Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 16:32
Behavioral task
behavioral1
Sample
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
Resource
win7-20241010-en
General
-
Target
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
-
Size
3.8MB
-
MD5
d0501ac2c9d1e495e9c67666f8aaee40
-
SHA1
3cd59eb00c8473018bd68be0d685c7e6a5639a06
-
SHA256
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712
-
SHA512
8e23012928fb3d4e959a3d5e73fa17e20a37d3c56bc2c3dbe90ce1ff51a9070de1aa32812303d9752b4bc665f451e962f94299498bcddf3566aad11259c2f114
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98g:U6XLq/qPPslzKx/dJg1ErmNn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 45 IoCs
Processes:
resource yara_rule behavioral1/memory/2948-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2880-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2944-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3064-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2712-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2708-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2708-51-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3064-60-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1324-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/952-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/600-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/600-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2704-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2200-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/568-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/568-160-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/944-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2580-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2420-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/856-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2620-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1820-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1820-239-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1912-255-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1672-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1996-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2212-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2212-303-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2692-326-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2716-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2536-390-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2196-409-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2192-411-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2768-418-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1256-430-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2960-438-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2960-445-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2028-475-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2036-528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2036-550-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1028-579-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2352-682-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3056-710-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1944-750-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2332-827-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
nhdjf.exejpnjpd.exetnpndhp.exedttjdlr.exehdpvxr.exebrnljj.exeppplrj.exevfbdjx.exelbpdfdj.exerldljf.exepfdrl.exejlpppbf.exevbvptd.exexxvxlpj.exebnrhtfp.exebltfh.exernxldlb.exevxbrdj.exedhfvrdv.exenndxx.exexnljh.exeddtvl.exexpvfpv.exevhjjhbn.exelxdxrp.exefpvxfjj.exebjdnplt.exexhfvn.exexnpfb.exexhnpnx.exeftphrfd.exevdndpxb.exehbpbvf.exejvtxdbh.exejnnnx.exeprvrtr.exennlfhtn.exerrhxrf.exendxtdr.exexjtbtn.exepbrfpb.exerlhlfl.exebxlfvx.exerbhplrl.exernddt.exexfhjn.exedhtnvth.exepbrtx.exelrllhr.exepfnpjt.exehnpjff.exevjndj.exehnrbb.exefrvthnf.exephttxpx.exehxlxvr.exevnxlphd.exexbhphll.exetvhlvf.exetpjxt.exedhnlh.exexlhfn.exefjjtjhl.exedfbdxr.exepid process 2948 nhdjf.exe 2944 jpnjpd.exe 3064 tnpndhp.exe 2712 dttjdlr.exe 2708 hdpvxr.exe 2532 brnljj.exe 396 ppplrj.exe 1324 vfbdjx.exe 952 lbpdfdj.exe 600 rldljf.exe 2196 pfdrl.exe 2704 jlpppbf.exe 2200 vbvptd.exe 2960 xxvxlpj.exe 2252 bnrhtfp.exe 568 bltfh.exe 944 rnxldlb.exe 2376 vxbrdj.exe 2580 dhfvrdv.exe 2420 nndxx.exe 1868 xnljh.exe 856 ddtvl.exe 2620 xpvfpv.exe 1820 vhjjhbn.exe 2332 lxdxrp.exe 1912 fpvxfjj.exe 1672 bjdnplt.exe 1764 xhfvn.exe 1996 xnpfb.exe 1496 xhnpnx.exe 2212 ftphrfd.exe 1608 vdndpxb.exe 2088 hbpbvf.exe 1484 jvtxdbh.exe 2692 jnnnx.exe 2864 prvrtr.exe 2840 nnlfhtn.exe 2788 rrhxrf.exe 2716 ndxtdr.exe 984 xjtbtn.exe 436 pbrfpb.exe 1952 rlhlfl.exe 2536 bxlfvx.exe 952 rbhplrl.exe 1716 rnddt.exe 2196 xfhjn.exe 2192 dhtnvth.exe 2768 pbrtx.exe 1256 lrllhr.exe 1940 pfnpjt.exe 2960 hnpjff.exe 548 vjndj.exe 1508 hnrbb.exe 1148 frvthnf.exe 2548 phttxpx.exe 2028 hxlxvr.exe 2576 vnxlphd.exe 1652 xbhphll.exe 2628 tvhlvf.exe 888 tpjxt.exe 564 dhnlh.exe 1960 xlhfn.exe 2432 fjjtjhl.exe 2204 dfbdxr.exe -
Processes:
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhdjf.exe upx behavioral1/memory/2948-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2880-9-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jpnjpd.exe upx behavioral1/memory/2944-26-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3064-29-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tnpndhp.exe upx C:\dttjdlr.exe upx behavioral1/memory/2712-45-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hdpvxr.exe upx behavioral1/memory/2708-48-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\brnljj.exe upx C:\ppplrj.exe upx behavioral1/memory/1324-75-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vfbdjx.exe upx C:\lbpdfdj.exe upx behavioral1/memory/1324-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/952-93-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rldljf.exe upx behavioral1/memory/600-96-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/600-106-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pfdrl.exe upx C:\jlpppbf.exe upx C:\vbvptd.exe upx behavioral1/memory/2704-125-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxvxlpj.exe upx behavioral1/memory/2200-133-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnrhtfp.exe upx C:\bltfh.exe upx behavioral1/memory/568-163-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rnxldlb.exe upx behavioral1/memory/944-167-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\vxbrdj.exe upx behavioral1/memory/944-172-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dhfvrdv.exe upx C:\nndxx.exe upx behavioral1/memory/2580-191-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xnljh.exe upx behavioral1/memory/2420-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/856-212-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ddtvl.exe upx behavioral1/memory/856-220-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xpvfpv.exe upx behavioral1/memory/2620-223-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vhjjhbn.exe upx behavioral1/memory/1820-232-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxdxrp.exe upx behavioral1/memory/1820-239-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fpvxfjj.exe upx C:\bjdnplt.exe upx behavioral1/memory/1672-259-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1764-267-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xhfvn.exe upx C:\xnpfb.exe upx behavioral1/memory/1996-284-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xhnpnx.exe upx \??