Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 09:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe
-
Size
454KB
-
MD5
395efe4a4df26e6eff64afcddb882e80
-
SHA1
83a2a5bf5cdeac831ed55744cc64b20980f57ffc
-
SHA256
3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2
-
SHA512
3e2c7319acb67e97e96d383c2493be70a2c1863db85d4ad8934a8135928474729b8ff583a7b0d62840fdc03d6c7bd19c5ded04049d52ebbb556e8dc8c47a3e23
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeH5:q7Tc2NYHUrAwfMp3CDH5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2468-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3440-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3008-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2176-23-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3680-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/952-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1596-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3020-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1928-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4176-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2716-79-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/800-204-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1384-310-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4552-294-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3584-281-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2332-276-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4440-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1784-260-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3820-244-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3928-227-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5040-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2604-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3980-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3140-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/880-197-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3556-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4036-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4516-171-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4088-165-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3124-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4052-147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3480-142-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5028-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3216-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/8-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5056-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4616-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4768-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/968-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2856-57-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1824-328-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4340-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2708-354-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/636-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4352-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3548-413-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4844-435-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1072-439-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-467-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1620-492-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/64-547-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3700-563-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2052-570-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3248-625-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2820-635-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1488-651-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4356-660-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4264-667-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3132-721-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4240-789-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4896-896-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4772-1273-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3780-1799-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3440 