Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 12:02
Behavioral task
behavioral1
Sample
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe
-
Size
3.7MB
-
MD5
a539ca67aff364eb0738de8bbaeaebb0
-
SHA1
3cc0c2947e262bede4b75efbdf38e6e2987c5356
-
SHA256
a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4
-
SHA512
1f4e0d506e8248b3982c86dcb57687613de1375b781b0a456fb2b51bf3a1755d2340b13b89bc6c9f1012e35cc2b1fd4d253c6d616d844b4eda495506bc4b04ea
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98P:U6XLq/qPPslzKx/dJg1ErmN8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 55 IoCs
resource yara_rule behavioral1/memory/3052-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2012-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2500-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2880-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2888-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2620-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2776-64-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2616-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1648-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1676-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2956-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2956-109-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2356-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1492-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2872-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1264-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1424-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3020-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2264-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1644-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1044-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1372-230-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1452-228-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1372-234-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1060-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1580-300-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2980-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2840-326-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2828-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-366-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/528-411-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2792-445-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2492-464-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2156-513-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2488-526-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2488-531-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1956-563-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/884-593-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2636-631-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/700-796-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/700-803-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3000-847-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2776-935-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/628-985-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/628-984-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1252-1006-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1756-1017-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/2096-1045-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/824-1112-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2728-1189-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2996-1211-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2644-1218-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2624-1249-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2492-1324-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1020-1333-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2012 