Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 20:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe
-
Size
456KB
-
MD5
430385f6b0cea96bc323579154a00ea2
-
SHA1
b15c50045353994d20d587a371f953cf4b69cba9
-
SHA256
0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8
-
SHA512
77a95e43f7ae3048eae4794f81d1cdc5ac9ea2ede0defe8db78432c3990a48365079b8b26753de1060d46d2db826ad280dab503fcd0a3cabbb007084f1874926
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRx:q7Tc2NYHUrAwfMp3CDRx
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 44 IoCs
resource yara_rule behavioral1/memory/2056-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2328-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2868-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2992-38-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2752-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2428-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2744-76-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/964-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2396-95-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2396-96-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/968-104-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/2356-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2396-126-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2172-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2612-135-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2336-145-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2664-153-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3028-162-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/3028-164-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1280-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2280-189-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2108-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/900-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2152-225-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/400-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2700-243-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/928-273-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2916-330-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/2780-359-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2976-358-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/2428-357-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/964-393-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2792-400-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2468-438-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2636-445-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3032-453-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/3032-454-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1016-553-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2724-655-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2744-689-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/2536-692-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2200-770-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/804-849-0x0000000001C80000-0x0000000001CAA000-memory.dmp family_blackmoon behavioral1/memory/2288-877-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2056 fnnppp.exe 2868 vbxhfr.exe 2992 ltxdlhn.exe 2428 bfjjjrh.exe 2752 dldhbd.exe 2892 tvbvxbx.exe 2744 vjflt.exe 964 fjjptb.exe 2396 tptxl.exe 968 pttnljd.exe 2356 hdtbvp.exe 2172 ffnfx.exe 2612 fnttd.exe 2336 htxrld.exe 2664 vlbpfl.exe 3028 jvlhv.exe 1824 jjrfb.exe 1280 ttbdllx.exe 2280 tdrpxx.exe 2108 njrxj.exe 900 fjphnhp.exe 524 bpvtf.exe 2152 jttfhd.exe 400 lrdrr.exe 2700 hvddh.exe 1912 jbbnh.exe 2024 hvxrpfn.exe 1656 xvbxtvv.exe 928 npllnp.exe 816 dxvxttx.exe 944 ltfbtx.exe 872 fdphtn.exe 3008 vtxdp.exe 1580 hhxvrbx.exe 792 hjljr.exe 2916 nfhhtjb.exe 2976 lnnblrp.exe 2852 xjdjxh.exe 2312 trtdtrj.exe 2428 vhbvnvt.exe 2780 fxhxv.exe 2900 pnplj.exe 2792 tppjft.exe 540 vndvxx.exe 964 fjtdh.exe 2824 djnldrf.exe 1620 lpvnlpd.exe 1264 fxdlbt.exe 2168 bhnvxb.exe 2552 hblhvd.exe 3016 xtfnx.exe 2468 bfxdbvt.exe 2636 ffdnldx.exe 3032 bnlnrnr.exe 1224 thrbf.exe 2276 xnnnhx.exe 1824 rrpxf.exe 1280 jjjddpl.exe 2644 pplxrnp.exe 112 xnbtj.exe 1148 xvbjppb.exe 1284 xbpxfdl.exe 1792 thtvtlt.exe 948 vxdpv.exe -
