Analysis
-
max time kernel
121s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 07:08
Behavioral task
behavioral1
Sample
ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
120 seconds
General
-
Target
ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe
-
Size
3.7MB
-
MD5
c5224cabf04d7988bc114ed5a3c097f0
-
SHA1
3d93a72f46f9032c26a0888cb555335b536024e5
-
SHA256
ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797af
-
SHA512
f36792651b161f3d4fa5114101df844a30e4ab718e1e7589a5fffb1f675698f17ca581effe5a765a34a58eea6d547fe4955bf18c2c0381c5795c7bd8dcb1a7bb
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98u:U6XLq/qPPslzKx/dJg1ErmNf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 47 IoCs
resource yara_rule behavioral1/memory/2792-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3008-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2816-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2916-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2692-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2252-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2108-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3056-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3056-125-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1272-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1728-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1728-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2096-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2212-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1716-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2548-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2008-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2544-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-301-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2552-315-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2948-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2744-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2596-374-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/2596-377-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2600-405-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3048-412-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2332-434-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/800-445-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2024-452-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2424-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2492-474-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2024-473-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1968-493-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2728-648-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2108-679-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3068-692-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/436-717-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1616-727-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2140-759-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2072-780-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2420-794-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/680-803-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2644-869-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2832-928-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2696-940-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 3008 frfdtf.exe 2816 ftbhj.exe 2916 thffjt.exe 2828 njpdfbf.exe 2736 nxhhnp.exe 2924 vvlnl.exe 2732 hjrvvf.exe 2616 rbbtv.exe 2692 tphlr.exe 2252 frlrdj.exe 2108 jxldt.exe 1168 vvhlhp.exe 3056 lhxfxpt.exe 2176 rfpbn.exe 2152 pfvbb.exe 2540 phxfv.exe 2328 jrhdppf.exe 1272 hlrrbj.exe 1728 