Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 21:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe
-
Size
453KB
-
MD5
9c1fecad1cd23ea84cb2db7703cc25d6
-
SHA1
489b3363c7edf4d7873f434238f49f1a6906d5d4
-
SHA256
e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5
-
SHA512
237b8364eed706af30327e7325d0161a77ce08dbecc64055175a20c763d63ea0d48e4a01d2fd9bf3298b90db90cf6acf11dda1186f191b22a7c028767a2b1c75
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbea:q7Tc2NYHUrAwfMp3CDa
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 45 IoCs
resource yara_rule behavioral1/memory/3048-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2528-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2912-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3012-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/568-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3060-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2884-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2564-72-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/644-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1836-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1992-105-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1992-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/572-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1956-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1928-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2368-147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/284-165-0x0000000000430000-0x000000000045A000-memory.dmp family_blackmoon behavioral1/memory/284-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1524-185-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2440-204-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2068-211-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2004-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/816-280-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/816-279-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2568-313-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2864-320-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1612-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3036-336-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/568-355-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1392-410-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1952-425-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/580-456-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2412-470-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2412-469-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2060-552-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2076-610-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/568-641-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/2540-654-0x00000000002A0000-0x00000000002CA000-memory.dmp family_blackmoon behavioral1/memory/1800-752-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/1168-847-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/3016-930-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2700-973-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/2700-994-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/2444-1061-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1648-1101-0x0000000000330000-0x000000000035A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3048 jddxlxv.exe 2912 hxpfj.exe 3012 jjffj.exe 568 vlrjxt.exe 3060 tlrjf.exe 2884 vvnrrrv.exe 2564 jhnhvh.exe 644 txxflx.exe 1836 dlvjhfd.exe 1992 xvvxxbd.exe 572 vdpld.exe 1928 bbhbvn.exe 1956 tdxtbhp.exe 2368 rvnht.exe 2300 vbbfxlr.exe 284 lvlbn.exe 2036 xvppr.exe 1524 xvfhpd.exe 2148 tvtdnp.exe 2440 pnvhf.exe 2068 tdrvlnh.exe 840 jtjpb.exe 2004 nltvd.exe 1208 xfpdp.exe 1492 vhnrt.exe 2600 vxvfjdb.exe 2060 vbnvf.exe 1436 rnvbrf.exe 816 bbfdxnf.exe 1752 hnvbdfp.exe 1036 rjtvh.exe 2560 fbljxv.exe 2568 dppxtn.exe 2864 pbrndp.exe 1612 jjrdn.exe 3036 bdtjvbj.exe 2980 rdbxxtj.exe 2932 tdfhxt.exe 568 jpjxhbr.exe 3060 rnbxhx.exe 2756 prtrbv.exe 2884 ddpnbx.exe 2508 ljbbvx.exe 2424 nbfbv.exe 2456 lpjlhff.exe 1472 ddntv.exe 1920 rdjbj.exe 1392 fvtpb.exe 2276 bpblnr.exe 1952 btpdjh.exe 2960 bxbjhbb.exe 1412 ftfbt.exe 2448 nxfxdx.exe 696 xpnpprx.exe 580 bffxttx.exe 2184 vdllbbh.exe 2412 rnjptrx.exe 2432 xbtnh.exe 2260 tnrjd.exe 2196 xjnbhnd.exe 892 xjnnxt.exe 1596 xpfdb.exe 2068 ttvplx.exe 1348 vrxfjx.exe -