\c:\ftphrfd.exe upx behavioral1/memory/2212-296-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vdndpxb.exe upx behavioral1/memory/2692-326-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2716-352-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/984-359-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2716-361-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fhvrxjx.exextdvrf.exexbltj.exeppdbtbl.exelxdhd.exepthxb.exebxlfvx.exevpddtnn.exepbpdp.exeljhtbh.exetnvrvn.exeblpjht.exelvjxp.exefvffb.exepnlxbp.exeljfxxfj.exerbdnjrh.exethpvxb.exevfbdjx.exefppjvf.exebxltl.exepnnhbfd.exendrxp.exedxlfxl.exedbjntf.exelhlhth.exehhhtrr.exehjtvt.exeljtttl.exejlftxt.exejpvpr.exenvvhbtx.exerdrbpp.exenflpftv.exetlffrnf.exenjldnf.exetvrhnnh.exexpvfpv.exelbvtxp.exebltjjn.exejhjhpj.exetdxrl.exebpvdf.exebxxjdlt.exenpxvhf.exetvxrp.exedxdbtn.exetvpxnp.exexljbfd.exeplprjrn.exexjfpnd.exeppllfh.exejrjfjx.exextnrvxh.exedpjbp.exenpfxfn.exexhnpnx.exenbtdp.exefbvbn.exetdflt.exedxxxx.exedhltxn.exexfbtr.exetpldhx.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhvrxjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtdvrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbltj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdbtbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxdhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pthxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxlfvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpddtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnvrvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blpjht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvjxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvffb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnlxbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljfxxfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbdnjrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thpvxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfbdjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fppjvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxltl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnnhbfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndrxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxlfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbjntf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhlhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjtvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljtttl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlftxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvvhbtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdrbpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nflpftv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlffrnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njldnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvrhnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpvfpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbvtxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bltjjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhjhpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpvdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxxjdlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npxvhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvxrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxdbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvpxnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xljbfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plprjrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjfpnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppllfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrjfjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtnrvxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npfxfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhnpnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbvbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdflt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhltxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfbtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpldhx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exenhdjf.exejpnjpd.exetnpndhp.exedttjdlr.exehdpvxr.exebrnljj.exeppplrj.exevfbdjx.exelbpdfdj.exerldljf.exepfdrl.exejlpppbf.exevbvptd.exexxvxlpj.exebnrhtfp.exedescription