resource yara_rule behavioral1/memory/2056-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2328-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2868-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-38-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2752-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2428-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2744-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/964-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2396-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2356-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2356-111-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/2612-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2172-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2612-135-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2336-145-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2664-153-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3028-164-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1280-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2280-189-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2108-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/900-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/900-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2152-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/400-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2700-243-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/928-273-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2780-359-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2428-357-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/964-393-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2468-438-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2636-445-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3032-454-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1824-468-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2644-483-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/948-515-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2724-655-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2200-770-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1912-823-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/804-844-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2288-877-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2920-932-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbrjrhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfhdblt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdxhpxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbnnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffbnll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvxftnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxtpbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btxxjjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvtffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hltll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndjhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvdbvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfpjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdbvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjxfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drlnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldnhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvnxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnpnfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvrvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lntvrdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpdlbtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfrvxdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxddr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrdrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrppr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdrnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtxhdlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlrphpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jthxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxpbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vntpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjphnhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jldpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnptnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnhxbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlltnbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrpfhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbrtlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thjtfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhfxnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtrfdfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2056 2328 0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe 29 PID 2328 wrote to memory of 2056 2328 0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe 29 PID 2328 wrote to memory of 2056 2328 0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe 29 PID 2328 wrote to memory of 2056 2328 0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe 29 PID 2056 wrote to memory of 2868 2056 fnnppp.exe 30 PID 2056 wrote to memory of 2868 2056 fnnppp.exe 30 PID 2056 wrote to memory of 2868 2056 fnnppp.exe 30 PID 2056 wrote to memory of 2868 2056 fnnppp.exe 30 PID 2868 wrote to memory of 2992 2868 vbxhfr.exe 31 PID 2868 wrote to memory of 2992 2868 vbxhfr.exe 31 PID 2868 wrote to memory of 2992 2868 vbxhfr.exe 31 PID 2868 wrote to memory of 2992 2868 vbxhfr.exe 31 PID 2992 wrote to memory of 2428 2992 ltxdlhn.exe 32 PID 2992 wrote to memory of 2428 2992 ltxdlhn.exe 32 PID 2992 wrote to memory of 2428 2992 ltxdlhn.exe 32 PID 2992 wrote to memory of 2428 2992 ltxdlhn.exe 32 PID 2428 wrote to memory of 2752 2428 bfjjjrh.exe 33 PID 2428 wrote to memory of 2752 2428 bfjjjrh.exe 33 PID 2428 wrote to memory of 2752 2428 bfjjjrh.exe 33 PID 2428 wrote to memory of 2752 2428 bfjjjrh.exe 33 PID 2752 wrote to memory of 2892 2752 dldhbd.exe 34 PID 2752 wrote to memory of 2892 2752 dldhbd.exe 34 PID 2752 wrote to memory of 2892 2752 dldhbd.exe 34 PID 2752 wrote to memory of 2892 2752 dldhbd.exe 34 PID 2892 wrote to memory of 2744 2892 tvbvxbx.exe 35 PID 2892 wrote to memory of 2744 2892 tvbvxbx.exe 35 PID 2892 wrote to memory of 2744 2892 tvbvxbx.exe 35 PID 2892 wrote to memory of 2744 2892 tvbvxbx.exe 35 PID 2744 wrote to memory of 964 2744 vjflt.exe 36 PID 2744 wrote to memory of 964 2744 vjflt.exe 36 PID 2744 wrote to memory of 964 2744 vjflt.exe 36 PID 2744 wrote to memory of 964 2744 vjflt.exe 36 PID 964 wrote to memory of 2396 964 fjjptb.exe 37 PID 964 wrote to memory of 2396 964 fjjptb.exe 37 PID 964 wrote to memory of 2396 964 fjjptb.exe 37 PID 964 wrote to memory of 2396 964 fjjptb.exe 37 PID 2396 wrote to memory of 968 2396 tptxl.exe 38 PID 2396 wrote to memory of 968 2396 tptxl.exe 38 PID 2396 wrote to memory of 968 2396 tptxl.exe 38 PID 2396 wrote to memory of 968 2396 tptxl.exe 38 PID 968 wrote to memory of 2356 968 pttnljd.exe 39 PID 968 wrote to memory of 2356 968 pttnljd.exe 39 PID 968 wrote to memory of 2356 968 pttnljd.exe 39 PID 968 wrote to memory of 2356 968 pttnljd.exe 39 PID 2356 wrote to memory of 2172 2356 hdtbvp.exe 40 PID 2356 wrote to memory of 2172 2356 hdtbvp.exe 40 PID 2356 wrote to memory of 2172 2356 hdtbvp.exe 40 PID 2356 wrote to memory of 2172 2356 hdtbvp.exe 40 PID 2172 wrote to memory of 2612 2172 ffnfx.exe 41 PID 2172 wrote to memory of 2612 2172 ffnfx.exe 41 PID 2172 wrote to memory of 2612 2172 ffnfx.exe 