Overview
overview
10Static
static
10Dropper/Berbew.exe
windows7-x64
10Dropper/Berbew.exe
windows10-2004-x64
10Dropper/Phorphiex.exe
windows7-x64
10Dropper/Phorphiex.exe
windows10-2004-x64
10RAT/31.exe
windows7-x64
10RAT/31.exe
windows10-2004-x64
10RAT/XClient.exe
windows7-x64
10RAT/XClient.exe
windows10-2004-x64
10RAT/file.exe
windows7-x64
7RAT/file.exe
windows10-2004-x64
7Ransomware...-2.exe
windows7-x64
10Ransomware...-2.exe
windows10-2004-x64
10Ransomware...01.exe
windows7-x64
10Ransomware...01.exe
windows10-2004-x64
10Ransomware...lt.exe
windows7-x64
10Ransomware...lt.exe
windows10-2004-x64
10Stealers/Azorult.exe
windows7-x64
10Stealers/Azorult.exe
windows10-2004-x64
10Stealers/B...on.exe
windows7-x64
10Stealers/B...on.exe
windows10-2004-x64
10Stealers/Dridex.dll
windows7-x64
10Stealers/Dridex.dll
windows10-2004-x64
Stealers/M..._2.exe
windows7-x64
9Stealers/M..._2.exe
windows10-2004-x64
10Stealers/lumma.exe
windows7-x64
10Stealers/lumma.exe
windows10-2004-x64
10Trojan/BetaBot.exe
windows7-x64
10Trojan/BetaBot.exe
windows10-2004-x64
10Trojan/Smo...er.exe
windows7-x64
10Trojan/Smo...er.exe
windows10-2004-x64
10Resubmissions
12-09-2024 02:23
240912-cvfznswere 1004-09-2024 00:09
240904-afvheascla 1003-09-2024 18:57
240903-xl8csavfrb 1003-09-2024 18:12
240903-ws828asgnm 10Analysis
-
max time kernel
104s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 18:57
Behavioral task
behavioral1
Sample
Dropper/Berbew.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Dropper/Berbew.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Dropper/Phorphiex.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Dropper/Phorphiex.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RAT/31.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
RAT/31.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RAT/XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RAT/XClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RAT/file.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
RAT/file.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Ransomware/Client-2.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Ransomware/Client-2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Ransomware/criticalupdate01.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ransomware/criticalupdate01.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Ransomware/default.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Ransomware/default.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Stealers/Azorult.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Stealers/Azorult.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Stealers/BlackMoon.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Stealers/BlackMoon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Stealers/Dridex.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Stealers/Dridex.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Stealers/lumma.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Stealers/lumma.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Trojan/BetaBot.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Trojan/BetaBot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Trojan/SmokeLoader.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Trojan/SmokeLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
Stealers/BlackMoon.exe
-
Size
387KB
-
MD5
336efa7460c08e3d47f29121742eb010
-
SHA1
f41c36cd83879d170309dede056563d35741b87b
-
SHA256
e6dd3fa33ad938b07c8978691f86b73e9f6fd84104b92f42566498bdb6b2930e
-
SHA512