pid process target process PID 2880 wrote to memory of 2948 2880 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe nhdjf.exe PID 2880 wrote to memory of 2948 2880 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe nhdjf.exe PID 2880 wrote to memory of 2948 2880 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe nhdjf.exe PID 2880 wrote to memory of 2948 2880 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe nhdjf.exe PID 2948 wrote to memory of 2944 2948 nhdjf.exe jpnjpd.exe PID 2948 wrote to memory of 2944 2948 nhdjf.exe jpnjpd.exe PID 2948 wrote to memory of 2944 2948 nhdjf.exe jpnjpd.exe PID 2948 wrote to memory of 2944 2948 nhdjf.exe jpnjpd.exe PID 2944 wrote to memory of 3064 2944 jpnjpd.exe tnpndhp.exe PID 2944 wrote to memory of 3064 2944 jpnjpd.exe tnpndhp.exe PID 2944 wrote to memory of 3064 2944 jpnjpd.exe tnpndhp.exe PID 2944 wrote to memory of 3064 2944 jpnjpd.exe tnpndhp.exe PID 3064 wrote to memory of 2712 3064 tnpndhp.exe dttjdlr.exe PID 3064 wrote to memory of 2712 3064 tnpndhp.exe dttjdlr.exe PID 3064 wrote to memory of 2712 3064 tnpndhp.exe dttjdlr.exe PID 3064 wrote to memory of 2712 3064 tnpndhp.exe dttjdlr.exe PID 2712 wrote to memory of 2708 2712 dttjdlr.exe hdpvxr.exe PID 2712 wrote to memory of 2708 2712 dttjdlr.exe hdpvxr.exe PID 2712 wrote to memory of 2708 2712 dttjdlr.exe hdpvxr.exe PID 2712 wrote to memory of 2708 2712 dttjdlr.exe hdpvxr.exe PID 2708 wrote to memory of 2532 2708 hdpvxr.exe brnljj.exe PID 2708 wrote to memory of 2532 2708 hdpvxr.exe brnljj.exe PID 2708 wrote to memory of 2532 2708 hdpvxr.exe brnljj.exe PID 2708 wrote to memory of 2532 2708 hdpvxr.exe brnljj.exe PID 2532 wrote to memory of 396 2532 brnljj.exe ppplrj.exe PID 2532 wrote to memory of 396 2532 brnljj.exe ppplrj.exe PID 2532 wrote to memory of 396 2532 brnljj.exe ppplrj.exe PID 2532 wrote to memory of 396 2532 brnljj.exe ppplrj.exe PID 396 wrote to memory of 1324 396 ppplrj.exe vfbdjx.exe PID 396 wrote to memory of 1324 396 ppplrj.exe vfbdjx.exe PID 396 wrote to memory of 1324 396 ppplrj.exe vfbdjx.exe PID 396 wrote to memory of 1324 396 ppplrj.exe vfbdjx.exe PID 1324 wrote to memory of 952 1324 vfbdjx.exe lbpdfdj.exe PID 1324 wrote to memory of 952 1324 vfbdjx.exe lbpdfdj.exe PID 1324 wrote to memory of 952 1324 vfbdjx.exe lbpdfdj.exe PID 1324 wrote to memory of 952 1324 vfbdjx.exe lbpdfdj.exe PID 952 wrote to memory of 600 952 lbpdfdj.exe rldljf.exe PID 952 wrote to memory of 600 952 lbpdfdj.exe rldljf.exe PID 952 wrote to memory of 600 952 lbpdfdj.exe rldljf.exe PID 952 wrote to memory of 600 952 lbpdfdj.exe rldljf.exe PID 600 wrote to memory of 2196 600 rldljf.exe pfdrl.exe PID 600 wrote to memory of 2196 600 rldljf.exe pfdrl.exe PID 600 wrote to memory of 2196 600 rldljf.exe pfdrl.exe PID 600 wrote to memory of 2196 600 rldljf.exe pfdrl.exe PID 2196 wrote to memory of 2704 2196 pfdrl.exe jlpppbf.exe PID 2196 wrote to memory of 2704 2196 pfdrl.exe jlpppbf.exe PID 2196 wrote to memory of 2704 2196 pfdrl.exe jlpppbf.exe PID 2196 wrote to memory of 2704 2196 pfdrl.exe jlpppbf.exe PID 2704 wrote to memory of 2200 2704 jlpppbf.exe vbvptd.exe PID 2704 wrote to memory of 2200 2704 jlpppbf.exe vbvptd.exe PID 2704 wrote to memory of 2200 2704 jlpppbf.exe vbvptd.exe PID 2704 wrote to memory of 2200 2704 jlpppbf.exe vbvptd.exe PID 2200 wrote to memory of 2960 2200 vbvptd.exe xxvxlpj.exe PID 2200 wrote to memory of 2960 2200 vbvptd.exe xxvxlpj.exe PID 2200 wrote to memory of 2960 2200 vbvptd.exe xxvxlpj.exe PID 2200 wrote to memory of 2960 2200 vbvptd.exe xxvxlpj.exe PID 2960 wrote to memory of 2252 2960 xxvxlpj.exe bnrhtfp.exe PID 2960 wrote to memory of 2252 2960 xxvxlpj.exe bnrhtfp.exe PID 2960 wrote to memory of 2252 2960 xxvxlpj.exe bnrhtfp.exe PID 