe 38 PID 2152 wrote to memory of 2024 2152 dvpdp.exe 39 PID 2152 wrote to memory of 2024 2152 dvpdp.exe 39 PID 2152 wrote to memory of 2024 2152 dvpdp.exe 39 PID 2152 wrote to memory of 2024 2152 dvpdp.exe 39 PID 2024 wrote to memory of 1000 2024 pjvdp.exe 40 PID 2024 wrote to memory of 1000 2024 pjvdp.exe 40 PID 2024 wrote to memory of 1000 2024 pjvdp.exe 40 PID 2024 wrote to memory of 1000 2024 pjvdp.exe 40 PID 1000 wrote to memory of 2960 1000 1xxflrx.exe 41 PID 1000 wrote to memory of 2960 1000 1xxflrx.exe 41 PID 1000 wrote to memory of 2960 1000 1xxflrx.exe 41 PID 1000 wrote to memory of 2960 1000 1xxflrx.exe 41 PID 2960 wrote to memory of 2680 2960 ppvdj.exe 42 PID 2960 wrote to memory of 2680 2960 ppvdj.exe 42 PID 2960 wrote to memory of 2680 2960 ppvdj.exe 42 PID 2960 wrote to memory of 2680 2960 ppvdj.exe 42 PID 2680 wrote to memory of 2708 2680 xrlfrxf.exe 43 PID 2680 wrote to memory of 2708 2680 xrlfrxf.exe 43 PID 2680 wrote to memory of 2708 2680 xrlfrxf.exe 43 PID 2680 wrote to memory of 2708 2680 xrlfrxf.exe 43 PID 2708 wrote to memory of 2504 2708 jdvdj.exe 44 PID 2708 wrote to memory of 2504 2708 jdvdj.exe 44 PID 2708 wrote to memory of 2504 2708 jdvdj.exe 44 PID 2708 wrote to memory of 2504 2708 jdvdj.exe 44 PID 2504 wrote to memory of 1704 2504 ppjdj.exe 45 PID 2504 wrote to memory of 1704 2504 ppjdj.exe 45 PID 2504 wrote to memory of 1704 2504 ppjdj.exe 45 PID 2504 wrote to memory of 1704 2504 ppjdj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe"C:\Users\Admin\AppData\Local\Temp\867edef80a9c2eb2f86a5ad9afde87a5d1a923959a131fb3a1452d58a7963b5aN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\xrrrrrl.exec:\xrrrrrl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\dvpvp.exec:\dvpvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
\??\c:\hbbthn.exec:\hbbthn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\btntbb.exec:\btntbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\3rlxrrf.exec:\3rlxrrf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\bbnthh.exec:\bbnthh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\hthhhb.exec:\hthhhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\nhbhbb.exec:\nhbhbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\dvpdp.exec:\dvpdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\pjvdp.exec:\pjvdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\1xxflrx.exec:\1xxflrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\ppvdj.exec:\ppvdj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\xrlfrxf.exec:\xrlfrxf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\jdvdj.exec:\jdvdj.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\ppjdj.exec:\ppjdj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\bnbnbn.exec:\bnbnbn.exe17⤵
- Executes dropped EXE
PID:1704 -
\??\c:\btbnbb.exec:\btbnbb.exe18⤵
- Executes dropped EXE
PID:1056 -
\??\c:\7nbtbb.exec:\7nbtbb.exe19⤵
- Executes dropped EXE
PID:2416 -
\??\c:\5vjjv.exec:\5vjjv.exe20⤵
- Executes dropped EXE