e8d118fbe907a00d89c2514af4de475a0ea54943076bf90174234f77f2ec093a1246a0d4e78d1104a0dcda150b5441d28f4f3d1e768ecb20ae86383a99863c14
-
SSDEEP
12288:n3C9ytvngQjpUXoSWlnwJv90aKToFqwfN:SgdnJVU4TlnwJ6Goo
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral19/memory/2724-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2632-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2100-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2744-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2660-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2556-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2968-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2588-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1192-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1680-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/608-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2168-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/668-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1860-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2448-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2572-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1548-297-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/880-306-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1880-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2400-225-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2872-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2984-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2592-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2632 xfdfh.exe 2100 vpxjh.exe 2744 tnbrf.exe 2844 xxbnd.exe 2660 rjbpb.exe 2556 lvdvnt.exe 2968 pjvxh.exe 2588 thvdtfr.exe 1192 dbjbjdt.exe 1680 jbdpxvd.exe 608 bbnfjb.exe 2032 rjbtlbx.exe 2592 rddjn.exe 2168 dvnhvlv.exe 668 pjhvp.exe 1860 fdjjdrp.exe 2448 dvrnnjh.exe 2984 ltnndj.exe 2872 lbthrt.exe 2572 tvhnxhr.exe 1684 dhrlb.exe 2400 vrddx.exe 1476 hvphx.exe 816 jdbpp.exe 1404 dpnll.exe 1512 bdjlx.exe 1532 rfhvtrn.exe 1880 rhlvxn.exe 2244 hxxppdd.exe 1548 rhrdb.exe 880 tvnjhp.exe 2232 pnpltb.exe 2648 xldnpbb.exe 2632 vpxljb.exe 1920 bdfptfl.exe 2652 drxdnrt.exe 2716 vbtlrt.exe 2856 prpvhl.exe 2844 lhxpx.exe 2524 ljxll.exe 2304 jbvvhh.exe 2536 xxhjj.exe 2468 jhhpbp.exe 656 prldf.exe 2188 dbtjtb.exe 2212 bxlnfbd.exe 2904 vddfxl.exe 608 fldttpv.exe 2392 rtrdh.exe 1924 rbxtf.exe 2028 jjhdnj.exe 1984 rbjhp.exe 1748 tvdnljb.exe 2080 jtjldv.exe 2948 hpbhp.exe 2412 fljtlj.exe 1980 xbbnph.exe 944 fflbf.exe 968 bfbnxv.exe 1468 hfjvxjn.exe 1592 vtlbjjl.exe 1408 xddhbxt.exe 1516 ntrvxd.exe 1908 rrrxdvh.exe -
resource yara_rule behavioral19/memory/2724-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2632-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2100-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2744-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2844-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2844-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2660-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2660-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2660-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2556-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2556-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2556-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2968-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2588-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2588-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2588-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2588-