2960 wrote to memory of 2252 2960 xxvxlpj.exe bnrhtfp.exe PID 2252 wrote to memory of 568 2252 bnrhtfp.exe bltfh.exe PID 2252 wrote to memory of 568 2252 bnrhtfp.exe bltfh.exe PID 2252 wrote to memory of 568 2252 bnrhtfp.exe bltfh.exe PID 2252 wrote to memory of 568 2252 bnrhtfp.exe bltfh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\nhdjf.exec:\nhdjf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\jpnjpd.exec:\jpnjpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\tnpndhp.exec:\tnpndhp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\dttjdlr.exec:\dttjdlr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\hdpvxr.exec:\hdpvxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\brnljj.exec:\brnljj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\ppplrj.exec:\ppplrj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\vfbdjx.exec:\vfbdjx.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\lbpdfdj.exec:\lbpdfdj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\rldljf.exec:\rldljf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:600 -
\??\c:\pfdrl.exec:\pfdrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\jlpppbf.exec:\jlpppbf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\vbvptd.exec:\vbvptd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\xxvxlpj.exec:\xxvxlpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\bnrhtfp.exec:\bnrhtfp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\bltfh.exec:\bltfh.exe17⤵
- Executes dropped EXE
PID:568 -
\??\c:\rnxldlb.exec:\rnxldlb.exe18⤵
- Executes dropped EXE
PID:944 -
\??\c:\vxbrdj.exec:\vxbrdj.exe19⤵
- Executes dropped EXE
PID:2376 -
\??\c:\dhfvrdv.exec:\dhfvrdv.exe20⤵
- Executes dropped EXE
PID:2580 -
\??\c:\nndxx.exec:\nndxx.exe21⤵
- Executes dropped EXE
PID:2420 -
\??\c:\xnljh.exec:\xnljh.exe22⤵
- Executes dropped EXE
PID:1868 -
\??\c:\ddtvl.exec:\ddtvl.exe23⤵
- Executes dropped EXE
PID:856 -
\??\c:\xpvfpv.exec:\xpvfpv.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620 -
\??\c:\vhjjhbn.exec:\vhjjhbn.exe25⤵
- Executes dropped EXE
PID:1820 -
\??\c:\lxdxrp.exec:\lxdxrp.exe26⤵
- Executes dropped EXE
PID:2332 -
\??\c:\fpvxfjj.exec:\fpvxfjj.exe27⤵
- Executes dropped EXE
PID:1912 -
\??\c:\bjdnplt.exec:\bjdnplt.exe28⤵
- Executes dropped EXE
PID:1672 -
\??\c:\xhfvn.exec:\xhfvn.exe29⤵
- Executes dropped EXE
PID:1764 -
\??\c:\xnpfb.exec:\xnpfb.exe30⤵
- Executes dropped EXE
PID:1996 -
\??\c:\xhnpnx.exec:\xhnpnx.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496 -
\??\c:\ftphrfd.exec:\ftphrfd.exe32⤵
- Executes dropped EXE
PID:2212 -
\??\c:\vdndpxb.exec:\vdndpxb.exe33⤵
- Executes dropped EXE
PID:1608 -
\??\c:\hbpbvf.exec:\hbpbvf.exe34⤵
- Executes dropped EXE
PID:2088 -
\??\c:\jvtxdbh.exec:\jvtxdbh.exe35⤵
- Executes dropped EXE
PID:1484 -
\??\c:\jnnnx.exec:\jnnnx.exe36⤵
- Executes dropped EXE
PID:2692 -
\??\c:\prvrtr.exec:\prvrtr.exe37⤵
- Executes dropped EXE
PID:2864 -
\??\c:\nnlfhtn.exec:\nnlfhtn.exe38⤵
- Executes dropped EXE
PID:2840 -
\??\c:\rrhxrf.exec:\rrhxrf.exe39⤵
- Executes dropped EXE
PID:2788 -
\??\c:\ndxtdr.exec:\ndxtdr.exe40⤵
- Executes dropped EXE
PID:2716 -
\??\c:\xjtbtn.exec:\xjtbtn.exe41⤵
- Executes dropped EXE
PID:984 -
\??\c:\pbrfpb.exec:\pbrfpb.exe42⤵
- Executes dropped EXE
PID:436 -
\??\c:\rlhlfl.exec:\rlhlfl.exe43⤵
- Executes dropped EXE
PID:1952 -
\??\c:\bxlfvx.exec:\bxlfvx.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2536 -
\??\c:\rbhplrl.exec:\rbhplrl.exe45⤵
- Executes dropped EXE
PID:952 -
\??\c:\rnddt.exec:\rnddt.exe46⤵
- Executes dropped EXE
PID:1716 -
\??\c:\xfhjn.exec:\xfhjn.exe47⤵
- Executes dropped EXE
PID:2196 -
\??\c:\dhtnvth.exec:\dhtnvth.exe48⤵
- Executes dropped EXE
PID:2192 -
\??\c:\pbrtx.exec:\pbrtx.exe49⤵
- Executes dropped EXE
PID:2768 -
\??\c:\lrllhr.exec:\lrllhr.exe50⤵
- Executes dropped EXE
PID:1256 -
\??\c:\pfnpjt.exec:\pfnpjt.exe51⤵
- Executes dropped EXE
PID:1940 -
\??\c:\hnpjff.exec:\hnpjff.exe52⤵
- Executes dropped EXE
PID:2960 -
