Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 18:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe
-
Size
456KB
-
MD5
46c337bdd40d51b105801753017cabed
-
SHA1
5d8bda2facb4d8c7e4ef37aa8598f9c1d0820186
-
SHA256
744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d
-
SHA512
546f8a904c8f2ecd3b520c5e6065937013452b716464698e78eb8f1a6e7f21ba271ccc0075e727d561ac90aba9c6be77643c587102b1e9fc6a128c4d956d9ba6
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRs:q7Tc2NYHUrAwfMp3CDRs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 43 IoCs
resource yara_rule behavioral1/memory/2880-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2892-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3020-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2948-41-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2912-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2640-50-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2008-72-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2176-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1060-92-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1116-113-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1448-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1492-132-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2972-128-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/472-151-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1744-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2184-167-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1964-192-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2536-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1724-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1476-232-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/900-221-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/940-258-0x0000000000530000-0x000000000055A000-memory.dmp family_blackmoon behavioral1/memory/2580-263-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/940-261-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2280-288-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2280-287-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/2280-285-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1712-299-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2876-313-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1552-327-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2068-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2548-374-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1016-399-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2924-412-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1640-426-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2984-446-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2132-498-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2160-499-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2236-551-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/2704-685-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2992-719-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1740-746-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/288-820-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2892 ljtbljt.exe 3020 htfffxl.exe 2912 brxjjln.exe 2948 hlvltb.exe 2640 jjjrn.exe 2756 xdrbhnv.exe 2008 ldpbll.exe 2176 dbnrlv.exe 1060 jhljb.exe 2356 fbnnhr.exe 1448 nxnrtt.exe 1116 ppbhd.exe 2972 jvlbrf.exe 1492 xntlxj.exe 1744 pnnxd.exe 472 rhjtjf.exe 2184 btnlpvl.exe 2388 xrblbjt.exe 2192 pxbxjdd.exe 1964 vdfblvd.exe 1792 fntnp.exe 2536 dfddn.exe 900 pxxpx.exe 1724 xrvtnxv.exe 1476 xbrpvbh.exe 1288 jhpphp.exe 940 rvrhb.exe 2580 hrbrl.exe 1072 vtlfj.exe 2280 nxxddtl.exe 1712 bhddbnv.exe 2164 bjvblb.exe 2876 pltfbll.exe 2836 dndvx.exe 1552 ldbfjbj.exe 1668 pfxhnhx.exe 2068 xblnjfr.exe 2952 pphbnth.exe 2748 nvnvbbv.exe 2712 jllrl.exe 2168 pfjpvjn.exe 2708 pnvdh.exe 2548 tvpdh.exe 2596 ptjbxp.exe 2256 fjxpbx.exe 1016 fxrfphr.exe 2964 vbjrjv.exe 2924 hfjnht.exe 2260 bxjbvj.exe 1640 njjpvd.exe 2972 pfjjhh.exe 2396 frlvlnf.exe 2984 hjfvxhx.exe 1092 hnvfth.exe 2248 jhbdt.exe 2104 xprff.exe 2452 lbpft.exe 2160 nnpnxxv.exe 2076 rddjl.exe 984 hxxhth.exe 2132 rbbbrv.exe 1832 pfphlb.exe 1608 jbxxt.exe 1800 txtpdt.exe -