rhhnfx.exe 2500 vtnxpl.exe 2880 dttltp.exe 2620 lxtjn.exe 2888 hlvnhhl.exe 2776 jxlbnbh.exe 2616 bxxdrbb.exe 1852 nxnnl.exe 1648 nnjnfjl.exe 1676 fhpnnjx.exe 2956 fptrdn.exe 2356 prpbxdx.exe 1492 bjrrdr.exe 2944 jvrjl.exe 2872 xtpvbbn.exe 1264 llbnbrf.exe 1424 vxlhx.exe 3020 ntpnbhl.exe 2264 jbbtlj.exe 1288 rtvfhjt.exe 1644 nbjtpd.exe 956 prdth.exe 1044 dnlnhph.exe 1452 nprjll.exe 1372 hldxj.exe 948 tpnjr.exe 1060 vfxdbjp.exe 1456 lxrbjf.exe 1932 lhvrptj.exe 2512 bftrdpl.exe 2260 lrjptxf.exe 2276 lvbpdpl.exe 1580 lfdlttp.exe 2980 htrrph.exe 2420 rhlnlvb.exe 2840 fxjxp.exe 2828 tdnxx.exe 2884 pttlxnf.exe 2972 jxtlfhb.exe 2404 fljtjhv.exe 2888 jnjln.exe 2612 fnhfb.exe 2780 dvlpttn.exe 1324 jjnhhv.exe 2052 rrrvp.exe 1476 jljlxhd.exe 2368 ltlftxj.exe 2032 jbfthj.exe 1752 nhnpfnv.exe 528 tplvp.exe 1912 lvfnf.exe 2944 lpbrf.exe 1116 hxjhf.exe 584 fldnhjp.exe 2792 ntntd.exe 3016 jllrvh.exe 2492 pxxrflf.exe 2236 ndlbvhp.exe 2432 vplpfl.exe 1168 ltvfnv.exe 1380 fblfbj.exe 1032 bthld.exe 880 lbhnlhl.exe 700 rdbnpr.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000d0000000133b8-5.dat upx behavioral1/memory/3052-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2012-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016d0c-19.dat upx behavioral1/files/0x0009000000016ce0-27.dat upx behavioral1/memory/2880-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2500-26-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d2c-37.dat upx behavioral1/memory/2880-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2888-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d3f-47.dat upx behavioral1/memory/2620-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000016d52-57.dat upx behavioral1/memory/2776-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2776-64-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d5c-66.dat upx behavioral1/memory/2616-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016d64-74.dat upx behavioral1/memory/1648-85-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0002000000018334-83.dat upx behavioral1/files/0x00050000000195a9-92.dat upx behavioral1/memory/1676-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2956-102-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195ab-100.dat upx behavioral1/files/0x00050000000195ad-112.dat upx behavioral1/memory/2356-111-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2356-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195af-118.dat upx behavioral1/memory/1676-129-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195b1-128.dat upx behavioral1/memory/1492-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195b3-137.dat upx behavioral1/files/0x00050000000195b5-146.dat upx behavioral1/memory/2872-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1264-154-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195b7-155.dat upx behavioral1/files/0x00050000000195bb-164.dat upx behavioral1/memory/1424-163-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3020-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2264-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195bd-173.dat upx behavioral1/memory/2264-182-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195c1-184.dat upx behavioral1/files/0x00050000000195c3-192.dat upx behavioral1/files/0x00050000000195c5-202.dat upx behavioral1/memory/1644-200-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195c6-211.dat upx behavioral1/memory/1044-218-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000195c7-219.dat upx