PID:484 -
\??\c:\nhhtnt.exec:\nhhtnt.exe21⤵
- Executes dropped EXE
PID:2372 -
\??\c:\dvpdj.exec:\dvpdj.exe22⤵
- Executes dropped EXE
PID:3016 -
\??\c:\rfrrxrl.exec:\rfrrxrl.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448 -
\??\c:\rlrrffr.exec:\rlrrffr.exe24⤵
- Executes dropped EXE
PID:2800 -
\??\c:\tthhtb.exec:\tthhtb.exe25⤵
- Executes dropped EXE
PID:1300 -
\??\c:\nbtbhh.exec:\nbtbhh.exe26⤵
- Executes dropped EXE
PID:300 -
\??\c:\nnttbt.exec:\nnttbt.exe27⤵
- Executes dropped EXE
PID:1856 -
\??\c:\5thnbb.exec:\5thnbb.exe28⤵
- Executes dropped EXE
PID:880 -
\??\c:\dvjvj.exec:\dvjvj.exe29⤵
- Executes dropped EXE
PID:688 -
\??\c:\3pdjp.exec:\3pdjp.exe30⤵
- Executes dropped EXE
PID:1644 -
\??\c:\rllrxxl.exec:\rllrxxl.exe31⤵
- Executes dropped EXE
PID:2580 -
\??\c:\jjvvd.exec:\jjvvd.exe32⤵
- Executes dropped EXE
PID:2992 -
\??\c:\llxlxrf.exec:\llxlxrf.exe33⤵
- Executes dropped EXE
PID:1280 -
\??\c:\dpddj.exec:\dpddj.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\ppjjv.exec:\ppjjv.exe35⤵
- Executes dropped EXE
PID:2988 -
\??\c:\nhttbt.exec:\nhttbt.exe36⤵
- Executes dropped EXE
PID:1576 -
\??\c:\fxrrflx.exec:\fxrrflx.exe37⤵
- Executes dropped EXE
PID:1984 -
\??\c:\jjvvj.exec:\jjvvj.exe38⤵
- Executes dropped EXE
PID:2236 -
\??\c:\1vvjd.exec:\1vvjd.exe39⤵
- Executes dropped EXE
PID:2832 -
\??\c:\bntbbb.exec:\bntbbb.exe40⤵
- Executes dropped EXE
PID:2772 -
\??\c:\httnnb.exec:\httnnb.exe41⤵
- Executes dropped EXE
PID:2904 -
\??\c:\fxrrfxl.exec:\fxrrfxl.exe42⤵
- Executes dropped EXE
PID:2752 -
\??\c:\5pjpd.exec:\5pjpd.exe43⤵
- Executes dropped EXE
PID:2908 -
\??\c:\3nbbbb.exec:\3nbbbb.exe44⤵
- Executes dropped EXE
PID:2852 -
\??\c:\httnnt.exec:\httnnt.exe45⤵
- Executes dropped EXE
PID:2316 -
\??\c:\llxxllr.exec:\llxxllr.exe46⤵
- Executes dropped EXE
PID:1852 -
\??\c:\pjddd.exec:\pjddd.exe47⤵
- Executes dropped EXE
PID:2720 -
\??\c:\rflxflx.exec:\rflxflx.exe48⤵
- Executes dropped EXE
PID:1556 -
\??\c:\rfxrfxf.exec:\rfxrfxf.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864 -
\??\c:\pjvjv.exec:\pjvjv.exe50⤵
- Executes dropped EXE
PID:1880 -
\??\c:\jjpdp.exec:\jjpdp.exe51⤵
- Executes dropped EXE
PID:2576 -
\??\c:\ttnhnt.exec:\ttnhnt.exe52⤵
- Executes dropped EXE
PID:2688 -
\??\c:\btbhnb.exec:\btbhnb.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876 -
\??\c:\1rrxflf.exec:\1rrxflf.exe54⤵
- Executes dropped EXE
PID:352 -
\??\c:\xxxfllr.exec:\xxxfllr.exe55⤵
- Executes dropped EXE
PID:1784 -
\??\c:\pdjpv.exec:\pdjpv.exe56⤵
- Executes dropped EXE
PID:2948 -
\??\c:\3jdjp.exec:\3jdjp.exe57⤵
- Executes dropped EXE
PID:2100 -
\??\c:\jdvvj.exec:\jdvvj.exe58⤵
- Executes dropped EXE
PID:1616 -
\??\c:\dpvjv.exec:\dpvjv.exe59⤵
- Executes dropped EXE
PID:2424 -
\??\c:\nnnhtb.exec:\nnnhtb.exe60⤵
- Executes dropped EXE
PID:2964 -
\??\c:\tntbnb.exec:\tntbnb.exe61⤵
- Executes dropped EXE
PID:2032 -
\??\c:\xfrxrrx.exec:\xfrxrrx.exe62⤵
- Executes dropped EXE
PID:2164 -
\??\c:\lflrflx.exec:\lflrflx.exe63⤵
- Executes dropped EXE
PID:1464 -