resource yara_rule behavioral1/memory/3048-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2528-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2912-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/568-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3060-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2884-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/644-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/644-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1836-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1992-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1928-120-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/572-118-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1956-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1928-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2368-147-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/284-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1524-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1524-185-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2440-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2068-211-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2004-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/816-280-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/816-279-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/2568-306-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2568-313-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2864-320-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1612-326-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1612-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3036-336-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/568-355-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1392-410-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1952-417-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1952-425-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/580-456-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2412-463-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2412-469-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2060-552-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2032-615-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2212-706-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1820-772-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1204-779-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3016-930-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1868-1086-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbdbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxrvdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlpjhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plxtrjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfbxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljrnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbrtbjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpbptr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxbnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvxbbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blpvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htfvjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdppr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njlvhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpxjtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhjlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tprxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bflxhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjnfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxprhjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjtvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppxtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnpxrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjfnttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbljhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdpfnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfrvxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrjpxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnjrrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbhbtpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtjpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbrbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lppnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfdrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnpnpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdhhxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbfbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfdxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxpfpjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbvbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjrnpbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3048 2528 e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe 30 PID 2528 wrote to memory of 3048 2528 e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe 30 PID 2528 wrote to memory of 3048 2528 e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe 30 PID 2528 wrote to memory of 3048 2528 e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe 30 PID 3048 wrote to memory of 2912 3048 jddxlxv.exe 31 PID 3048 wrote to memory of 2912 3048 jddxlxv.exe 31 PID 3048 wrote to memory of 2912 3048 jddxlxv.exe 31 PID 3048 wrote to memory of 2912 3048 jddxlxv.exe 31 PID 2912 wrote to memory of 3012 2912 hxpfj.exe 32 PID 2912 wrote to memory of 3012 2912 hxpfj.exe 32 PID 2912 wrote to memory of 3012 2912 hxpfj.exe 32 PID 2912 wrote to memory of 3012 2912 hxpfj.exe 32 PID 3012 wrote to memory of 568 3012 jjffj.exe 33 PID 3012 wrote to memory of 568 3012 jjffj.exe 33 PID 3012 wrote to memory of 568 3012 jjffj.exe 33 PID 3012 wrote to memory of 568 3012 jjffj.exe 33 PID 568 wrote to memory of 3060 568 vlrjxt.exe 34 PID 568 wrote to memory of 3060 568 vlrjxt.exe 34 PID 568 wrote to memory of 3060 568 vlrjxt.exe 34 PID 568 wrote to memory of 3060 568 vlrjxt.exe 34 PID 3060 wrote to memory of 2884 3060 tlrjf.exe 35 PID 3060 wrote to memory of 2884 3060 tlrjf.exe 35 PID 3060 wrote to memory of 2884 3060 tlrjf.exe 35 PID 3060 wrote to memory of 2884 3060 tlrjf.exe 35 PID 2884 wrote to memory of 2564 2884 vvnrrrv.exe 36 PID 2884 wrote to memory of 2564 2884 vvnrrrv.exe 36 PID 2884 wrote to memory of 2564 2884 vvnrrrv.exe 36 PID 2884 wrote to memory of 2564 2884 vvnrrrv.exe 36 PID 2564 wrote to memory of 644 2564 jhnhvh.exe 37 PID 2564 wrote to memory of 644 2564 jhnhvh.exe 37 PID 2564 wrote to memory of 644 2564 jhnhvh.exe 37 PID 2564 wrote to memory of 644 2564 jhnhvh.exe 37 PID 644 wrote to memory of 1836 644 txxflx.exe 38 PID 644 wrote to memory of 1836 644 txxflx.exe 38 PID 644 wrote to memory of 1836 644 txxflx.exe 38 PID 644 wrote to memory of 1836 644 txxflx.exe 38 PID 1836 wrote to memory of 1992 1836 dlvjhfd.exe 39 PID 1836 wrote to memory of 1992 1836 dlvjhfd.exe 39 PID 1836 wrote to memory of 1992 1836 dlvjhfd.exe 39 PID 1836 wrote to memory of 1992 1836 dlvjhfd.exe 39 PID 1992 wrote to memory of 572 1992 xvvxxbd.exe 40 PID 1992 wrote