behavioral1/memory/1372-230-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1452-228-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001960c-227.dat upx behavioral1/files/0x0005000000019643-238.dat upx behavioral1/files/0x000500000001975a-248.dat upx behavioral1/memory/1060-249-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019761-258.dat upx behavioral1/files/0x00050000000197fd-266.dat upx behavioral1/files/0x0005000000019820-274.dat upx behavioral1/files/0x000500000001998d-284.dat upx behavioral1/files/0x0005000000019bf5-292.dat upx behavioral1/memory/1580-300-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2980-313-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2840-326-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvdbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddfrdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xthjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfdlttp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vndjhdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvvffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvxfnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfhjpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbdtdfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxllljf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvvlrhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djxnbxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrjdhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhdbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldflxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbfjdnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpltp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlvnhhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djnfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jftvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfrdlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlpplf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpblvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftdnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdfvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pldhfpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prdth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fppdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbhfdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phddh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfnljhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnpfxbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpdjpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htxdxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlhjdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxtlhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjfdhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rddftx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhhxnnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvxxxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tplvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txvplbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjpxhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjhpjhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhtljh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltvhpxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdnln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnhfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfrhhnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxtjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxlbnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrjptxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlvfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxlhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfhpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfpjtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxjxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdnxx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2012 3052 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 3052 wrote to memory of 2012 3052 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 3052 wrote to memory of 2012 3052 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 3052 wrote to memory of 2012 3052 a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe 30 PID 2012 wrote to memory of 2500 2012 rhhnfx.exe 31 PID 2012 wrote to memory of 2500 2012 rhhnfx.exe 31 PID 2012 wrote to memory of 2500 2012 rhhnfx.exe 31 PID 2012 wrote to memory of 2500 2012 rhhnfx.exe 31 PID 2500 wrote to memory of 2880 2500 vtnxpl.exe 32 PID 2500 wrote to memory of 2880 2500 vtnxpl.exe 32 PID 2500 wrote to memory of 2880 2500 vtnxpl.exe 32 PID 2500 wrote to memory of 2880 2500 vtnxpl.exe 32 PID 2880 wrote to memory of 2620 2880 dttltp.exe 33 PID 2880 wrote to memory of 2620 2880 dttltp.exe 33 PID 2880 wrote to memory of 2620 2880 dttltp.exe 33 PID 2880 wrote to memory of 2620 2880 dttltp.exe 33 PID 2620 wrote to memory of 2888 2620 lxtjn.exe 34 PID 2620 wrote to memory of 2888 2620 lxtjn.exe 34 PID 2620 wrote to memory of 2888 2620 lxtjn.exe 34 PID 2620 wrote to memory of 2888 2620 lxtjn.exe 34 PID 2888 wrote to memory of 2776 2888 hlvnhhl.exe 35 PID 2888 wrote to memory of 2776 2888 hlvnhhl.exe 35 PID 2888 wrote to memory of 2776 2888 hlvnhhl.exe 35 PID 2888 wrote to memory of 2776 2888 hlvnhhl.exe 35 PID 2776 wrote to memory of 2616 2776 jxlbnbh.exe 36 PID 2776 wrote to memory of 2616 2776 jxlbnbh.exe 36 PID 2776 wrote to memory of 2616 2776 jxlbnbh.exe 36 PID 2776 wrote to memory of 2616 2776 jxlbnbh.exe 36 PID 2616 wrote to memory of 1852 2616 bxxdrbb.exe 37 PID 2616 wrote to memory of 1852 2616 bxxdrbb.exe 37 PID 2616 wrote to memory of 1852 2616 bxxdrbb.exe 37 PID 2616 wrote to memory of 1852 2616 bxxdrbb.exe 37 PID 1852 wrote to memory of 1648 1852 nxnnl.exe 38 PID 1852 wrote to memory of 1648 1852 nxnnl.exe 38 PID 1852 wrote to memory of 1648 1852 nxnnl.exe 38 PID 1852 wrote to memory of 1648 1852 nxnnl.exe 38 PID 1648 wrote to memory of 1676 1648 nnjnfjl.exe 39 PID 1648 wrote to memory of 1676 1648 nnjnfjl.exe 39 PID 1648 wrote to memory of 1676 1648 nnjnfjl.exe 39 PID 1648 wrote to memory of 1676 1648 nnjnfjl.exe 39 PID 1676 wrote to memory of 2956 1676 fhpnnjx.exe 40 PID 1676 wrote to memory of 2956 1676 fhpnnjx.exe 40 PID 1676 wrote to memory of 2956 1676 fhpnnjx.exe 40 PID 1676 wrote to memory of 2956 1676 fhpnnjx.exe 40 PID 2956 wrote to memory of 2356 2956 fptrdn.exe 41 PID 2956 wrote to memory of 2356 2956 fptrdn.exe 41 PID 2956 wrote to memory of 2356 2956 fptrdn.exe 41 PID 2956 wrote to memory of 2356 2956 fptrdn.exe 41 PID 2356 wrote to memory of 1492 2356 prpbxdx.exe 42 PID 2356 wrote to memory of 1492 2356 prpbxdx.exe 42 PID 2356 wrote to memory of 1492 2356 prpbxdx.exe 42 PID 2356 wrote to memory of 1492 2356 prpbxdx.exe 42 PID 1492 wrote to memory of 2944 1492 bjrrdr.exe 43 PID 1492 wrote to memory of 2944 1492 bjrrdr.exe 43 PID 1492 wrote to memory of 2944 1492 bjrrdr.exe 43 PID 1492 wrote to memory of 2944 1492 bjrrdr.exe 43 PID 2944 wrote to memory of 2872 2944 jvrjl.exe 44 PID 2944 wrote to memory of 2872 2944 jvrjl.exe 44 PID 2944 wrote to memory of 2872 2944 jvrjl.exe 44 PID 2944 wrote to memory of 2872 2944 jvrjl.exe 44 PID 2872 wrote to memory of 1264 2872 xtpvbbn.exe 45 PID 2872 wrote to memory of 1264 2872 xtpvbbn.exe 45 PID 2872 wrote to memory of 1264 2872 xtpvbbn.exe 45 PID 2872 wrote to memory of 1264 2872 xtpvbbn.