41 PID 2172 wrote to memory of 2612 2172 ffnfx.exe 41 PID 2612 wrote to memory of 2336 2612 fnttd.exe 42 PID 2612 wrote to memory of 2336 2612 fnttd.exe 42 PID 2612 wrote to memory of 2336 2612 fnttd.exe 42 PID 2612 wrote to memory of 2336 2612 fnttd.exe 42 PID 2336 wrote to memory of 2664 2336 htxrld.exe 43 PID 2336 wrote to memory of 2664 2336 htxrld.exe 43 PID 2336 wrote to memory of 2664 2336 htxrld.exe 43 PID 2336 wrote to memory of 2664 2336 htxrld.exe 43 PID 2664 wrote to memory of 3028 2664 vlbpfl.exe 44 PID 2664 wrote to memory of 3028 2664 vlbpfl.exe 44 PID 2664 wrote to memory of 3028 2664 vlbpfl.exe 44 PID 2664 wrote to memory of 3028 2664 vlbpfl.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe"C:\Users\Admin\AppData\Local\Temp\0001a7ab06c7f4148eece5a72f3564b7b843d07856e1c9262a6ff504c2e50fb8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\fnnppp.exec:\fnnppp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\vbxhfr.exec:\vbxhfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\ltxdlhn.exec:\ltxdlhn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\bfjjjrh.exec:\bfjjjrh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\dldhbd.exec:\dldhbd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\tvbvxbx.exec:\tvbvxbx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\vjflt.exec:\vjflt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\fjjptb.exec:\fjjptb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\tptxl.exec:\tptxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\pttnljd.exec:\pttnljd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\hdtbvp.exec:\hdtbvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\ffnfx.exec:\ffnfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\fnttd.exec:\fnttd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\htxrld.exec:\htxrld.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\vlbpfl.exec:\vlbpfl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\jvlhv.exec:\jvlhv.exe17⤵
- Executes dropped EXE
PID:3028 -
\??\c:\jjrfb.exec:\jjrfb.exe18⤵
- Executes dropped EXE
PID:1824 -
\??\c:\ttbdllx.exec:\ttbdllx.exe19⤵
- Executes dropped EXE
PID:1280 -
\??\c:\tdrpxx.exec:\tdrpxx.exe20⤵
- Executes dropped EXE
PID:2280 -
\??\c:\njrxj.exec:\njrxj.exe21⤵
- Executes dropped EXE
PID:2108 -
\??\c:\fjphnhp.exec:\fjphnhp.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:900 -
\??\c:\bpvtf.exec:\bpvtf.exe23⤵
- Executes dropped EXE
PID:524 -
\??\c:\jttfhd.exec:\jttfhd.exe24⤵
- Executes dropped EXE
PID:2152 -
\??\c:\lrdrr.exec:\lrdrr.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:400 -
\??\c:\hvddh.exec:\hvddh.exe26⤵
- Executes dropped EXE
PID:2700 -
\??\c:\jbbnh.exec:\jbbnh.exe27⤵
- Executes dropped EXE
PID:1912 -
\??\c:\hvxrpfn.exec:\hvxrpfn.exe28⤵
- Executes dropped EXE
PID:2024 -
\??\c:\xvbxtvv.exec:\xvbxtvv.exe29⤵
- Executes dropped EXE
PID:1656 -
\??\c:\npllnp.exec:\npllnp.exe30⤵
- Executes dropped EXE
PID:928 -
\??\c:\dxvxttx.exec:\dxvxttx.exe31⤵
- Executes dropped EXE
PID:816 -
\??\c:\ltfbtx.exec:\ltfbtx.exe32⤵
- Executes dropped EXE
PID:944 -
\??\c:\fdphtn.exec:\fdphtn.exe33⤵
- Executes dropped EXE
PID:872 -
\??\c:\vtxdp.exec:\vtxdp.exe34⤵
- Executes dropped EXE
PID:3008 -
\??\c:\hhxvrbx.exec:\hhxvrbx.exe35⤵
- Executes dropped EXE
PID:1580 -
\??\c:\hjljr.exec:\hjljr.exe36⤵
- Executes dropped EXE
PID:792 -
\??\c:\nfhhtjb.exec:\nfhhtjb.exe37⤵
- Executes dropped EXE
PID:2916 -
\??\c:\lnnblrp.exec:\lnnblrp.exe38⤵
- Executes dropped EXE
PID:2976 -
\??\c:\xjdjxh.exec:\xjdjxh.exe39⤵
- Executes dropped EXE
PID:2852 -
\??\c:\trtdtrj.exec:\trtdtrj.exe40⤵
- Executes dropped EXE
PID:2312 -
\??\c:\vhbvnvt.exec:\vhbvnvt.exe41⤵
- Executes dropped EXE
PID:2428 -
\??\c:\fxhxv.exec:\fxhxv.exe42⤵
- Executes dropped EXE
PID:2780 -
\??\c:\pnplj.exec:\pnplj.exe43⤵
- Executes dropped EXE
PID:2900 -
\??\c:\tppjft.exec:\tppjft.exe44⤵
- Executes dropped EXE
PID:2792 -
\??\c:\vndvxx.exec:\vndvxx.exe45⤵
- Executes dropped EXE
PID:540 -
\??\c:\fjtdh.exec:\fjtdh.exe46⤵
- Executes dropped EXE