lntrldt.exe 2096 bjphj.exe 2212 fttxd.exe 1716 njnrd.exe 2412 hnnvpj.exe 2548 vvhvdt.exe 1932 nrhtthb.exe 1816 xvrbtt.exe 2688 lxdrxln.exe 2008 pvlfhx.exe 572 hlhxrx.exe 2544 hjjtl.exe 2680 llhdv.exe 2664 lxblln.exe 2124 hbjnrnh.exe 2552 prpxjr.exe 2948 xpprvnr.exe 2456 nnlfr.exe 2928 vtdjnjx.exe 2828 thjfltb.exe 2884 nhxvp.exe 2712 rdvrxv.exe 2924 pdljd.exe 2744 rfnplr.exe 2596 dftnp.exe 2600 dbbtxtp.exe 2252 xfhvvnl.exe 1844 xxxnth.exe 2320 ttnrfr.exe 3048 tnhxvjj.exe 3064 pxlbfnr.exe 2700 tlfxnn.exe 1296 vbjddph.exe 2332 vdjjf.exe 800 lxnjdb.exe 2024 tvttp.exe 1536 bfrhpjx.exe 1524 nftpn.exe 2424 bhlxptr.exe 2492 vvfjft.exe 2432 lnrdb.exe 1968 nllrvf.exe 2156 hntbhp.exe 2576 txprr.exe 1636 jdjdhb.exe 288 dhdplv.exe -
resource yara_rule behavioral1/memory/2792-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000a00000001225c-5.dat upx behavioral1/memory/2792-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3008-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000018b05-19.dat upx behavioral1/memory/2816-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2916-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0003000000018334-27.dat upx behavioral1/files/0x0007000000018b50-37.dat upx behavioral1/memory/2916-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000018b54-45.dat upx behavioral1/files/0x0007000000018b59-56.dat upx behavioral1/memory/2736-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000018b71-64.dat upx behavioral1/files/0x0007000000018b89-74.dat upx behavioral1/memory/2616-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001975a-83.dat upx behavioral1/files/0x0005000000019761-92.dat upx behavioral1/memory/2692-91-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000197fd-101.dat upx behavioral1/memory/2252-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019820-110.dat upx behavioral1/memory/2108-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001998d-118.dat upx behavioral1/files/0x0005000000019bf5-128.dat upx behavioral1/memory/3056-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3056-125-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0005000000019bf6-137.dat upx behavioral1/files/0x0005000000019bf9-147.dat upx behavioral1/memory/2540-146-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019c3c-154.dat upx behavioral1/files/0x0005000000019d61-164.dat upx behavioral1/memory/1272-163-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019d62-173.dat upx behavioral1/memory/1272-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1728-174-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1728-181-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2096-184-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019d6d-183.dat upx behavioral1/files/0x0005000000019e92-192.dat upx behavioral1/memory/2212-200-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019fd4-202.dat upx behavioral1/memory/1716-209-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019fdd-210.dat upx behavioral1/files/0x000500000001a03c-220.dat upx behavioral1/memory/2548-219-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1932-230-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2548-229-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001a049-228.dat upx behavioral1/files/0x000500000001a0b6-241.dat upx behavioral1/files/0x000500000001a309-248.dat upx behavioral1/files/0x000500000001a3ab-258.dat upx behavioral1/memory/2008-257-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2008-265-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001a3f6-263.dat upx behavioral1/files/0x000500000001a3f8-273.dat upx behavioral1/files/0x000500000001a3fd-282.dat upx behavioral1/memory/2544-281-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001a400-294.dat