to memory of 572 1992 xvvxxbd.exe 40 PID 1992 wrote to memory of 572 1992 xvvxxbd.exe 40 PID 1992 wrote to memory of 572 1992 xvvxxbd.exe 40 PID 572 wrote to memory of 1928 572 vdpld.exe 41 PID 572 wrote to memory of 1928 572 vdpld.exe 41 PID 572 wrote to memory of 1928 572 vdpld.exe 41 PID 572 wrote to memory of 1928 572 vdpld.exe 41 PID 1928 wrote to memory of 1956 1928 bbhbvn.exe 42 PID 1928 wrote to memory of 1956 1928 bbhbvn.exe 42 PID 1928 wrote to memory of 1956 1928 bbhbvn.exe 42 PID 1928 wrote to memory of 1956 1928 bbhbvn.exe 42 PID 1956 wrote to memory of 2368 1956 tdxtbhp.exe 43 PID 1956 wrote to memory of 2368 1956 tdxtbhp.exe 43 PID 1956 wrote to memory of 2368 1956 tdxtbhp.exe 43 PID 1956 wrote to memory of 2368 1956 tdxtbhp.exe 43 PID 2368 wrote to memory of 2300 2368 rvnht.exe 44 PID 2368 wrote to memory of 2300 2368 rvnht.exe 44 PID 2368 wrote to memory of 2300 2368 rvnht.exe 44 PID 2368 wrote to memory of 2300 2368 rvnht.exe 44 PID 2300 wrote to memory of 284 2300 vbbfxlr.exe 45 PID 2300 wrote to memory of 284 2300 vbbfxlr.exe 45 PID 2300 wrote to memory of 284 2300 vbbfxlr.exe 45 PID 2300 wrote to memory of 284 2300 vbbfxlr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe"C:\Users\Admin\AppData\Local\Temp\e83616065672424b95d05561cfea7f7065abf653769f5a72e332ce4348592ba5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\jddxlxv.exec:\jddxlxv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\hxpfj.exec:\hxpfj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\jjffj.exec:\jjffj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\vlrjxt.exec:\vlrjxt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
\??\c:\tlrjf.exec:\tlrjf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\vvnrrrv.exec:\vvnrrrv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\jhnhvh.exec:\jhnhvh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\txxflx.exec:\txxflx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\dlvjhfd.exec:\dlvjhfd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
\??\c:\xvvxxbd.exec:\xvvxxbd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\vdpld.exec:\vdpld.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\bbhbvn.exec:\bbhbvn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\tdxtbhp.exec:\tdxtbhp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\rvnht.exec:\rvnht.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\vbbfxlr.exec:\vbbfxlr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\lvlbn.exec:\lvlbn.exe17⤵
- Executes dropped EXE
PID:284 -
\??\c:\xvppr.exec:\xvppr.exe18⤵
- Executes dropped EXE
PID:2036 -
\??\c:\xvfhpd.exec:\xvfhpd.exe19⤵
- Executes dropped EXE
PID:1524 -
\??\c:\tvtdnp.exec:\tvtdnp.exe20⤵
- Executes dropped EXE
PID:2148 -
\??\c:\pnvhf.exec:\pnvhf.exe21⤵
- Executes dropped EXE
PID:2440 -
\??\c:\tdrvlnh.exec:\tdrvlnh.exe22⤵
- Executes dropped EXE
PID:2068 -
\??\c:\jtjpb.exec:\jtjpb.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
\??\c:\nltvd.exec:\nltvd.exe24⤵
- Executes dropped EXE
PID:2004 -
\??\c:\xfpdp.exec:\xfpdp.exe25⤵
- Executes dropped EXE
PID:1208 -
\??\c:\vhnrt.exec:\vhnrt.exe26⤵
- Executes dropped EXE
PID:1492 -
\??\c:\vxvfjdb.exec:\vxvfjdb.exe27⤵
- Executes dropped EXE
PID:2600 -
\??\c:\vbnvf.exec:\vbnvf.exe28⤵
- Executes dropped EXE
PID:2060 -
\??\c:\rnvbrf.exec:\rnvbrf.exe29⤵
- Executes dropped EXE
PID:1436 -
\??\c:\bbfdxnf.exec:\bbfdxnf.exe30⤵
- Executes dropped EXE
PID:816 -
\??\c:\hnvbdfp.exec:\hnvbdfp.exe31⤵
- Executes dropped EXE
PID:1752 -
\??\c:\rjtvh.exec:\rjtvh.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036 -
\??\c:\fbljxv.exec:\fbljxv.exe33⤵
- Executes dropped EXE
PID:2560 -
\??\c:\dppxtn.exec:\dppxtn.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568 -
\??\c:\pbrndp.exec:\pbrndp.exe35⤵
- Executes dropped EXE
PID:2864 -
\??\c:\jjrdn.exec:\jjrdn.exe36⤵
- Executes dropped EXE
PID:1612 -
\??\c:\bdtjvbj.exec:\bdtjvbj.exe37⤵