thnhnn.exe 3008 pjdpj.exe 2176 080406.exe 3680 ppjdv.exe 952 ffffxxx.exe 1432 2622888.exe 3020 242600.exe 1596 xffxxxr.exe 2856 bnhbbh.exe 1928 4842600.exe 968 0066004.exe 4176 bthhnn.exe 2716 jdpjp.exe 4768 84082.exe 4616 nhnhnn.exe 5056 lffrffx.exe 8 flrrlll.exe 3216 7rxrxxf.exe 2240 046600.exe 4256 46604.exe 5028 7xlllll.exe 2564 26222.exe 2248 5djdd.exe 3480 02048.exe 4052 nhttbb.exe 3124 822820.exe 3916 088826.exe 4088 pvdvv.exe 4516 40662.exe 4108 xfllllf.exe 4036 4026004.exe 508 264220.exe 3556 hhnbnn.exe 2284 rlxrllf.exe 880 40664.exe 228 tttnbb.exe 800 0804444.exe 3140 djjdj.exe 2764 8660266.exe 3980 8404822.exe 2604 1llfxfx.exe 5040 488266.exe 3928 86606.exe 5044 1rrrlxr.exe 1500 7lrrrrl.exe 1740 3lfxrrl.exe 3984 6248262.exe 3820 bhnhbb.exe 1884 xrrlffl.exe 588 dvvpj.exe 4492 9lffxxr.exe 1252 i482664.exe 1784 k24444.exe 3340 4000062.exe 4440 fllfrrf.exe 4432 040066.exe 2520 g6626.exe 2332 bhtttt.exe 3584 rlfrxlr.exe 1452 hntntt.exe 2152 862622.exe 3744 xffffff.exe 4552 dvvpj.exe 3260 222606.exe -
resource yara_rule behavioral2/memory/2468-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3440-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3008-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2176-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3680-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/952-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3020-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1596-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3020-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1928-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4176-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2716-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/800-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1384-310-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4552-294-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3584-281-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2332-276-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4440-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1784-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3820-244-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3928-227-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2604-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3980-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3140-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/880-197-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3556-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4036-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4516-171-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4088-165-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3124-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4052-147-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3480-142-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5028-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3216-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/8-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5056-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4616-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4768-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/968-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2856-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1824-328-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4340-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2708-354-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/636-378-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/636-383-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4996-384-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