upx behavioral1/memory/2680-293-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2664-301-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2552-308-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2552-315-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2948-316-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdpbrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phbpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhlnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftjxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jftbjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftjttv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxlxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnrdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlrdvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdnjnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpbhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjnxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfnlfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbrlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjphj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjtfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhlhtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phppdtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnfbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlfjrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blfdxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdljd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjjtrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbhbdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbjrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbjjft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnrvpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnlph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phvdpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdtdtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldtlndd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvpjht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvldf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbbtxtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trxdlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btrxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfbvfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtppx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjrvvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lntrldt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbdfpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtvvhlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrrflh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvrtjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxblln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrnhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdltn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dflhdhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhxvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxlbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddndxrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljtbdhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxbxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxxntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtppldn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvlfhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njbtdpr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 3008 2792 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 29 PID 2792 wrote to memory of 3008 2792 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 29 PID 2792 wrote to memory of 3008 2792 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 29 PID 2792 wrote to memory of 3008 2792 ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe 29 PID 3008 wrote to memory of 2816 3008 frfdtf.exe 30 PID 3008 wrote to memory of 2816 3008 frfdtf.exe 30 PID 3008 wrote to memory of 2816 3008 frfdtf.exe 30 PID 3008 wrote to memory of 2816 3008 frfdtf.exe 30 PID 2816 wrote to memory of 2916 2816 ftbhj.exe 31 PID 2816 wrote to memory of 2916 2816 ftbhj.exe 31 PID 2816 wrote to memory of 2916 2816 ftbhj.exe 31 PID 2816 wrote to memory of 2916 2816 ftbhj.exe 31 PID 2916 wrote to memory of 2828 2916 thffjt.exe 32 PID 2916 wrote to memory of 2828 2916 thffjt.exe 32 PID 2916 wrote to memory of 2828 2916 thffjt.exe 32 PID 2916 wrote to memory of 2828 2916 thffjt.exe 32 PID 2828 wrote to memory of 2736 2828 njpdfbf.exe 33 PID 2828 wrote to memory of 2736 2828 njpdfbf.exe 33 PID 2828 wrote to memory of 2736 2828 njpdfbf.exe 33 PID 2828 wrote to memory of 2736 2828 njpdfbf.exe 33 PID 2736 wrote to memory of 2924 2736 nxhhnp.exe 34 PID 2736 wrote to memory of 2924 2736 nxhhnp.exe 34 PID 2736 wrote to memory of 2924 2736 nxhhnp.exe 34 PID 2736 wrote to memory of 2924 2736 nxhhnp.exe 34 PID 2924 wrote to memory of 2732 2924 vvlnl.exe 35 PID 2924 wrote to memory of 2732 2924 vvlnl.exe 35 PID 2924 wrote to memory of 2732 2924 vvlnl.exe 35 PID 2924 wrote to memory of 2732 2924 vvlnl.exe 35 PID 2732 wrote to memory of 2616 2732 hjrvvf.exe 36 PID 2732 wrote to memory of 2616 2732 hjrvvf.exe 36 PID 2732 wrote to memory of 2616 2732 hjrvvf.exe 36 PID 2732 wrote to memory of 2616 2732 hjrvvf.exe 36 PID 2616 wrote to memory of 2692 2616 rbbtv.exe 37 PID 2616 wrote to memory of 2692 2616 rbbtv.exe 37 PID 2616 wrote to memory of 2692 2616 rbbtv.exe 37 PID 2616 wrote to memory of 2692 2616 rbbtv.exe 37 PID 2692 wrote to memory of 2252 2692 tphlr.exe 38 PID 2692 wrote to memory of 2252 2692 tphlr.exe 38 PID 2692 wrote to memory of 2252 2692 tphlr.exe 38 PID 2692 wrote to memory of 2252 2692 tphlr.exe 38 PID 2252 wrote to memory of 2108 2252 frlrdj.exe 39 PID 2252 wrote to memory of 2108 2252 frlrdj.exe 39 PID 2252 wrote to memory of 2108 2252 frlrdj.exe 39 PID 2252 wrote to memory of 2108 2252 frlrdj.exe 39 PID 2108 wrote to memory of 1168 2108 jxldt.exe 40 PID 2108 wrote to memory of 1168 2108 jxldt.exe 40 PID 2108 wrote to memory of 1168 2108 jxldt.exe 40 PID 2108 wrote to memory of 1168 2108 jxldt.exe 40 PID 1168 wrote to memory of 3056 1168 vvhlhp.exe 41 PID 1168 wrote to memory of 3056 1168 vvhlhp.exe 41 PID 1168 wrote to memory of 3056 1168 vvhlhp.exe 41 PID 1168 wrote to memory of 3056 1168 vvhlhp.exe 41 PID 3056 wrote to memory of 2176 3056 lhxfxpt.exe 42 PID 3056 wrote to memory of 2176 3056 lhxfxpt.exe 42 PID 3056 wrote to memory of 2176 3056 lhxfxpt.exe 42 PID 3056 wrote to memory of 2176 3056 lhxfxpt.exe 42 PID 2176 wrote to memory of 2152 2176 rfpbn.exe 43 PID 2176 wrote to memory of 2152 2176 rfpbn.exe 43 PID 2176 wrote to memory of 2152 2176 rfpbn.exe 43 PID 2176 wrote to memory of 2152 2176 rfpbn.exe 43 PID 2152 wrote to memory of 2540 2152 pfvbb.exe 44 PID 2152 wrote to memory of 2540 2152 pfvbb.exe 44 PID 2152 wrote to memory of 2540 2152 pfvbb.exe 44 PID 2152 wrote to memory of 2540 2152 pfvbb.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe"C:\Users\Admin\AppData\Local\Temp\ac46bf9fc6c047e8e4d9d73979684b3a45001fd5eab7c366324642ab813797afN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\frfdtf.exec:\frfdtf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\ftbhj.exec:\ftbhj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\thffjt.exec:\thffjt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\njpdfbf.exec:\njpdfbf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\nxhhnp.exec:\nxhhnp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\vvlnl.exec:\vvlnl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\hjrvvf.exec:\hjrvvf.