resource yara_rule behavioral1/memory/2880-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3020-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2892-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3020-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2912-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2948-41-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2912-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2008-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2176-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1116-113-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1448-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1492-132-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/472-151-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1744-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2388-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2184-167-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1964-192-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2536-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1724-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1476-232-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/900-221-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2580-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/940-261-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2280-288-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1712-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2836-314-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2876-313-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1668-328-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1552-327-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2068-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-374-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2260-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1640-426-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2396-433-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2984-446-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2132-498-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/580-566-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2896-593-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2068-627-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-666-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2704-685-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2260-706-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1148-720-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2392-747-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/288-820-0x00000000001B0000-0x00000000001DA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njbrvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrhphl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdthjdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvhvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhrrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfpjpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvrhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpjpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvnhhbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnnxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjhrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxtbpph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtfhbbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhvth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdnfxrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxvjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlfrph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfntnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjvrrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjlnlfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrnbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phptlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbrrvjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prtxlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfdhjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnvdljf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hplrlld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvpnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvdrjxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxvtdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnlvnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljvdtdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflfbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdhrlhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddxhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htdttj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdxrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txnnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnpnfj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2892 2880 744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe 30 PID 2880 wrote to memory of 2892 2880 744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe 30 PID 2880 wrote to memory of 2892 2880 744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe 30 PID 2880 wrote to memory of 2892 2880 744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe 30 PID 2892 wrote to memory of 3020 2892 ljtbljt.exe 31 PID 2892 wrote to memory of 3020 2892 ljtbljt.exe 31 PID 2892 wrote to memory of 3020 2892 ljtbljt.exe 31 PID 2892 wrote to memory of 3020 2892 ljtbljt.exe 31 PID 3020 wrote to memory of 2912 3020 htfffxl.exe 32 PID 3020 wrote to memory of 2912 3020 htfffxl.exe 32 PID 3020 wrote to memory of 2912 3020 htfffxl.exe 32 PID 3020 wrote to memory of 2912 3020 htfffxl.exe 32 PID 2912 wrote to memory of 2948 2912 brxjjln.exe 33 PID 2912 wrote to memory of 2948 2912 brxjjln.exe 33 PID 2912 wrote to memory of 2948 2912 brxjjln.exe 33 PID 2912 wrote to memory of 2948 2912 brxjjln.exe 33 PID 2948 wrote to memory of 2640 2948 hlvltb.exe 34 PID 2948 wrote to memory of 2640 2948 hlvltb.exe 34 PID 2948 wrote to memory of 2640 2948 hlvltb.exe 34 PID 2948 wrote to memory of 2640 2948 hlvltb.exe 34 PID 2640 wrote to memory of 2756 2640 jjjrn.exe 35 PID 2640 wrote to memory of 2756 2640 jjjrn.exe 35 PID 2640 wrote to memory of 2756 2640 jjjrn.exe 35 PID 2640 wrote to memory of 2756 2640 jjjrn.exe 35 PID 2756 wrote to memory of 2008 2756 xdrbhnv.exe 36 PID 2756 wrote to memory of 2008 2756 xdrbhnv.exe 36 PID 2756 wrote to memory of 2008 2756 xdrbhnv.exe 36 PID 2756 wrote to memory of 2008 2756 xdrbhnv.exe 36 PID 2008 wrote to memory of 2176 2008 ldpbll.exe 37 PID 2008 wrote to memory of 2176 2008 ldpbll.exe 37 PID 2008 wrote to memory of 2176 2008 ldpbll.exe 37 PID 2008 wrote to memory of 2176 2008 ldpbll.exe 37 PID 2176 wrote to memory of 1060 2176 dbnrlv.exe 38 PID 2176 wrote to memory of 1060 2176 dbnrlv.exe 38 PID 2176 wrote to memory of 1060 2176 dbnrlv.exe 38 PID 2176 wrote to memory of 1060 2176 dbnrlv.exe 38 PID 1060 wrote to memory of 2356 1060 jhljb.exe 39 PID 1060 wrote to memory of 2356 1060 jhljb.exe 39 PID 1060 wrote to memory of 2356 1060 jhljb.exe 39 PID 1060 wrote to memory of 2356 1060 jhljb.exe 39 PID 2356 wrote to memory of 1448 2356 fbnnhr.exe 40 PID 2356 wrote to memory of 1448 2356 fbnnhr.exe 40 PID 2356 wrote to memory of 1448 2356 fbnnhr.exe 40 PID 2356 wrote to memory of 1448 2356 fbnnhr.exe 40 PID 1448 wrote to memory of 1116 1448 nxnrtt.exe 41 PID 1448 wrote to memory of 1116 1448 nxnrtt.exe 41 PID 1448 wrote to memory of 1116 1448 nxnrtt.exe 41 PID 1448 wrote to memory of 1116 1448 nxnrtt.exe 41 PID 1116 wrote to memory of 2972 1116 ppbhd.exe 42 PID 1116 wrote to memory of 2972 1116 ppbhd.exe 42 PID 1116 wrote to memory of 2972 1116 ppbhd.exe 42 PID 1116 wrote to