3548-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4844-435-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1072-439-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5052-467-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1620-492-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/64-547-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3700-563-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2052-570-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3248-625-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2820-635-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1488-651-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4356-660-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4264-667-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3188-687-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3132-721-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3432-776-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0884600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 406604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6448428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4880626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c060000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m4864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8404822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3440 2468 3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe 83 PID 2468 wrote to memory of 3440 2468 3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe 83 PID 2468 wrote to memory of 3440 2468 3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe 83 PID 3440 wrote to memory of 3008 3440 thnhnn.exe 84 PID 3440 wrote to memory of 3008 3440 thnhnn.exe 84 PID 3440 wrote to memory of 3008 3440 thnhnn.exe 84 PID 3008 wrote to memory of 2176 3008 pjdpj.exe 85 PID 3008 wrote to memory of 2176 3008 pjdpj.exe 85 PID 3008 wrote to memory of 2176 3008 pjdpj.exe 85 PID 2176 wrote to memory of 3680 2176 080406.exe 86 PID 2176 wrote to memory of 3680 2176 080406.exe 86 PID 2176 wrote to memory of 3680 2176 080406.exe 86 PID 3680 wrote to memory of 952 3680 ppjdv.exe 87 PID 3680 wrote to memory of 952 3680 ppjdv.exe 87 PID 3680 wrote to memory of 952 3680 ppjdv.exe 87 PID 952 wrote to memory of 1432 952 ffffxxx.exe 88 PID 952 wrote to memory of 1432 952 ffffxxx.exe 88 PID 952 wrote to memory of 1432 952 ffffxxx.exe 88 PID 1432 wrote to memory of 3020 1432 2622888.exe 89 PID 1432 wrote to memory of 3020 1432 2622888.exe 89 PID 1432 wrote to memory of 3020 1432 2622888.exe 89 PID 3020 wrote to memory of 1596 3020 242600.exe 90 PID 3020 wrote to memory of 1596 3020 242600.exe 90 PID 3020 wrote to memory of 1596 3020 242600.exe 90 PID 1596 wrote to memory of 2856 1596 xffxxxr.exe 91 PID 1596 wrote to memory of 2856 1596 xffxxxr.exe 91 PID 1596 wrote to memory of 2856 1596 xffxxxr.exe 91 PID 2856 wrote to memory of 1928 2856 bnhbbh.exe 92 PID 2856 wrote to memory of 1928 2856 bnhbbh.exe 92 PID 2856 wrote to memory of 1928 2856 bnhbbh.exe 92 PID 1928 wrote to memory of 968 1928 4842600.exe 93 PID 1928 wrote to memory of 968 1928 4842600.exe 93 PID 1928 wrote to memory of 968 1928 4842600.exe 93 PID 968 wrote to memory of 4176 968 0066004.exe 94 PID 968 wrote to memory of 4176 968 0066004.exe 94 PID 968 wrote to memory of 4176 968 0066004.exe 94 PID 4176 wrote to memory of 2716 4176 bthhnn.exe 95 PID 4176 wrote to memory of 2716 4176 bthhnn.exe 95 PID 4176 wrote to memory of 2716 4176 bthhnn.exe 95 PID 2716 wrote to memory of 4768 2716 jdpjp.exe 96 PID 2716 wrote to memory of 4768 2716 jdpjp.exe 96 PID 2716 wrote to memory of 4768 2716 jdpjp.exe 96 PID 4768 wrote to memory of 4616 4768 84082.exe 97 PID 4768 wrote to memory of 4616 4768 84082.exe 97 PID 4768 wrote to memory of 4616 4768 84082.exe 97 PID 4616 wrote to memory of 5056 4616 nhnhnn.exe 98 PID 4616 wrote to memory of 5056 4616 nhnhnn.exe 98 PID 4616 wrote to memory of 5056 4616 nhnhnn.exe 98 PID 5056 wrote to memory of 8 5056 lffrffx.exe 99 