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1192-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1680-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/608-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2168-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/668-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1860-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2448-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2572-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1548-297-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/880-306-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1880-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2400-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2872-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2984-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2592-144-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpndxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvnjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpppfjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djlbjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnnxnvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpbvtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpptf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvdvnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxljx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfxfptx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhlbdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttjnrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drptrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppfxtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjhblbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvpdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdnltjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pprlpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftfxrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhdft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfjrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tblnhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hffpfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htftnrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvdbhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbtlrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtprvhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdvdhxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrnvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxfnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fddxxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpnvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjnbhjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrtptb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxnrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdlrxjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnrbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tddnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdlxxtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxrbxdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpbpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njdfbpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlnlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxnvddb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtdjxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhntv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljrlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfpvvvv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2632 2724 BlackMoon.exe 30 PID 2724 wrote to memory of 2632 2724 BlackMoon.exe 30 PID 2724 wrote to memory of 2632 2724 BlackMoon.exe 30 PID 2724 wrote to memory of 2632 2724 BlackMoon.exe 30 PID 2632 wrote to memory of 2100 2632 xfdfh.exe 31 PID 2632 wrote to memory of 2100 2632 xfdfh.exe 31 PID 2632 wrote to memory of 2100 2632 xfdfh.exe 31 PID 2632 wrote to memory of 2100 2632 xfdfh.exe 31 PID 2100 wrote to memory of 2744 2100 vpxjh.exe 189 PID 2100 wrote to memory of 2744 2100 vpxjh.exe 189 PID 2100 wrote to memory of 2744 2100 vpxjh.exe 189 PID 2100 wrote to memory of 2744 2100 vpxjh.exe 189 PID 2744 wrote to memory of 2844 2744 tnbrf.exe 68 PID 2744 wrote to memory of 2844 2744 tnbrf.exe 68 PID 2744 wrote to memory of 2844 2744 tnbrf.exe 68 PID 2744 wrote to memory of 2844 2744 tnbrf.exe 68 PID 2844 wrote to memory of 2660 2844 xxbnd.exe 403 PID 2844 wrote to memory of 2660 2844 xxbnd.exe 403 PID 2844 wrote to memory of 2660 2844 xxbnd.exe 403 PID 2844 wrote to memory of 2660 2844 xxbnd.exe 403 PID 2660 wrote to memory of 2556 2660 rjbpb.exe 404 PID 2660 wrote to memory of 2556 2660 rjbpb.exe 404 PID 2660 wrote to memory of 2556 2660 rjbpb.exe 404 PID 2660 wrote to memory of 2556 2660 rjbpb.exe 404 PID 2556 wrote to memory of 2968 2556 lvdvnt.exe 36 PID 2556 wrote to memory of 2968 2556 lvdvnt.exe 36 PID 2556 wrote to memory of 2968 2556 lvdvnt.exe 36 PID 2556 wrote to memory of 2968 2556 lvdvnt.exe 36 PID 2968 wrote to memory of 2588 2968 pjvxh.exe 281 PID 2968 wrote to memory of 2588 2968 pjvxh.exe 281 PID 2968 wrote to memory of 2588 2968 pjvxh.exe 281 PID 2968 wrote to memory of 2588 2968 pjvxh.exe 281 PID 2588 wrote to memory of 1192 2588 thvdtfr.exe 534 PID 2588 wrote to memory of 1192 2588 thvdtfr.exe 534 PID 2588 wrote to memory of 1192 2588 thvdtfr.exe 534 PID 2588 wrote to memory of 1192 2588 thvdtfr.exe 534 PID 1192 wrote to memory of 1680 1192 dbjbjdt.exe 426 PID 1192 wrote to memory of 1680 1192 dbjbjdt.exe 426 PID 1192 wrote to memory of 1680 1192 dbjbjdt.exe 426 PID 1192 wrote to memory of 1680 1192 dbjbjdt.exe 426 PID 1680 wrote to memory of 608 1680 jbdpxvd.exe 77 PID 1680 wrote to memory of 608 1680 jbdpxvd.exe 77 PID 1680 wrote to memory of 608 1680 jbdpxvd.exe 77 PID 1680 wrote to memory of 608 1680 jbdpxvd.exe 77 PID 608 wrote to memory of 2032 608 bbnfjb.exe 41 PID 608 wrote to memory of 2032 608 bbnfjb.exe 41 PID 608 wrote to memory of 2032 608 bbnfjb.exe 41 PID 608 wrote to memory of 2032 608 bbnfjb.exe 41 PID 2032 wrote to memory of 2592 2032 rjbtlbx.exe 42 PID 2032 wrote to memory of 2592 2032 rjbtlbx.exe 42 PID 2032 wrote to memory of 2592 2032 rjbtlbx.exe 42 PID 2032 wrote to memory of 2592 2032 rjbtlbx.exe 42 PID 2592 wrote to memory of 2168 2592 rddjn.exe 372 PID 2592 wrote to memory of 2168 2592 rddjn.exe 372 PID 2592 wrote to memory of 2168 2592 rddjn.exe 372 PID 2592 wrote to memory of 2168 2592 rddjn.exe 372 PID 2168 wrote to memory of 668 2168 dvnhvlv.exe 469 PID 2168 wrote to memory of 668 2168 dvnhvlv.exe 469 PID 2168 wrote to memory of 668 2168 dvnhvlv.exe 469 PID 2168 wrote to memory of 668 2168 dvnhvlv.exe 469 PID 668 wrote to memory of 1860 668 pjhvp.exe 45 PID 668 wrote to memory of 1860 668 pjhvp.exe 45 PID 668 wrote to memory of 1860 668 pjhvp.exe 45 PID 668 wrote to memory of 1860 668 pjhvp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stealers\BlackMoon.exe"C:\Users\Admin\AppData\Local\Temp\Stealers\BlackMoon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\xfdfh.exec:\xfdfh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\vpxjh.exec:\vpxjh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\tnbrf.exec:\tnbrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\xxbnd.exec:\xxbnd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\rjbpb.exec:\rjbpb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\lvdvnt.exec:\lvdvnt.