\??\c:\vjndj.exec:\vjndj.exe53⤵
- Executes dropped EXE
PID:548 -
\??\c:\hnrbb.exec:\hnrbb.exe54⤵
- Executes dropped EXE
PID:1508 -
\??\c:\frvthnf.exec:\frvthnf.exe55⤵
- Executes dropped EXE
PID:1148 -
\??\c:\phttxpx.exec:\phttxpx.exe56⤵
- Executes dropped EXE
PID:2548 -
\??\c:\hxlxvr.exec:\hxlxvr.exe57⤵
- Executes dropped EXE
PID:2028 -
\??\c:\vnxlphd.exec:\vnxlphd.exe58⤵
- Executes dropped EXE
PID:2576 -
\??\c:\xbhphll.exec:\xbhphll.exe59⤵
- Executes dropped EXE
PID:1652 -
\??\c:\tvhlvf.exec:\tvhlvf.exe60⤵
- Executes dropped EXE
PID:2628 -
\??\c:\tpjxt.exec:\tpjxt.exe61⤵
- Executes dropped EXE
PID:888 -
\??\c:\dhnlh.exec:\dhnlh.exe62⤵
- Executes dropped EXE
PID:564 -
\??\c:\xlhfn.exec:\xlhfn.exe63⤵
- Executes dropped EXE
PID:1960 -
\??\c:\fjjtjhl.exec:\fjjtjhl.exe64⤵
- Executes dropped EXE
PID:2432 -
\??\c:\dfbdxr.exec:\dfbdxr.exe65⤵
- Executes dropped EXE
PID:2204 -
\??\c:\fxjbfvv.exec:\fxjbfvv.exe66⤵PID:2036
-
\??\c:\lxhnd.exec:\lxhnd.exe67⤵PID:2332
-
\??\c:\hxvvbt.exec:\hxvvbt.exe68⤵PID:1632
-
\??\c:\fhphd.exec:\fhphd.exe69⤵PID:1704
-
\??\c:\vpjxlrx.exec:\vpjxlrx.exe70⤵PID:1292
-
\??\c:\fhjjvp.exec:\fhjjvp.exe71⤵PID:680
-
\??\c:\pfpnb.exec:\pfpnb.exe72⤵PID:836
-
\??\c:\xvdhhj.exec:\xvdhhj.exe73⤵PID:1996
-
\??\c:\ffjjp.exec:\ffjjp.exe74⤵PID:1028
-
\??\c:\bbdvlfh.exec:\bbdvlfh.exe75⤵PID:1576
-
\??\c:\fljdt.exec:\fljdt.exe76⤵PID:2880
-
\??\c:\nfrbxr.exec:\nfrbxr.exe77⤵PID:2900
-
\??\c:\vxpjxl.exec:\vxpjxl.exe78⤵PID:2088
-
\??\c:\xtdfjr.exec:\xtdfjr.exe79⤵PID:2944
-
\??\c:\pfrbfh.exec:\pfrbfh.exe80⤵PID:3064
-
\??\c:\rdrbpp.exec:\rdrbpp.exe81⤵
- System Location Discovery: System Language Discovery
PID:2888 -
\??\c:\pvhpn.exec:\pvhpn.exe82⤵PID:2744
-
\??\c:\fpvffjn.exec:\fpvffjn.exe83⤵PID:2788
-
\??\c:\ddnppb.exec:\ddnppb.exe84⤵PID:2532
-
\??\c:\ljtttl.exec:\ljtttl.exe85⤵
- System Location Discovery: System Language Discovery
PID:1992 -
\??\c:\xfbtr.exec:\xfbtr.exe86⤵
- System Location Discovery: System Language Discovery
PID:2116 -
\??\c:\xfrpb.exec:\xfrpb.exe87⤵PID:2152
-
\??\c:\hjtvt.exec:\hjtvt.exe88⤵
- System Location Discovery: System Language Discovery
PID:2480 -
\??\c:\xhtjhdl.exec:\xhtjhdl.exe89⤵PID:2352
-
\??\c:\bjxbt.exec:\bjxbt.exe90⤵PID:1584
-
\??\c:\fhnjr.exec:\fhnjr.exe91⤵PID:2456
-
\??\c:\vltvpdt.exec:\vltvpdt.exe92⤵PID:2176
-
\??\c:\jhxnhd.exec:\jhxnhd.exe93⤵PID:2192
-
\??\c:\rbhfx.exec:\rbhfx.exe94⤵PID:3056
-
\??\c:\ljbhxn.exec:\ljbhxn.exe95⤵PID:2448
-
\??\c:\fbltl.exec:\fbltl.exe96⤵PID:2252
-
\??\c:\jlftxt.exec:\jlftxt.exe97⤵
- System Location Discovery: System Language Discovery
PID:332 -
\??\c:\pvfplp.exec:\pvfplp.exe98⤵PID:2460
-
\??\c:\tfvhnfl.exec:\tfvhnfl.exe99⤵PID:1944
-
\??\c:\hdbtjxn.exec:\hdbtjxn.exe100⤵PID:2404
-
\??\c:\xrjrjlr.exec:\xrjrjlr.exe101⤵PID:1180
-
\??\c:\rjjpft.exec:\rjjpft.exe102⤵PID:2580
-
\??\c:\jrlnnfd.exec:\jrlnnfd.exe103⤵PID:2504
-
\??\c:\xjfpnd.exec:\xjfpnd.exe104⤵
- System Location Discovery: System Language Discovery
PID:1848 -
\??\c:\ntnpnd.exec:\ntnpnd.exe105⤵PID:912
-
\??\c:\vphxpf.exec:\vphxpf.exe106⤵PID:2616
-
\??\c:\bjtfdnd.exec:\bjtfdnd.exe107⤵PID:856
-
\??\c:\xvbvdr.exec:\xvbvdr.exe108⤵PID:1352
-
\??\c:\rdvtd.exec:\rdvtd.exe109⤵PID:1860
-
\??\c:\plvfr.exec:\plvfr.exe110⤵PID:1724
-
\??\c:\nxllv.exec:\nxllv.exe111⤵PID:2600
-
\??\c:\hlbxbjb.exec:\hlbxbjb.exe112⤵PID:2332
-
\??\c:\hpdpfp.exec:\hpdpfp.exe113⤵PID:2492
-
\??\c:\dxlfxl.exec:\dxlfxl.exe114⤵
- System Location Discovery: System Language Discovery
PID:1572 -
\??\c:\djpthhn.exec:\djpthhn.exe115⤵PID:1516
-
\??\c:\bvhprvd.exec:\bvhprvd.exe116⤵PID:1040
-
\??\c:\hbjtxp.exec:\hbjtxp.exe117⤵PID:1328
-
\??\c:\jjhtl.exec:\jjhtl.exe118⤵PID:1656
-
\??\c:\tnvrvn.exec:\tnvrvn.exe119⤵
- System Location Discovery: System Language Discovery
PID:1612 -
\??\c:\xljbfd.exec:\xljbfd.exe120⤵
- System Location Discovery: System Language Discovery
PID:2952 -
\??\c:\ntvpvd.exec:\ntvpvd.exe121⤵PID:2796
-
\??\c:\npjjf.exec:\npjjf.exe122⤵PID:2776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-