PID 5056 wrote to memory of 8 5056 lffrffx.exe 99 PID 5056 wrote to memory of 8 5056 lffrffx.exe 99 PID 8 wrote to memory of 3216 8 flrrlll.exe 100 PID 8 wrote to memory of 3216 8 flrrlll.exe 100 PID 8 wrote to memory of 3216 8 flrrlll.exe 100 PID 3216 wrote to memory of 2240 3216 7rxrxxf.exe 101 PID 3216 wrote to memory of 2240 3216 7rxrxxf.exe 101 PID 3216 wrote to memory of 2240 3216 7rxrxxf.exe 101 PID 2240 wrote to memory of 4256 2240 046600.exe 102 PID 2240 wrote to memory of 4256 2240 046600.exe 102 PID 2240 wrote to memory of 4256 2240 046600.exe 102 PID 4256 wrote to memory of 5028 4256 46604.exe 103 PID 4256 wrote to memory of 5028 4256 46604.exe 103 PID 4256 wrote to memory of 5028 4256 46604.exe 103 PID 5028 wrote to memory of 2564 5028 7xlllll.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe"C:\Users\Admin\AppData\Local\Temp\3a80e1d2e269b3b21e8b03fe2cca82692eaf86f00c94c60f43641858da2160d2N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\thnhnn.exec:\thnhnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\pjdpj.exec:\pjdpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\080406.exec:\080406.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\ppjdv.exec:\ppjdv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\ffffxxx.exec:\ffffxxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\2622888.exec:\2622888.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
\??\c:\242600.exec:\242600.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\xffxxxr.exec:\xffxxxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\bnhbbh.exec:\bnhbbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\4842600.exec:\4842600.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\0066004.exec:\0066004.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\bthhnn.exec:\bthhnn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\jdpjp.exec:\jdpjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\84082.exec:\84082.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\nhnhnn.exec:\nhnhnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\lffrffx.exec:\lffrffx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\flrrlll.exec:\flrrlll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
\??\c:\7rxrxxf.exec:\7rxrxxf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\046600.exec:\046600.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\46604.exec:\46604.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
\??\c:\7xlllll.exec:\7xlllll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\26222.exec:\26222.exe23⤵
- Executes dropped EXE
PID:2564 -
\??\c:\5djdd.exec:\5djdd.exe24⤵
- Executes dropped EXE
PID:2248 -
\??\c:\02048.exec:\02048.exe25⤵
- Executes dropped EXE
PID:3480 -
\??\c:\nhttbb.exec:\nhttbb.exe26⤵
- Executes dropped EXE
PID:4052 -
\??\c:\822820.exec:\822820.exe27⤵
- Executes dropped EXE
PID:3124 -
\??\c:\088826.exec:\088826.exe28⤵
- Executes dropped EXE
PID:3916 -
\??\c:\pvdvv.exec:\pvdvv.exe29⤵
- Executes dropped EXE
PID:4088 -
\??\c:\40662.exec:\40662.exe30⤵
- Executes dropped EXE
PID:4516 -
\??\c:\xfllllf.exec:\xfllllf.exe31⤵
- Executes dropped EXE
PID:4108 -
\??\c:\4026004.exec:\4026004.exe32⤵
- Executes dropped EXE
PID:4036 -
\??\c:\264220.exec:\264220.exe33⤵
- Executes dropped EXE
PID:508 -
\??\c:\hhnbnn.exec:\hhnbnn.exe34⤵
- Executes dropped EXE
PID:3556 -
\??\c:\rlxrllf.exec:\rlxrllf.exe35⤵
- Executes dropped EXE
PID:2284 -
\??\c:\40664.exec:\40664.exe36⤵
- Executes dropped EXE
PID:880 -
\??\c:\tttnbb.exec:\tttnbb.exe37⤵
- Executes dropped EXE
PID:228 -
\??\c:\0804444.exec:\0804444.exe38⤵
- Executes dropped EXE
PID:800 -
\??\c:\djjdj.exec:\djjdj.exe39⤵
- Executes dropped EXE
PID:3140 -
\??\c:\8660266.exec:\8660266.exe40⤵
- Executes dropped EXE
PID:2764 -
\??\c:\8404822.exec:\8404822.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3980 -
\??\c:\1llfxfx.exec:\1llfxfx.exe42⤵
- Executes dropped EXE
PID:2604 -
\??\c:\488266.exec:\488266.exe43⤵
- Executes dropped EXE
PID:5040 -
\??\c:\86606.exec:\86606.exe44⤵
- Executes dropped EXE
PID:3928 -