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"C:\Users\Admin\AppData\Local\Temp\a5ccd815a13f4512967924c59d545ae9c0eac546dc18197d9639bb119d85efe4N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\rhhnfx.exec:\rhhnfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\vtnxpl.exec:\vtnxpl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\dttltp.exec:\dttltp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\lxtjn.exec:\lxtjn.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\hlvnhhl.exec:\hlvnhhl.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\jxlbnbh.exec:\jxlbnbh.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\bxxdrbb.exec:\bxxdrbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\nxnnl.exec:\nxnnl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\nnjnfjl.exec:\nnjnfjl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\fhpnnjx.exec:\fhpnnjx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\fptrdn.exec:\fptrdn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\prpbxdx.exec:\prpbxdx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\bjrrdr.exec:\bjrrdr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
\??\c:\jvrjl.exec:\jvrjl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\xtpvbbn.exec:\xtpvbbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\llbnbrf.exec:\llbnbrf.exe17⤵
- Executes dropped EXE
PID:1264 -
\??\c:\vxlhx.exec:\vxlhx.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1424 -
\??\c:\ntpnbhl.exec:\ntpnbhl.exe19⤵
- Executes dropped EXE
PID:3020 -
\??\c:\jbbtlj.exec:\jbbtlj.exe20⤵
- Executes dropped EXE
PID:2264 -
\??\c:\rtvfhjt.exec:\rtvfhjt.exe21⤵
- Executes dropped EXE
PID:1288 -
\??\c:\nbjtpd.exec:\nbjtpd.exe22⤵
- Executes dropped EXE
PID:1644 -
\??\c:\prdth.exec:\prdth.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:956 -
\??\c:\dnlnhph.exec:\dnlnhph.exe24⤵
- Executes dropped EXE
PID:1044 -
\??\c:\nprjll.exec:\nprjll.exe25⤵
- Executes dropped EXE
PID:1452 -
\??\c:\hldxj.exec:\hldxj.exe26⤵
- Executes dropped EXE
PID:1372 -
\??\c:\tpnjr.exec:\tpnjr.exe27⤵
- Executes dropped EXE
PID:948 -
\??\c:\vfxdbjp.exec:\vfxdbjp.exe28⤵
- Executes dropped EXE
PID:1060 -
\??\c:\lxrbjf.exec:\lxrbjf.exe29⤵
- Executes dropped EXE
PID:1456 -
\??\c:\lhvrptj.exec:\lhvrptj.exe30⤵
- Executes dropped EXE
PID:1932 -
\??\c:\bftrdpl.exec:\bftrdpl.exe31⤵
- Executes dropped EXE
PID:2512 -
\??\c:\lrjptxf.exec:\lrjptxf.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\lvbpdpl.exec:\lvbpdpl.exe33⤵
- Executes dropped EXE
PID:2276 -
\??\c:\lfdlttp.exec:\lfdlttp.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580 -
\??\c:\htrrph.exec:\htrrph.exe35⤵
- Executes dropped EXE
PID:2980 -
\??\c:\rhlnlvb.exec:\rhlnlvb.exe36⤵
- Executes dropped EXE
PID:2420 -
\??\c:\fxjxp.exec:\fxjxp.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
\??\c:\tdnxx.exec:\tdnxx.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828 -
\??\c:\pttlxnf.exec:\pttlxnf.exe39⤵
- Executes dropped EXE
PID:2884 -
\??\c:\jxtlfhb.exec:\jxtlfhb.exe40⤵
- Executes dropped EXE
PID:2972 -
\??\c:\fljtjhv.exec:\fljtjhv.exe41⤵
- Executes dropped EXE
PID:2404 -
\??\c:\jnjln.exec:\jnjln.exe42⤵
- Executes dropped EXE
PID:2888 -
\??\c:\fnhfb.exec:\fnhfb.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612 -
\??\c:\dvlpttn.exec:\dvlpttn.exe44⤵
- Executes dropped EXE
PID:2780 -
\??\c:\jjnhhv.exec:\jjnhhv.exe45⤵
- Executes dropped EXE
PID:1324 -
\??\c:\rrrvp.exec:\rrrvp.exe46⤵
- Executes dropped EXE
PID:2052 -
\??\c:\jljlxhd.exec:\jljlxhd.exe47⤵
- Executes dropped EXE
PID:1476 -
\??\c:\ltlftxj.exec:\ltlftxj.exe48⤵
- Executes dropped EXE
PID:2368 -
\??\c:\jbfthj.exec:\jbfthj.exe49⤵
- Executes dropped EXE
PID:2032 -
\??\c:\nhnpfnv.exec:\nhnpfnv.exe50⤵
- Executes dropped EXE
PID:1752 -
\??\c:\tplvp.exec:\tplvp.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:528 -
\??\c:\lvfnf.exec:\lvfnf.exe52⤵