memory of 2972 1116 ppbhd.exe 42 PID 2972 wrote to memory of 1492 2972 jvlbrf.exe 43 PID 2972 wrote to memory of 1492 2972 jvlbrf.exe 43 PID 2972 wrote to memory of 1492 2972 jvlbrf.exe 43 PID 2972 wrote to memory of 1492 2972 jvlbrf.exe 43 PID 1492 wrote to memory of 1744 1492 xntlxj.exe 44 PID 1492 wrote to memory of 1744 1492 xntlxj.exe 44 PID 1492 wrote to memory of 1744 1492 xntlxj.exe 44 PID 1492 wrote to memory of 1744 1492 xntlxj.exe 44 PID 1744 wrote to memory of 472 1744 pnnxd.exe 45 PID 1744 wrote to memory of 472 1744 pnnxd.exe 45 PID 1744 wrote to memory of 472 1744 pnnxd.exe 45 PID 1744 wrote to memory of 472 1744 pnnxd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe"C:\Users\Admin\AppData\Local\Temp\744c0547c80d08f578001c3442eac16a7e76ca1c3e2210b5324443379d1d5b1d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\ljtbljt.exec:\ljtbljt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\htfffxl.exec:\htfffxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\brxjjln.exec:\brxjjln.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\hlvltb.exec:\hlvltb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\jjjrn.exec:\jjjrn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\xdrbhnv.exec:\xdrbhnv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\ldpbll.exec:\ldpbll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\dbnrlv.exec:\dbnrlv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\jhljb.exec:\jhljb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
\??\c:\fbnnhr.exec:\fbnnhr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\nxnrtt.exec:\nxnrtt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\ppbhd.exec:\ppbhd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\jvlbrf.exec:\jvlbrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\xntlxj.exec:\xntlxj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
\??\c:\pnnxd.exec:\pnnxd.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\rhjtjf.exec:\rhjtjf.exe17⤵
- Executes dropped EXE
PID:472 -
\??\c:\btnlpvl.exec:\btnlpvl.exe18⤵
- Executes dropped EXE
PID:2184 -
\??\c:\xrblbjt.exec:\xrblbjt.exe19⤵
- Executes dropped EXE
PID:2388 -
\??\c:\pxbxjdd.exec:\pxbxjdd.exe20⤵
- Executes dropped EXE
PID:2192 -
\??\c:\vdfblvd.exec:\vdfblvd.exe21⤵
- Executes dropped EXE
PID:1964 -
\??\c:\fntnp.exec:\fntnp.exe22⤵
- Executes dropped EXE
PID:1792 -
\??\c:\dfddn.exec:\dfddn.exe23⤵
- Executes dropped EXE
PID:2536 -
\??\c:\pxxpx.exec:\pxxpx.exe24⤵
- Executes dropped EXE
PID:900 -
\??\c:\xrvtnxv.exec:\xrvtnxv.exe25⤵
- Executes dropped EXE
PID:1724 -
\??\c:\xbrpvbh.exec:\xbrpvbh.exe26⤵
- Executes dropped EXE
PID:1476 -
\??\c:\jhpphp.exec:\jhpphp.exe27⤵
- Executes dropped EXE
PID:1288 -
\??\c:\rvrhb.exec:\rvrhb.exe28⤵
- Executes dropped EXE
PID:940 -
\??\c:\hrbrl.exec:\hrbrl.exe29⤵
- Executes dropped EXE
PID:2580 -
\??\c:\vtlfj.exec:\vtlfj.exe30⤵
- Executes dropped EXE
PID:1072 -
\??\c:\nxxddtl.exec:\nxxddtl.exe31⤵
- Executes dropped EXE
PID:2280 -
\??\c:\bhddbnv.exec:\bhddbnv.exe32⤵
- Executes dropped EXE
PID:1712 -
\??\c:\bjvblb.exec:\bjvblb.exe33⤵
- Executes dropped EXE
PID:2164 -
\??\c:\pltfbll.exec:\pltfbll.exe34⤵
- Executes dropped EXE
PID:2876 -
\??\c:\dndvx.exec:\dndvx.exe35⤵
- Executes dropped EXE
PID:2836 -
\??\c:\ldbfjbj.exec:\ldbfjbj.exe36⤵
- Executes dropped EXE
PID:1552 -
\??\c:\pfxhnhx.exec:\pfxhnhx.exe37⤵
- Executes dropped EXE
PID:1668 -
\??\c:\xblnjfr.exec:\xblnjfr.exe38⤵
- Executes dropped EXE
PID:2068 -
\??\c:\pphbnth.exec:\pphbnth.exe39⤵
- Executes dropped EXE
PID:2952 -
\??\c:\nvnvbbv.exec:\nvnvbbv.exe40⤵
- Executes dropped EXE
PID:2748 -
\??\c:\jllrl.exec:\jllrl.exe41⤵
- Executes dropped EXE
PID:2712 -
\??\c:\pfjpvjn.exec:\pfjpvjn.exe42⤵
- Executes dropped EXE
PID:2168 -
\??\c:\pnvdh.exec:\pnvdh.exe43⤵
- Executes dropped EXE
PID:2708 -
\??\c:\tvpdh.exec:\tvpdh.exe44⤵
- Executes dropped EXE
PID:2548 -
\??\c:\ptjbxp.exec:\ptjbxp.exe45⤵
- Executes dropped EXE
PID:2596 -
\??\c:\fjxpbx.exec:\fjxpbx.exe46⤵
- Executes dropped EXE
PID:2256 -
\??\c:\fxrfphr.exec:\fxrfphr.exe47⤵
- Executes dropped EXE