PID:964 -
\??\c:\djnldrf.exec:\djnldrf.exe47⤵
- Executes dropped EXE
PID:2824 -
\??\c:\lpvnlpd.exec:\lpvnlpd.exe48⤵
- Executes dropped EXE
PID:1620 -
\??\c:\fxdlbt.exec:\fxdlbt.exe49⤵
- Executes dropped EXE
PID:1264 -
\??\c:\bhnvxb.exec:\bhnvxb.exe50⤵
- Executes dropped EXE
PID:2168 -
\??\c:\hblhvd.exec:\hblhvd.exe51⤵
- Executes dropped EXE
PID:2552 -
\??\c:\xtfnx.exec:\xtfnx.exe52⤵
- Executes dropped EXE
PID:3016 -
\??\c:\bfxdbvt.exec:\bfxdbvt.exe53⤵
- Executes dropped EXE
PID:2468 -
\??\c:\ffdnldx.exec:\ffdnldx.exe54⤵
- Executes dropped EXE
PID:2636 -
\??\c:\bnlnrnr.exec:\bnlnrnr.exe55⤵
- Executes dropped EXE
PID:3032 -
\??\c:\thrbf.exec:\thrbf.exe56⤵
- Executes dropped EXE
PID:1224 -
\??\c:\xnnnhx.exec:\xnnnhx.exe57⤵
- Executes dropped EXE
PID:2276 -
\??\c:\rrpxf.exec:\rrpxf.exe58⤵
- Executes dropped EXE
PID:1824 -
\??\c:\jjjddpl.exec:\jjjddpl.exe59⤵
- Executes dropped EXE
PID:1280 -
\??\c:\pplxrnp.exec:\pplxrnp.exe60⤵
- Executes dropped EXE
PID:2644 -
\??\c:\xnbtj.exec:\xnbtj.exe61⤵
- Executes dropped EXE
PID:112 -
\??\c:\xvbjppb.exec:\xvbjppb.exe62⤵
- Executes dropped EXE
PID:1148 -
\??\c:\xbpxfdl.exec:\xbpxfdl.exe63⤵
- Executes dropped EXE
PID:1284 -
\??\c:\thtvtlt.exec:\thtvtlt.exe64⤵
- Executes dropped EXE
PID:1792 -
\??\c:\vxdpv.exec:\vxdpv.exe65⤵
- Executes dropped EXE
PID:948 -
\??\c:\rhbjxn.exec:\rhbjxn.exe66⤵PID:2324
-
\??\c:\hjdhvp.exec:\hjdhvp.exe67⤵PID:1532
-
\??\c:\drjhjn.exec:\drjhjn.exe68⤵PID:2700
-
\??\c:\thtfx.exec:\thtfx.exe69⤵PID:1008
-
\??\c:\fjhflb.exec:\fjhflb.exe70⤵PID:1016
-
\??\c:\vfllhdp.exec:\vfllhdp.exe71⤵PID:1992
-
\??\c:\hdvpx.exec:\hdvpx.exe72⤵PID:432
-
\??\c:\fhhnljt.exec:\fhhnljt.exe73⤵PID:928
-
\??\c:\vhbxlnj.exec:\vhbxlnj.exe74⤵PID:2100
-
\??\c:\rppvftl.exec:\rppvftl.exe75⤵PID:2148
-
\??\c:\xvtdppb.exec:\xvtdppb.exe76⤵PID:2264
-
\??\c:\bphfl.exec:\bphfl.exe77⤵PID:1408
-
\??\c:\bbbjnv.exec:\bbbjnv.exe78⤵PID:1820
-
\??\c:\xfpfdd.exec:\xfpfdd.exe79⤵PID:2504
-
\??\c:\vvphbtl.exec:\vvphbtl.exe80⤵PID:2956
-
\??\c:\rtbdhv.exec:\rtbdhv.exe81⤵PID:2880
-
\??\c:\hfnxh.exec:\hfnxh.exe82⤵PID:2332
-
\??\c:\njnhhp.exec:\njnhhp.exe83⤵PID:2860
-
\??\c:\fvjjlvl.exec:\fvjjlvl.exe84⤵PID:2312
-
\??\c:\jvdfrr.exec:\jvdfrr.exe85⤵
- System Location Discovery: System Language Discovery
PID:2440 -
\??\c:\ddhfnf.exec:\ddhfnf.exe86⤵PID:2724
-
\??\c:\hfbvlj.exec:\hfbvlj.exe87⤵PID:2892
-
\??\c:\tvhtb.exec:\tvhtb.exe88⤵PID:2744
-
\??\c:\xfplbr.exec:\xfplbr.exe89⤵PID:1300
-
\??\c:\pnxbvvd.exec:\pnxbvvd.exe90⤵PID:2236
-
\??\c:\xfpff.exec:\xfpff.exe91⤵PID:1352
-
\??\c:\jpbnrlv.exec:\jpbnrlv.exe92⤵PID:2536
-
\??\c:\bhlhvt.exec:\bhlhvt.exe93⤵PID:3060
-
\??\c:\plbhvl.exec:\plbhvl.exe94⤵PID:2600
-
\??\c:\vvhth.exec:\vvhth.exe95⤵PID:2192
-
\??\c:\jldpf.exec:\jldpf.exe96⤵
- System Location Discovery: System Language Discovery
PID:2300 -
\??\c:\hntdj.exec:\hntdj.exe97⤵PID:2416
-
\??\c:\jptrr.exec:\jptrr.exe98⤵PID:2212
-
\??\c:\nhxpl.exec:\nhxpl.exe99⤵PID:888
-
\??\c:\hdvjnnl.exec:\hdvjnnl.exe100⤵PID:3028
-
\??\c:\trlfb.exec:\trlfb.exe101⤵PID:1224
-
\??\c:\bbvldnt.exec:\bbvldnt.exe102⤵PID:2276
-
\??\c:\xrhlhb.exec:\xrhlhb.exe103⤵PID:2104
-
\??\c:\jfjpth.exec:\jfjpth.exe104⤵PID:2200
-
\??\c:\rtfln.exec:\rtfln.exe105⤵PID:2524
-
\??\c:\xhddp.exec:\xhddp.exe106⤵PID:824
-
\??\c:\nlxtdp.exec:\nlxtdp.exe107⤵PID:2520
-
\??\c:\vlphjjd.exec:\vlphjjd.exe108⤵PID:1796
-
\??\c:\nhvbt.exec:\nhvbt.exe109⤵PID:1868
-
\??\c:\hnrnplp.exec:\hnrnplp.exe110⤵PID:1052
-
\??\c:\vhbffrf.exec:\vhbffrf.exe111⤵PID:1780
-
\??\c:\djnrnbx.exec:\djnrnbx.exe112⤵PID:1688
-
\??\c:\pjxxrh.exec:\pjxxrh.exe113⤵PID:1912
-
\??\c:\xlbxhn.exec:\xlbxhn.exe114⤵PID:592
-
\??\c:\jnlhtv.exec:\jnlhtv.exe115⤵PID:2024
-
\??\c:\rtrfdx.exec:\rtrfdx.exe116⤵PID:804
-
\??\c:\llphlt.exec:\llphlt.exe117⤵PID:1040
-
\??\c:\nxddxrx.exec:\nxddxrx.exe118⤵PID:928
-
\??\c:\bhnxj.exec:\bhnxj.exe119⤵PID:2100
-
\??\c:\ffxntt.exec:\ffxntt.exe120⤵PID:2288
-
\??\c:\rrxjd.exec:\rrxjd.exe121⤵PID:1860
-
\??\c:\lndbrt.exec:\lndbrt.exe122⤵PID:1408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-