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\rbbtv.exec:\rbbtv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\tphlr.exec:\tphlr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\frlrdj.exec:\frlrdj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\jxldt.exec:\jxldt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\vvhlhp.exec:\vvhlhp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\lhxfxpt.exec:\lhxfxpt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\rfpbn.exec:\rfpbn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\pfvbb.exec:\pfvbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\phxfv.exec:\phxfv.exe17⤵
- Executes dropped EXE
PID:2540 -
\??\c:\jrhdppf.exec:\jrhdppf.exe18⤵
- Executes dropped EXE
PID:2328 -
\??\c:\hlrrbj.exec:\hlrrbj.exe19⤵
- Executes dropped EXE
PID:1272 -
\??\c:\lntrldt.exec:\lntrldt.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
\??\c:\bjphj.exec:\bjphj.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096 -
\??\c:\fttxd.exec:\fttxd.exe22⤵
- Executes dropped EXE
PID:2212 -
\??\c:\njnrd.exec:\njnrd.exe23⤵
- Executes dropped EXE
PID:1716 -
\??\c:\hnnvpj.exec:\hnnvpj.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
\??\c:\vvhvdt.exec:\vvhvdt.exe25⤵
- Executes dropped EXE
PID:2548 -
\??\c:\nrhtthb.exec:\nrhtthb.exe26⤵
- Executes dropped EXE
PID:1932 -
\??\c:\xvrbtt.exec:\xvrbtt.exe27⤵
- Executes dropped EXE
PID:1816 -
\??\c:\lxdrxln.exec:\lxdrxln.exe28⤵
- Executes dropped EXE
PID:2688 -
\??\c:\pvlfhx.exec:\pvlfhx.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008 -
\??\c:\hlhxrx.exec:\hlhxrx.exe30⤵
- Executes dropped EXE
PID:572 -
\??\c:\hjjtl.exec:\hjjtl.exe31⤵
- Executes dropped EXE
PID:2544 -
\??\c:\llhdv.exec:\llhdv.exe32⤵
- Executes dropped EXE
PID:2680 -
\??\c:\lxblln.exec:\lxblln.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
\??\c:\hbjnrnh.exec:\hbjnrnh.exe34⤵
- Executes dropped EXE
PID:2124 -
\??\c:\prpxjr.exec:\prpxjr.exe35⤵
- Executes dropped EXE
PID:2552 -
\??\c:\xpprvnr.exec:\xpprvnr.exe36⤵
- Executes dropped EXE
PID:2948 -
\??\c:\nnlfr.exec:\nnlfr.exe37⤵
- Executes dropped EXE
PID:2456 -
\??\c:\vtdjnjx.exec:\vtdjnjx.exe38⤵
- Executes dropped EXE
PID:2928 -
\??\c:\thjfltb.exec:\thjfltb.exe39⤵
- Executes dropped EXE
PID:2828 -
\??\c:\nhxvp.exec:\nhxvp.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884 -
\??\c:\rdvrxv.exec:\rdvrxv.exe41⤵
- Executes dropped EXE
PID:2712 -
\??\c:\pdljd.exec:\pdljd.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
\??\c:\rfnplr.exec:\rfnplr.exe43⤵
- Executes dropped EXE
PID:2744 -
\??\c:\dftnp.exec:\dftnp.exe44⤵
- Executes dropped EXE
PID:2596 -
\??\c:\dbbtxtp.exec:\dbbtxtp.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600 -
\??\c:\xfhvvnl.exec:\xfhvvnl.exe46⤵
- Executes dropped EXE
PID:2252 -
\??\c:\xxxnth.exec:\xxxnth.exe47⤵
- Executes dropped EXE
PID:1844 -
\??\c:\ttnrfr.exec:\ttnrfr.exe48⤵
- Executes dropped EXE
PID:2320 -
\??\c:\tnhxvjj.exec:\tnhxvjj.exe49⤵
- Executes dropped EXE
PID:3048 -
\??\c:\pxlbfnr.exec:\pxlbfnr.exe50⤵
- Executes dropped EXE
PID:3064 -
\??\c:\tlfxnn.exec:\tlfxnn.exe51⤵
- Executes dropped EXE
PID:2700 -
\??\c:\vbjddph.exec:\vbjddph.exe52⤵
- Executes dropped EXE
PID:1296 -
\??\c:\vdjjf.exec:\vdjjf.exe53⤵
- Executes dropped EXE
PID:2332 -
\??\c:\lxnjdb.exec:\lxnjdb.exe54⤵
- Executes dropped EXE
PID:800 -
\??\c:\tvttp.exec:\tvttp.exe55⤵
- Executes dropped EXE
PID:2024 -
\??\c:\bfrhpjx.exec:\bfrhpjx.exe56⤵
- Executes dropped EXE
PID:1536 -
\??\c:\nftpn.exec:\nftpn.exe57⤵
- Executes dropped EXE
PID:1524 -