PID:1016 -
\??\c:\vbjrjv.exec:\vbjrjv.exe48⤵
- Executes dropped EXE
PID:2964 -
\??\c:\hfjnht.exec:\hfjnht.exe49⤵
- Executes dropped EXE
PID:2924 -
\??\c:\bxjbvj.exec:\bxjbvj.exe50⤵
- Executes dropped EXE
PID:2260 -
\??\c:\njjpvd.exec:\njjpvd.exe51⤵
- Executes dropped EXE
PID:1640 -
\??\c:\pfjjhh.exec:\pfjjhh.exe52⤵
- Executes dropped EXE
PID:2972 -
\??\c:\frlvlnf.exec:\frlvlnf.exe53⤵
- Executes dropped EXE
PID:2396 -
\??\c:\hjfvxhx.exec:\hjfvxhx.exe54⤵
- Executes dropped EXE
PID:2984 -
\??\c:\hnvfth.exec:\hnvfth.exe55⤵
- Executes dropped EXE
PID:1092 -
\??\c:\jhbdt.exec:\jhbdt.exe56⤵
- Executes dropped EXE
PID:2248 -
\??\c:\xprff.exec:\xprff.exe57⤵
- Executes dropped EXE
PID:2104 -
\??\c:\lbpft.exec:\lbpft.exe58⤵
- Executes dropped EXE
PID:2452 -
\??\c:\nnpnxxv.exec:\nnpnxxv.exe59⤵
- Executes dropped EXE
PID:2160 -
\??\c:\rddjl.exec:\rddjl.exe60⤵
- Executes dropped EXE
PID:2076 -
\??\c:\hxxhth.exec:\hxxhth.exe61⤵
- Executes dropped EXE
PID:984 -
\??\c:\rbbbrv.exec:\rbbbrv.exe62⤵
- Executes dropped EXE
PID:2132 -
\??\c:\pfphlb.exec:\pfphlb.exe63⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jbxxt.exec:\jbxxt.exe64⤵
- Executes dropped EXE
PID:1608 -
\??\c:\txtpdt.exec:\txtpdt.exe65⤵
- Executes dropped EXE
PID:1800 -
\??\c:\nxpht.exec:\nxpht.exe66⤵PID:1728
-
\??\c:\vjhrj.exec:\vjhrj.exe67⤵
- System Location Discovery: System Language Discovery
PID:2236 -
\??\c:\phlrbrl.exec:\phlrbrl.exe68⤵PID:1656
-
\??\c:\rnlxvpd.exec:\rnlxvpd.exe69⤵PID:1020
-
\??\c:\xjnlnv.exec:\xjnlnv.exe70⤵PID:2528
-
\??\c:\bdbtfnt.exec:\bdbtfnt.exe71⤵PID:2580
-
\??\c:\jhhrv.exec:\jhhrv.exe72⤵PID:1248
-
\??\c:\tdhnnpx.exec:\tdhnnpx.exe73⤵PID:580
-
\??\c:\pxrhtxb.exec:\pxrhtxb.exe74⤵PID:1876
-
\??\c:\xftlp.exec:\xftlp.exe75⤵PID:2512
-
\??\c:\vtfjxxj.exec:\vtfjxxj.exe76⤵PID:1676
-
\??\c:\dpjlb.exec:\dpjlb.exe77⤵PID:2896
-
\??\c:\ddxhx.exec:\ddxhx.exe78⤵
- System Location Discovery: System Language Discovery
PID:2744 -
\??\c:\nxxvhf.exec:\nxxvhf.exe79⤵PID:2060
-
\??\c:\xxhvd.exec:\xxhvd.exe80⤵PID:2828
-
\??\c:\pnhhvp.exec:\pnhhvp.exe81⤵PID:2752
-
\??\c:\nrjppnt.exec:\nrjppnt.exe82⤵PID:2068
-
\??\c:\hvxfvx.exec:\hvxfvx.exe83⤵PID:2948
-
\??\c:\lvrbrb.exec:\lvrbrb.exe84⤵PID:2632
-
\??\c:\xxrld.exec:\xxrld.exe85⤵PID:2340
-
\??\c:\hdrvfnn.exec:\hdrvfnn.exe86⤵PID:2168
-
\??\c:\ntjtxln.exec:\ntjtxln.exe87⤵PID:2472
-
\??\c:\bnhndbx.exec:\bnhndbx.exe88⤵PID:2548
-
\??\c:\vhtdfxl.exec:\vhtdfxl.exe89⤵PID:1588
-
\??\c:\bhttbh.exec:\bhttbh.exe90⤵PID:2704
-
\??\c:\bdhfb.exec:\bdhfb.exe91⤵PID:2944
-
\??\c:\pnlpvp.exec:\pnlpvp.exe92⤵PID:1616
-
\??\c:\jxjxv.exec:\jxjxv.exe93⤵PID:2812
-
\??\c:\prxpn.exec:\prxpn.exe94⤵PID:2260
-
\??\c:\txhnfx.exec:\txhnfx.exe95⤵PID:2992
-
\??\c:\fxjplb.exec:\fxjplb.exe96⤵PID:1148
-
\??\c:\pdvnfl.exec:\pdvnfl.exe97⤵PID:524
-
\??\c:\xpphnrf.exec:\xpphnrf.exe98⤵PID:2348
-
\??\c:\xvtxhtx.exec:\xvtxhtx.exe99⤵PID:1740
-
\??\c:\dpthx.exec:\dpthx.exe100⤵PID:2392
-
\??\c:\hprhtb.exec:\hprhtb.exe101⤵PID:2936
-
\??\c:\vtrlf.exec:\vtrlf.exe102⤵
- System Location Discovery: System Language Discovery
PID:1896 -
\??\c:\nhvbpf.exec:\nhvbpf.exe103⤵PID:2108
-
\??\c:\jntrvbj.exec:\jntrvbj.exe104⤵PID:632
-
\??\c:\xvptjr.exec:\xvptjr.exe105⤵PID:2400
-
\??\c:\dfphv.exec:\dfphv.exe106⤵PID:1028
-
\??\c:\xtdvfp.exec:\xtdvfp.exe107⤵PID:784
-
\??\c:\lvtvf.exec:\lvtvf.exe108⤵PID:2468
-
\??\c:\vjfxh.exec:\vjfxh.exe109⤵PID:1256
-
\??\c:\hvjhl.exec:\hvjhl.exe110⤵PID:852
-
\??\c:\ldtbx.exec:\ldtbx.exe111⤵PID:288
-
\??\c:\bxjhfl.exec:\bxjhfl.exe112⤵PID:1532
-
\??\c:\dbvhdr.exec:\dbvhdr.exe113⤵PID:1020
-
\??\c:\nvprjxh.exec:\nvprjxh.exe114⤵PID:1908
-
\??\c:\htpfl.exec:\htpfl.exe115⤵PID:1884
-
\??\c:\jxvjn.exec:\jxvjn.exe116⤵
- System Location Discovery: System Language Discovery
PID:1248 -
\??\c:\rdfxtvf.exec:\rdfxtvf.exe117⤵PID:2424
-
\??\c:\dprvjn.exec:\dprvjn.exe118⤵PID:1712
-
\??\c:\njrrn.exec:\njrrn.exe119⤵PID:2860
-
\??\c:\nnttbr.exec:\nnttbr.exe120⤵PID:1676
-
\??\c:\fthdrnh.exec:\fthdrnh.exe121⤵PID:2760
-
\??\c:\lvdhvtl.exec:\lvdhvtl.exe122⤵PID:1584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-