- Executes dropped EXE
PID:1912 -
\??\c:\lpbrf.exec:\lpbrf.exe53⤵
- Executes dropped EXE
PID:2944 -
\??\c:\hxjhf.exec:\hxjhf.exe54⤵
- Executes dropped EXE
PID:1116 -
\??\c:\fldnhjp.exec:\fldnhjp.exe55⤵
- Executes dropped EXE
PID:584 -
\??\c:\ntntd.exec:\ntntd.exe56⤵
- Executes dropped EXE
PID:2792 -
\??\c:\jllrvh.exec:\jllrvh.exe57⤵
- Executes dropped EXE
PID:3016 -
\??\c:\pxxrflf.exec:\pxxrflf.exe58⤵
- Executes dropped EXE
PID:2492 -
\??\c:\ndlbvhp.exec:\ndlbvhp.exe59⤵
- Executes dropped EXE
PID:2236 -
\??\c:\vplpfl.exec:\vplpfl.exe60⤵
- Executes dropped EXE
PID:2432 -
\??\c:\ltvfnv.exec:\ltvfnv.exe61⤵
- Executes dropped EXE
PID:1168 -
\??\c:\fblfbj.exec:\fblfbj.exe62⤵
- Executes dropped EXE
PID:1380 -
\??\c:\bthld.exec:\bthld.exe63⤵
- Executes dropped EXE
PID:1032 -
\??\c:\lbhnlhl.exec:\lbhnlhl.exe64⤵
- Executes dropped EXE
PID:880 -
\??\c:\rdbnpr.exec:\rdbnpr.exe65⤵
- Executes dropped EXE
PID:700 -
\??\c:\vvlnp.exec:\vvlnp.exe66⤵PID:2156
-
\??\c:\xlhjdn.exec:\xlhjdn.exe67⤵
- System Location Discovery: System Language Discovery
PID:1768 -
\??\c:\llphnxx.exec:\llphnxx.exe68⤵PID:2488
-
\??\c:\pphfpbx.exec:\pphfpbx.exe69⤵PID:948
-
\??\c:\nrdtpj.exec:\nrdtpj.exe70⤵PID:2056
-
\??\c:\bvvvvlh.exec:\bvvvvlh.exe71⤵PID:1528
-
\??\c:\tbdtpxh.exec:\tbdtpxh.exe72⤵PID:2044
-
\??\c:\xblbr.exec:\xblbr.exe73⤵PID:1956
-
\??\c:\tjddtr.exec:\tjddtr.exe74⤵PID:2320
-
\??\c:\xbttnlh.exec:\xbttnlh.exe75⤵PID:2092
-
\??\c:\vnjrlxl.exec:\vnjrlxl.exe76⤵PID:892
-
\??\c:\lxvdvbn.exec:\lxvdvbn.exe77⤵PID:884
-
\??\c:\jxtlhd.exec:\jxtlhd.exe78⤵
- System Location Discovery: System Language Discovery
PID:3052 -
\??\c:\nrdlpdt.exec:\nrdlpdt.exe79⤵PID:3056
-
\??\c:\rnrph.exec:\rnrph.exe80⤵PID:2832
-
\??\c:\nflnpjr.exec:\nflnpjr.exe81⤵PID:2740
-
\??\c:\vlvtt.exec:\vlvtt.exe82⤵PID:1668
-
\??\c:\jpxfxhb.exec:\jpxfxhb.exe83⤵PID:2896
-
\??\c:\vjtvxj.exec:\vjtvxj.exe84⤵PID:2636
-
\??\c:\vvnlh.exec:\vvnlh.exe85⤵PID:2860
-
\??\c:\frpdxvb.exec:\frpdxvb.exe86⤵PID:2808
-
\??\c:\jfndnvr.exec:\jfndnvr.exe87⤵PID:2656
-
\??\c:\lpxvj.exec:\lpxvj.exe88⤵PID:2664
-
\??\c:\dhjnxhp.exec:\dhjnxhp.exe89⤵PID:1704
-
\??\c:\ntrllfj.exec:\ntrllfj.exe90⤵PID:2480
-
\??\c:\pjpvx.exec:\pjpvx.exe91⤵PID:2352
-
\??\c:\lrthl.exec:\lrthl.exe92⤵PID:2080
-
\??\c:\lltpdhl.exec:\lltpdhl.exe93⤵PID:2956
-
\??\c:\rbdvpnb.exec:\rbdvpnb.exe94⤵PID:2032
-
\??\c:\brntvbn.exec:\brntvbn.exe95⤵PID:2936
-
\??\c:\dhdhhj.exec:\dhdhhj.exe96⤵PID:1160
-
\??\c:\lxltb.exec:\lxltb.exe97⤵PID:236
-
\??\c:\hjfpp.exec:\hjfpp.exe98⤵PID:1252
-
\??\c:\ndnljn.exec:\ndnljn.exe99⤵PID:2336
-
\??\c:\rnpxljr.exec:\rnpxljr.exe100⤵PID:2424
-
\??\c:\thtrtd.exec:\thtrtd.exe101⤵PID:1424
-
\??\c:\trxndb.exec:\trxndb.exe102⤵PID:3004
-
\??\c:\pdxjnv.exec:\pdxjnv.exe103⤵PID:2248
-
\??\c:\fvtjx.exec:\fvtjx.exe104⤵PID:672
-
\??\c:\ttxlft.exec:\ttxlft.exe105⤵PID:2196
-
\??\c:\vfbjd.exec:\vfbjd.exe106⤵PID:860
-
\??\c:\hrlpltb.exec:\hrlpltb.exe107⤵PID:1864
-
\??\c:\xjdxh.exec:\xjdxh.exe108⤵PID:1980
-
\??\c:\hhllthj.exec:\hhllthj.exe109⤵PID:1032
-
\??\c:\jjxdx.exec:\jjxdx.exe110⤵PID:880
-
\??\c:\jdbfx.exec:\jdbfx.exe111⤵PID:700
-
\??\c:\rhxphvd.exec:\rhxphvd.exe112⤵PID:2460
-
\??\c:\nnbndt.exec:\nnbndt.exe113⤵PID:1768
-
\??\c:\dfbjd.exec:\dfbjd.exe114⤵PID:332
-
\??\c:\rfthrjl.exec:\rfthrjl.exe115⤵PID:3000
-
\??\c:\xxdjddx.exec:\xxdjddx.exe116⤵PID:1716
-
\??\c:\djnfp.exec:\djnfp.exe117⤵
- System Location Discovery: System Language Discovery
PID:1548 -
\??\c:\tfphl.exec:\tfphl.exe118⤵PID:2104
-
\??\c:\dhtljh.exec:\dhtljh.exe119⤵
- System Location Discovery: System Language Discovery
PID:1488 -
\??\c:\txvplbn.exec:\txvplbn.exe120⤵
- System Location Discovery: System Language Discovery
PID:696 -
\??\c:\fpvxv.exec:\fpvxv.exe121⤵PID:2528
-
\??\c:\jdhbr.exec:\jdhbr.exe122⤵PID:2564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-