\??\c:\1rrrlxr.exec:\1rrrlxr.exe45⤵
- Executes dropped EXE
PID:5044 -
\??\c:\7lrrrrl.exec:\7lrrrrl.exe46⤵
- Executes dropped EXE
PID:1500 -
\??\c:\3lfxrrl.exec:\3lfxrrl.exe47⤵
- Executes dropped EXE
PID:1740 -
\??\c:\6248262.exec:\6248262.exe48⤵
- Executes dropped EXE
PID:3984 -
\??\c:\bhnhbb.exec:\bhnhbb.exe49⤵
- Executes dropped EXE
PID:3820 -
\??\c:\xrrlffl.exec:\xrrlffl.exe50⤵
- Executes dropped EXE
PID:1884 -
\??\c:\dvvpj.exec:\dvvpj.exe51⤵
- Executes dropped EXE
PID:588 -
\??\c:\9lffxxr.exec:\9lffxxr.exe52⤵
- Executes dropped EXE
PID:4492 -
\??\c:\i482664.exec:\i482664.exe53⤵
- Executes dropped EXE
PID:1252 -
\??\c:\k24444.exec:\k24444.exe54⤵
- Executes dropped EXE
PID:1784 -
\??\c:\4000062.exec:\4000062.exe55⤵
- Executes dropped EXE
PID:3340 -
\??\c:\fllfrrf.exec:\fllfrrf.exe56⤵
- Executes dropped EXE
PID:4440 -
\??\c:\040066.exec:\040066.exe57⤵
- Executes dropped EXE
PID:4432 -
\??\c:\g6626.exec:\g6626.exe58⤵
- Executes dropped EXE
PID:2520 -
\??\c:\bhtttt.exec:\bhtttt.exe59⤵
- Executes dropped EXE
PID:2332 -
\??\c:\rlfrxlr.exec:\rlfrxlr.exe60⤵
- Executes dropped EXE
PID:3584 -
\??\c:\hntntt.exec:\hntntt.exe61⤵
- Executes dropped EXE
PID:1452 -
\??\c:\862622.exec:\862622.exe62⤵
- Executes dropped EXE
PID:2152 -
\??\c:\xffffff.exec:\xffffff.exe63⤵
- Executes dropped EXE
PID:3744 -
\??\c:\dvvpj.exec:\dvvpj.exe64⤵
- Executes dropped EXE
PID:4552 -
\??\c:\222606.exec:\222606.exe65⤵
- Executes dropped EXE
PID:3260 -
\??\c:\240088.exec:\240088.exe66⤵PID:756
-
\??\c:\rrrlllf.exec:\rrrlllf.exe67⤵PID:1908
-
\??\c:\1vpjd.exec:\1vpjd.exe68⤵PID:2612
-
\??\c:\48882.exec:\48882.exe69⤵PID:1384
-
\??\c:\g8482.exec:\g8482.exe70⤵PID:1848
-
\??\c:\hbbtnh.exec:\hbbtnh.exe71⤵PID:2836
-
\??\c:\24866.exec:\24866.exe72⤵PID:1092
-
\??\c:\i400400.exec:\i400400.exe73⤵PID:4304
-
\??\c:\jvvvp.exec:\jvvvp.exe74⤵PID:1824
-
\??\c:\4660000.exec:\4660000.exe75⤵PID:4340
-
\??\c:\80248.exec:\80248.exe76⤵PID:4480
-
\??\c:\rfxrllf.exec:\rfxrllf.exe77⤵PID:1380
-
\??\c:\hhnhnh.exec:\hhnhnh.exe78⤵
- System Location Discovery: System Language Discovery
PID:4508 -
\??\c:\vvjvj.exec:\vvjvj.exe79⤵PID:3036
-
\??\c:\e26420.exec:\e26420.exe80⤵PID:716
-
\??\c:\vdvdp.exec:\vdvdp.exe81⤵PID:1692
-
\??\c:\bbhnnn.exec:\bbhnnn.exe82⤵PID:2708
-
\??\c:\vpvvj.exec:\vpvvj.exe83⤵PID:4992
-
\??\c:\i664286.exec:\i664286.exe84⤵PID:2564
-
\??\c:\u828888.exec:\u828888.exe85⤵PID:4044
-
\??\c:\jvjvj.exec:\jvjvj.exe86⤵PID:856
-
\??\c:\006822.exec:\006822.exe87⤵PID:4836
-
\??\c:\c064208.exec:\c064208.exe88⤵PID:2024
-
\??\c:\lxxfrlx.exec:\lxxfrlx.exe89⤵PID:708
-
\??\c:\hbtnbt.exec:\hbtnbt.exe90⤵PID:4516
-
\??\c:\btthth.exec:\btthth.exe91⤵PID:636
-
\??\c:\o480048.exec:\o480048.exe92⤵PID:4996
-
\??\c:\nnhbnt.exec:\nnhbnt.exe93⤵PID:3556
-
\??\c:\08006.exec:\08006.exe94⤵PID:2592
-
\??\c:\6486426.exec:\6486426.exe95⤵PID:880
-
\??\c:\fxxrffr.exec:\fxxrffr.exe96⤵PID:4412
-
\??\c:\jdvjv.exec:\jdvjv.exe97⤵PID:3084
-
\??\c:\2608648.exec:\2608648.exe98⤵PID:4352
-
\??\c:\tnhttn.exec:\tnhttn.exe99⤵PID:4084
-
\??\c:\vdvjp.exec:\vdvjp.exe100⤵PID:3548
-
\??\c:\7hbhtn.exec:\7hbhtn.exe101⤵PID:4892
-
\??\c:\tbhbbh.exec:\tbhbbh.exe102⤵PID:5092
-
\??\c:\7rfxfrf.exec:\7rfxfrf.exe103⤵PID:4928
-
\??\c:\0442486.exec:\0442486.exe104⤵PID:1500
-
\??\c:\g2804.exec:\g2804.exe105⤵PID:1740
-
\??\c:\lxrxlrx.exec:\lxrxlrx.exe106⤵PID:3248
-
\??\c:\264420.exec:\264420.exe107⤵PID:4844
-
\??\c:\088646.exec:\088646.exe108⤵PID:1072
-
\??\c:\08802.exec:\08802.exe109⤵PID:3964
-
\??\c:\2846420.exec:\2846420.exe110⤵PID:3760
-
\??\c:\ddvjv.exec:\ddvjv.exe111⤵PID:3692
-
\??\c:\648642.exec:\648642.exe112⤵PID:4620
-
\??\c:\rffrrlr.exec:\rffrrlr.exe113⤵PID:4592
-
\??\c:\jpjpd.exec:\jpjpd.exe114⤵PID:4432
-
\??\c:\lrfrxlx.exec:\lrfrxlx.exe115⤵PID:1944
-
\??\c:\242008.exec:\242008.exe116⤵PID:2448
-
\??\c:\hhnbhb.exec:\hhnbhb.exe117⤵PID:5052
-
\??\c:\6064208.exec:\6064208.exe118⤵PID:1048
-
\??\c:\jdjvj.exec:\jdjvj.exe119⤵PID:2512
-
\??\c:\vjpvp.exec:\vjpvp.exe120⤵PID:3836
-
\??\c:\7xfrxrl.exec:\7xfrxrl.exe121⤵PID:3728
-
\??\c:\1jvpj.exec:\1jvpj.exe122⤵PID:3672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-