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\pjvxh.exec:\pjvxh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\thvdtfr.exec:\thvdtfr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\dbjbjdt.exec:\dbjbjdt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\jbdpxvd.exec:\jbdpxvd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\bbnfjb.exec:\bbnfjb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
\??\c:\rjbtlbx.exec:\rjbtlbx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\rddjn.exec:\rddjn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\dvnhvlv.exec:\dvnhvlv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\pjhvp.exec:\pjhvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\fdjjdrp.exec:\fdjjdrp.exe17⤵
- Executes dropped EXE
PID:1860 -
\??\c:\dvrnnjh.exec:\dvrnnjh.exe18⤵
- Executes dropped EXE
PID:2448 -
\??\c:\ltnndj.exec:\ltnndj.exe19⤵
- Executes dropped EXE
PID:2984 -
\??\c:\lbthrt.exec:\lbthrt.exe20⤵
- Executes dropped EXE
PID:2872 -
\??\c:\tvhnxhr.exec:\tvhnxhr.exe21⤵
- Executes dropped EXE
PID:2572 -
\??\c:\dhrlb.exec:\dhrlb.exe22⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vrddx.exec:\vrddx.exe23⤵
- Executes dropped EXE
PID:2400 -
\??\c:\hvphx.exec:\hvphx.exe24⤵
- Executes dropped EXE
PID:1476 -
\??\c:\jdbpp.exec:\jdbpp.exe25⤵
- Executes dropped EXE
PID:816 -
\??\c:\dpnll.exec:\dpnll.exe26⤵
- Executes dropped EXE
PID:1404 -
\??\c:\bdjlx.exec:\bdjlx.exe27⤵
- Executes dropped EXE
PID:1512 -
\??\c:\rfhvtrn.exec:\rfhvtrn.exe28⤵
- Executes dropped EXE
PID:1532 -
\??\c:\rhlvxn.exec:\rhlvxn.exe29⤵
- Executes dropped EXE
PID:1880 -
\??\c:\hxxppdd.exec:\hxxppdd.exe30⤵
- Executes dropped EXE
PID:2244 -
\??\c:\rhrdb.exec:\rhrdb.exe31⤵
- Executes dropped EXE
PID:1548 -
\??\c:\tvnjhp.exec:\tvnjhp.exe32⤵
- Executes dropped EXE
PID:880 -
\??\c:\pnpltb.exec:\pnpltb.exe33⤵
- Executes dropped EXE
PID:2232 -
\??\c:\xldnpbb.exec:\xldnpbb.exe34⤵
- Executes dropped EXE
PID:2648 -
\??\c:\vpxljb.exec:\vpxljb.exe35⤵
- Executes dropped EXE
PID:2632 -
\??\c:\bdfptfl.exec:\bdfptfl.exe36⤵
- Executes dropped EXE
PID:1920 -
\??\c:\drxdnrt.exec:\drxdnrt.exe37⤵
- Executes dropped EXE
PID:2652 -
\??\c:\vbtlrt.exec:\vbtlrt.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716 -
\??\c:\prpvhl.exec:\prpvhl.exe39⤵
- Executes dropped EXE
PID:2856 -
\??\c:\lhxpx.exec:\lhxpx.exe40⤵
- Executes dropped EXE
PID:2844 -
\??\c:\ljxll.exec:\ljxll.exe41⤵
- Executes dropped EXE
PID:2524 -
\??\c:\jbvvhh.exec:\jbvvhh.exe42⤵
- Executes dropped EXE
PID:2304 -
\??\c:\xxhjj.exec:\xxhjj.exe43⤵
- Executes dropped EXE
PID:2536 -
\??\c:\jhhpbp.exec:\jhhpbp.exe44⤵
- Executes dropped EXE
PID:2468 -
\??\c:\prldf.exec:\prldf.exe45⤵
- Executes dropped EXE
PID:656 -
\??\c:\dbtjtb.exec:\dbtjtb.exe46⤵
- Executes dropped EXE
PID:2188 -
\??\c:\bxlnfbd.exec:\bxlnfbd.exe47⤵
- Executes dropped EXE
PID:2212 -
\??\c:\vddfxl.exec:\vddfxl.exe48⤵
- Executes dropped EXE
PID:2904 -
\??\c:\fldttpv.exec:\fldttpv.exe49⤵
- Executes dropped EXE
PID:608 -
\??\c:\rtrdh.exec:\rtrdh.exe50⤵
- Executes dropped EXE
PID:2392 -
\??\c:\rbxtf.exec:\rbxtf.exe51⤵
- Executes dropped EXE
PID:1924 -
\??\c:\jjhdnj.exec:\jjhdnj.exe52⤵
- Executes dropped EXE
PID:2028 -
\??\c:\rbjhp.exec:\rbjhp.exe53⤵