\??\c:\pdpvd.exec:\pdpvd.exe64⤵
- Executes dropped EXE
PID:1944 -
\??\c:\jpdpd.exec:\jpdpd.exe65⤵
- Executes dropped EXE
PID:2592 -
\??\c:\jdpvj.exec:\jdpvj.exe66⤵PID:1540
-
\??\c:\nnbhth.exec:\nnbhth.exe67⤵PID:280
-
\??\c:\rrxxlxf.exec:\rrxxlxf.exe68⤵PID:1700
-
\??\c:\ppjpv.exec:\ppjpv.exe69⤵PID:328
-
\??\c:\3pjpv.exec:\3pjpv.exe70⤵PID:868
-
\??\c:\tntnbn.exec:\tntnbn.exe71⤵PID:2360
-
\??\c:\xrlrlxr.exec:\xrlrlxr.exe72⤵PID:1432
-
\??\c:\5fxxlfr.exec:\5fxxlfr.exe73⤵PID:3012
-
\??\c:\3dpvv.exec:\3dpvv.exe74⤵PID:984
-
\??\c:\nhtthh.exec:\nhtthh.exe75⤵PID:2580
-
\??\c:\7hnntt.exec:\7hnntt.exe76⤵
- System Location Discovery: System Language Discovery
PID:1740 -
\??\c:\xrllxfx.exec:\xrllxfx.exe77⤵PID:2388
-
\??\c:\jvdvv.exec:\jvdvv.exe78⤵PID:2204
-
\??\c:\hhhhtt.exec:\hhhhtt.exe79⤵
- System Location Discovery: System Language Discovery
PID:2272 -
\??\c:\3nthtb.exec:\3nthtb.exe80⤵PID:1924
-
\??\c:\9ffxlll.exec:\9ffxlll.exe81⤵PID:2556
-
\??\c:\pjvvd.exec:\pjvvd.exe82⤵PID:2184
-
\??\c:\hbbhnh.exec:\hbbhnh.exe83⤵PID:2728
-
\??\c:\9nhnbt.exec:\9nhnbt.exe84⤵PID:2540
-
\??\c:\rllrfrf.exec:\rllrfrf.exe85⤵PID:2832
-
\??\c:\1jdpp.exec:\1jdpp.exe86⤵
- System Location Discovery: System Language Discovery
PID:2896 -
\??\c:\jjjjj.exec:\jjjjj.exe87⤵PID:2668
-
\??\c:\btttht.exec:\btttht.exe88⤵PID:2792
-
\??\c:\xrllrrf.exec:\xrllrrf.exe89⤵PID:2888
-
\??\c:\1jpjd.exec:\1jpjd.exe90⤵PID:2684
-
\??\c:\jvvpp.exec:\jvvpp.exe91⤵PID:1776
-
\??\c:\9bhbnn.exec:\9bhbnn.exe92⤵PID:1232
-
\??\c:\lxrxflx.exec:\lxrxflx.exe93⤵PID:1780
-
\??\c:\jjjvp.exec:\jjjvp.exe94⤵PID:1556
-
\??\c:\pdvdp.exec:\pdvdp.exe95⤵PID:2864
-
\??\c:\3tnnbb.exec:\3tnnbb.exe96⤵PID:1632
-
\??\c:\nhnhtt.exec:\nhnhtt.exe97⤵PID:2576
-
\??\c:\rffrxrf.exec:\rffrxrf.exe98⤵PID:2688
-
\??\c:\3jdjv.exec:\3jdjv.exe99⤵PID:2876
-
\??\c:\vpddd.exec:\vpddd.exe100⤵PID:1376
-
\??\c:\hthhnt.exec:\hthhnt.exe101⤵PID:1784
-
\??\c:\7fffrxf.exec:\7fffrxf.exe102⤵PID:2948
-
\??\c:\vppjv.exec:\vppjv.exe103⤵PID:2420
-
\??\c:\vpvdj.exec:\vpvdj.exe104⤵PID:2972
-
\??\c:\9tnnbb.exec:\9tnnbb.exe105⤵PID:2424
-
\??\c:\llffrrf.exec:\llffrrf.exe106⤵PID:2604
-
\??\c:\jdjvp.exec:\jdjvp.exe107⤵PID:2032
-
\??\c:\btnbhh.exec:\btnbhh.exe108⤵PID:2164
-
\??\c:\bnhnhh.exec:\bnhnhh.exe109⤵PID:2296
-
\??\c:\1lrlxrr.exec:\1lrlxrr.exe110⤵PID:1096
-
\??\c:\dpvpp.exec:\dpvpp.exe111⤵PID:956
-
\??\c:\bhtbhh.exec:\bhtbhh.exe112⤵PID:1544
-
\??\c:\3xllrfr.exec:\3xllrfr.exe113⤵
- System Location Discovery: System Language Discovery
PID:1696 -
\??\c:\xrflxxl.exec:\xrflxxl.exe114⤵PID:1308
-
\??\c:\dpvdj.exec:\dpvdj.exe115⤵PID:1748
-
\??\c:\1bbthb.exec:\1bbthb.exe116⤵PID:1324
-
\??\c:\thnnbt.exec:\thnnbt.exe117⤵
- System Location Discovery: System Language Discovery
PID:2148 -
\??\c:\rfxrrfl.exec:\rfxrrfl.exe118⤵PID:1656
-
\??\c:\3vdjp.exec:\3vdjp.exe119⤵PID:1448
-
\??\c:\bnhhnn.exec:\bnhhnn.exe120⤵PID:3008
-
\??\c:\7tnnbh.exec:\7tnnbh.exe121⤵PID:1836
-
\??\c:\3rfllxl.exec:\3rfllxl.exe122⤵PID:2332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-