\??\c:\bhlxptr.exec:\bhlxptr.exe58⤵
- Executes dropped EXE
PID:2424 -
\??\c:\vvfjft.exec:\vvfjft.exe59⤵
- Executes dropped EXE
PID:2492 -
\??\c:\lnrdb.exec:\lnrdb.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432 -
\??\c:\nllrvf.exec:\nllrvf.exe61⤵
- Executes dropped EXE
PID:1968 -
\??\c:\hntbhp.exec:\hntbhp.exe62⤵
- Executes dropped EXE
PID:2156 -
\??\c:\txprr.exec:\txprr.exe63⤵
- Executes dropped EXE
PID:2576 -
\??\c:\jdjdhb.exec:\jdjdhb.exe64⤵
- Executes dropped EXE
PID:1636 -
\??\c:\dhdplv.exec:\dhdplv.exe65⤵
- Executes dropped EXE
PID:288 -
\??\c:\bfpbhht.exec:\bfpbhht.exe66⤵PID:1244
-
\??\c:\ddnffth.exec:\ddnffth.exe67⤵PID:2284
-
\??\c:\blpbjvt.exec:\blpbjvt.exe68⤵PID:2436
-
\??\c:\nxtjh.exec:\nxtjh.exe69⤵PID:948
-
\??\c:\tvvpdpd.exec:\tvvpdpd.exe70⤵PID:1772
-
\??\c:\rhnnj.exec:\rhnnj.exe71⤵PID:472
-
\??\c:\dxnbxvn.exec:\dxnbxvn.exe72⤵PID:524
-
\??\c:\vlbtxll.exec:\vlbtxll.exe73⤵PID:2376
-
\??\c:\txtxfn.exec:\txtxfn.exe74⤵PID:2268
-
\??\c:\tlrtthr.exec:\tlrtthr.exe75⤵PID:760
-
\??\c:\dbdxpt.exec:\dbdxpt.exe76⤵PID:2256
-
\??\c:\lpfrl.exec:\lpfrl.exe77⤵
- System Location Discovery: System Language Discovery
PID:2892 -
\??\c:\dfbfx.exec:\dfbfx.exe78⤵PID:1708
-
\??\c:\dvdpt.exec:\dvdpt.exe79⤵
- System Location Discovery: System Language Discovery
PID:2820 -
\??\c:\htpldd.exec:\htpldd.exe80⤵PID:2984
-
\??\c:\nvfxfdf.exec:\nvfxfdf.exe81⤵PID:3000
-
\??\c:\njbtdpr.exec:\njbtdpr.exe82⤵
- System Location Discovery: System Language Discovery
PID:2872 -
\??\c:\jvhvn.exec:\jvhvn.exe83⤵PID:2848
-
\??\c:\pxdbnv.exec:\pxdbnv.exe84⤵PID:2824
-
\??\c:\bhhlnb.exec:\bhhlnb.exe85⤵
- System Location Discovery: System Language Discovery
PID:2784 -
\??\c:\tlrdvr.exec:\tlrdvr.exe86⤵
- System Location Discovery: System Language Discovery
PID:2728 -
\??\c:\bhbjhfh.exec:\bhbjhfh.exe87⤵PID:2592
-
\??\c:\fvtfdlr.exec:\fvtfdlr.exe88⤵PID:1660
-
\??\c:\bhdpppx.exec:\bhdpppx.exe89⤵PID:2508
-
\??\c:\xxxbv.exec:\xxxbv.exe90⤵PID:900
-
\??\c:\vpvpbvt.exec:\vpvpbvt.exe91⤵PID:2108
-
\??\c:\phphtdp.exec:\phphtdp.exe92⤵PID:2112
-
\??\c:\rllxthj.exec:\rllxthj.exe93⤵PID:2172
-
\??\c:\tlnbx.exec:\tlnbx.exe94⤵PID:3068
-
\??\c:\bpxxtp.exec:\bpxxtp.exe95⤵PID:2116
-
\??\c:\dldvt.exec:\dldvt.exe96⤵PID:1260
-
\??\c:\vjprjl.exec:\vjprjl.exe97⤵PID:436
-
\??\c:\rtxdj.exec:\rtxdj.exe98⤵PID:1812
-
\??\c:\xxfhj.exec:\xxfhj.exe99⤵PID:1616
-
\??\c:\trxdlf.exec:\trxdlf.exe100⤵
- System Location Discovery: System Language Discovery
PID:2328 -
\??\c:\drppr.exec:\drppr.exe101⤵PID:2176
-
\??\c:\bpbpfdv.exec:\bpbpfdv.exe102⤵PID:2204
-
\??\c:\pdphx.exec:\pdphx.exe103⤵PID:2072
-
\??\c:\lfrlhd.exec:\lfrlhd.exe104⤵PID:2140
-
\??\c:\bnlbvxr.exec:\bnlbvxr.exe105⤵PID:848
-
\??\c:\xjjtrb.exec:\xjjtrb.exe106⤵
- System Location Discovery: System Language Discovery
PID:2652 -
\??\c:\xbvfd.exec:\xbvfd.exe107⤵PID:2620
-
\??\c:\fnjtlb.exec:\fnjtlb.exe108⤵PID:2420
-
\??\c:\rhjhdht.exec:\rhjhdht.exe109⤵PID:1056
-
\??\c:\jpjjdxj.exec:\jpjjdxj.exe110⤵PID:680
-
\??\c:\jvvvj.exec:\jvvvj.exe111⤵
- System Location Discovery: System Language Discovery
PID:1052 -
\??\c:\xlhfr.exec:\xlhfr.exe112⤵PID:1640
-
\??\c:\jnrvpr.exec:\jnrvpr.exe113⤵
- System Location Discovery: System Language Discovery
PID:2436 -
\??\c:\jtthjbr.exec:\jtthjbr.exe114⤵PID:948
-
\??\c:\hpjxxx.exec:\hpjxxx.exe115⤵PID:2368
-
\??\c:\nltpnj.exec:\nltpnj.exe116⤵PID:472
-
\??\c:\tlhnn.exec:\tlhnn.exe117⤵
- System Location Discovery: System Language Discovery
PID:2324 -
\??\c:\jltbh.exec:\jltbh.exe118⤵PID:1472
-
\??\c:\btrxj.exec:\btrxj.exe119⤵
- System Location Discovery: System Language Discovery
PID:1620 -
\??\c:\vdprh.exec:\vdprh.exe120⤵PID:2644
-
\??\c:\hnrbvfn.exec:\hnrbvfn.exe121⤵PID:1576
-
\??\c:\bvvpth.exec:\bvvpth.exe122⤵PID:2912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-