- Executes dropped EXE
PID:1984 -
\??\c:\tvdnljb.exec:\tvdnljb.exe54⤵
- Executes dropped EXE
PID:1748 -
\??\c:\jtjldv.exec:\jtjldv.exe55⤵
- Executes dropped EXE
PID:2080 -
\??\c:\hpbhp.exec:\hpbhp.exe56⤵
- Executes dropped EXE
PID:2948 -
\??\c:\fljtlj.exec:\fljtlj.exe57⤵
- Executes dropped EXE
PID:2412 -
\??\c:\xbbnph.exec:\xbbnph.exe58⤵
- Executes dropped EXE
PID:1980 -
\??\c:\fflbf.exec:\fflbf.exe59⤵
- Executes dropped EXE
PID:944 -
\??\c:\bfbnxv.exec:\bfbnxv.exe60⤵
- Executes dropped EXE
PID:968 -
\??\c:\hfjvxjn.exec:\hfjvxjn.exe61⤵
- Executes dropped EXE
PID:1468 -
\??\c:\vtlbjjl.exec:\vtlbjjl.exe62⤵
- Executes dropped EXE
PID:1592 -
\??\c:\xddhbxt.exec:\xddhbxt.exe63⤵
- Executes dropped EXE
PID:1408 -
\??\c:\ntrvxd.exec:\ntrvxd.exe64⤵
- Executes dropped EXE
PID:1516 -
\??\c:\rrrxdvh.exec:\rrrxdvh.exe65⤵
- Executes dropped EXE
PID:1908 -
\??\c:\pjhrn.exec:\pjhrn.exe66⤵PID:756
-
\??\c:\dhhhl.exec:\dhhhl.exe67⤵PID:2164
-
\??\c:\nxxbrtt.exec:\nxxbrtt.exe68⤵PID:1912
-
\??\c:\htlpdv.exec:\htlpdv.exe69⤵PID:2084
-
\??\c:\drvhhv.exec:\drvhhv.exe70⤵PID:2364
-
\??\c:\hhnrpd.exec:\hhnrpd.exe71⤵PID:1656
-
\??\c:\ffnfb.exec:\ffnfb.exe72⤵PID:2284
-
\??\c:\pjtbn.exec:\pjtbn.exe73⤵PID:2712
-
\??\c:\lllln.exec:\lllln.exe74⤵PID:3048
-
\??\c:\fxtftr.exec:\fxtftr.exe75⤵PID:1676
-
\??\c:\tjjlh.exec:\tjjlh.exe76⤵PID:1560
-
\??\c:\hhxpndv.exec:\hhxpndv.exe77⤵PID:1920
-
\??\c:\lftjpr.exec:\lftjpr.exe78⤵PID:2768
-
\??\c:\vdhvlj.exec:\vdhvlj.exe79⤵PID:2732
-
\??\c:\fjbtv.exec:\fjbtv.exe80⤵PID:2540
-
\??\c:\pntjdfh.exec:\pntjdfh.exe81⤵PID:2488
-
\??\c:\rhpblb.exec:\rhpblb.exe82⤵PID:2660
-
\??\c:\jlnfft.exec:\jlnfft.exe83⤵PID:2524
-
\??\c:\jrbrd.exec:\jrbrd.exe84⤵
- System Location Discovery: System Language Discovery
PID:2956 -
\??\c:\hjvrrj.exec:\hjvrrj.exe85⤵PID:2332
-
\??\c:\rtnxhr.exec:\rtnxhr.exe86⤵PID:2764
-
\??\c:\tjbtbtx.exec:\tjbtbtx.exe87⤵PID:2752
-
\??\c:\bpjfptj.exec:\bpjfptj.exe88⤵PID:1032
-
\??\c:\nbprjxp.exec:\nbprjxp.exe89⤵PID:1496
-
\??\c:\tfxlrb.exec:\tfxlrb.exe90⤵PID:2804
-
\??\c:\ltxppt.exec:\ltxppt.exe91⤵PID:2148
-
\??\c:\hbtfxh.exec:\hbtfxh.exe92⤵PID:1036
-
\??\c:\lbbfpbr.exec:\lbbfpbr.exe93⤵PID:2344
-
\??\c:\ndphn.exec:\ndphn.exe94⤵PID:2144
-
\??\c:\pjxjvn.exec:\pjxjvn.exe95⤵PID:2896
-
\??\c:\bpndxf.exec:\bpndxf.exe96⤵
- System Location Discovery: System Language Discovery
PID:264 -
\??\c:\dntpl.exec:\dntpl.exe97⤵PID:2248
-
\??\c:\txbbbdr.exec:\txbbbdr.exe98⤵PID:2988
-
\??\c:\lrbrnth.exec:\lrbrnth.exe99⤵PID:2776
-
\??\c:\jvjnjh.exec:\jvjnjh.exe100⤵PID:520
-
\??\c:\txttf.exec:\txttf.exe101⤵PID:2928
-
\??\c:\prptrd.exec:\prptrd.exe102⤵PID:2268
-
\??\c:\ftfxrv.exec:\ftfxrv.exe103⤵
- System Location Discovery: System Language Discovery
PID:2400 -
\??\c:\bftflx.exec:\bftflx.exe104⤵PID:2068
-
\??\c:\rftjr.exec:\rftjr.exe105⤵PID:1432
-
\??\c:\jljxvb.exec:\jljxvb.exe106⤵PID:1312
-
\??\c:\ntvhth.exec:\ntvhth.exe107⤵PID:1404
-
\??\c:\tljjn.exec:\tljjn.exe108⤵PID:1612
-
\??\c:\nxjpvth.exec:\nxjpvth.exe109⤵PID:756
-
\??\c:\bddlx.exec:\bddlx.exe110⤵PID:380
-
\??\c:\bfrhnx.exec:\bfrhnx.exe111⤵PID:360
-
\??\c:\llbpl.exec:\llbpl.exe112⤵PID:1752
-
\??\c:\vxrhvhh.exec:\vxrhvhh.exe113⤵PID:1620
-
\??\c:\vjhdtb.exec:\vjhdtb.exe114⤵PID:864
-
\??\c:\dlhhnx.exec:\dlhhnx.exe115⤵PID:3040
-
\??\c:\pdlvx.exec:\pdlvx.exe116⤵PID:1580
-
\??\c:\lrnfh.exec:\lrnfh.exe117⤵PID:2096
-
\??\c:\plffth.exec:\plffth.exe118⤵PID:2880
-
\??\c:\fdhdx.exec:\fdhdx.exe119⤵PID:2528
-
\??\c:\jfllb.exec:\jfllb.exe120⤵PID:2520
-
\??\c:\fdlpp.exec:\fdlpp.exe121⤵PID:2300
-
\??\c:\rrbpdv.exec:\rrbpdv.exe122⤵PID:2496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-