- Executes dropped EXE
PID:3036 -
\??\c:\rdbxxtj.exec:\rdbxxtj.exe38⤵
- Executes dropped EXE
PID:2980 -
\??\c:\tdfhxt.exec:\tdfhxt.exe39⤵
- Executes dropped EXE
PID:2932 -
\??\c:\jpjxhbr.exec:\jpjxhbr.exe40⤵
- Executes dropped EXE
PID:568 -
\??\c:\rnbxhx.exec:\rnbxhx.exe41⤵
- Executes dropped EXE
PID:3060 -
\??\c:\prtrbv.exec:\prtrbv.exe42⤵
- Executes dropped EXE
PID:2756 -
\??\c:\ddpnbx.exec:\ddpnbx.exe43⤵
- Executes dropped EXE
PID:2884 -
\??\c:\ljbbvx.exec:\ljbbvx.exe44⤵
- Executes dropped EXE
PID:2508 -
\??\c:\nbfbv.exec:\nbfbv.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
\??\c:\lpjlhff.exec:\lpjlhff.exe46⤵
- Executes dropped EXE
PID:2456 -
\??\c:\ddntv.exec:\ddntv.exe47⤵
- Executes dropped EXE
PID:1472 -
\??\c:\rdjbj.exec:\rdjbj.exe48⤵
- Executes dropped EXE
PID:1920 -
\??\c:\fvtpb.exec:\fvtpb.exe49⤵
- Executes dropped EXE
PID:1392 -
\??\c:\bpblnr.exec:\bpblnr.exe50⤵
- Executes dropped EXE
PID:2276 -
\??\c:\btpdjh.exec:\btpdjh.exe51⤵
- Executes dropped EXE
PID:1952 -
\??\c:\bxbjhbb.exec:\bxbjhbb.exe52⤵
- Executes dropped EXE
PID:2960 -
\??\c:\ftfbt.exec:\ftfbt.exe53⤵
- Executes dropped EXE
PID:1412 -
\??\c:\nxfxdx.exec:\nxfxdx.exe54⤵
- Executes dropped EXE
PID:2448 -
\??\c:\xpnpprx.exec:\xpnpprx.exe55⤵
- Executes dropped EXE
PID:696 -
\??\c:\bffxttx.exec:\bffxttx.exe56⤵
- Executes dropped EXE
PID:580 -
\??\c:\vdllbbh.exec:\vdllbbh.exe57⤵
- Executes dropped EXE
PID:2184 -
\??\c:\rnjptrx.exec:\rnjptrx.exe58⤵
- Executes dropped EXE
PID:2412 -
\??\c:\xbtnh.exec:\xbtnh.exe59⤵
- Executes dropped EXE
PID:2432 -
\??\c:\tnrjd.exec:\tnrjd.exe60⤵
- Executes dropped EXE
PID:2260 -
\??\c:\xjnbhnd.exec:\xjnbhnd.exe61⤵
- Executes dropped EXE
PID:2196 -
\??\c:\xjnnxt.exec:\xjnnxt.exe62⤵
- Executes dropped EXE
PID:892 -
\??\c:\xpfdb.exec:\xpfdb.exe63⤵
- Executes dropped EXE
PID:1596 -
\??\c:\ttvplx.exec:\ttvplx.exe64⤵
- Executes dropped EXE
PID:2068 -
\??\c:\vrxfjx.exec:\vrxfjx.exe65⤵
- Executes dropped EXE
PID:1348 -
\??\c:\jrtrvh.exec:\jrtrvh.exe66⤵PID:2004
-
\??\c:\llfhjdp.exec:\llfhjdp.exe67⤵PID:1508
-
\??\c:\dbvvrjx.exec:\dbvvrjx.exe68⤵PID:1512
-
\??\c:\ptrhpd.exec:\ptrhpd.exe69⤵PID:2624
-
\??\c:\vbfflht.exec:\vbfflht.exe70⤵PID:2600
-
\??\c:\frhvfn.exec:\frhvfn.exe71⤵PID:2060
-
\??\c:\xlblr.exec:\xlblr.exe72⤵PID:2296
-
\??\c:\rtfvh.exec:\rtfvh.exe73⤵PID:2604
-
\??\c:\xvfdb.exec:\xvfdb.exe74⤵PID:1688
-
\??\c:\tvlxvhd.exec:\tvlxvhd.exe75⤵PID:1580
-
\??\c:\vppdr.exec:\vppdr.exe76⤵PID:2388
-
\??\c:\pvffjjn.exec:\pvffjjn.exe77⤵PID:2076
-
\??\c:\hdhjnxf.exec:\hdhjnxf.exe78⤵PID:1288
-
\??\c:\xlvtn.exec:\xlvtn.exe79⤵PID:1608
-
\??\c:\hbvjpff.exec:\hbvjpff.exe80⤵PID:2968
-
\??\c:\tdrlt.exec:\tdrlt.exe81⤵PID:2876
-
\??\c:\rrbpbp.exec:\rrbpbp.exe82⤵PID:2032
-
\??\c:\dbbdrdh.exec:\dbbdrdh.exe83⤵PID:3020
-
\??\c:\rhhnnjn.exec:\rhhnnjn.exe84⤵PID:1048
-
\??\c:\tvpdj.exec:\tvpdj.exe85⤵PID:568
-
\??\c:\jhlpbjl.exec:\jhlpbjl.exe86⤵PID:1336
-
\??\c:\pvhhdvr.exec:\pvhhdvr.exe87⤵PID:2540
-
\??\c:\hpjtx.exec:\hpjtx.exe88⤵PID:836
-
\??\c:\frvrbt.exec:\frvrbt.exe89⤵PID:1652
-
\??\c:\xdhxhrv.exec:\xdhxhrv.exe90⤵PID:2472
-
\??\c:\bpjvrxp.exec:\bpjvrxp.exe91⤵PID:1468
-
\??\c:\pfpxtpl.exec:\pfpxtpl.exe92⤵PID:2240
-
\??\c:\fjtdd.exec:\fjtdd.exe93⤵PID:320
-
\??\c:\btpprlh.exec:\btpprlh.exe94⤵PID:2136
-
\??\c:\xjbdp.exec:\xjbdp.exe95⤵PID:316
-
\??\c:\xftlplp.exec:\xftlplp.exe96⤵PID:2212
-
\??\c:\ptdxbb.exec:\ptdxbb.exe97⤵PID:1108
-
\??\c:\vhpnl.exec:\vhpnl.exe98⤵PID:2084
-
\??\c:\rnrxb.exec:\rnrxb.exe99⤵PID:1800
-
\??\c:\xnpxbl.exec:\xnpxbl.exe100⤵PID:2216
-
\??\c:\prhfpv.exec:\prhfpv.exe101⤵PID:2420
-
\??\c:\bfthh.exec:\bfthh.exe102⤵PID:2036
-
\??\c:\ntnbrjt.exec:\ntnbrjt.exe103⤵PID:1204
-
\??\c:\ttddfd.exec:\ttddfd.exe104⤵PID:2236
-
\??\c:\jbnxlvd.exec:\jbnxlvd.exe105⤵PID:2384
-
\??\c:\xvnxjx.exec:\xvnxjx.exe106⤵PID:1820
-
\??\c:\pxxdddj.exec:\pxxdddj.exe107⤵PID:1352
-
\??\c:\lnfjrb.exec:\lnfjrb.exe108⤵PID:840
-
\??\c:\pbjjjdf.exec:\pbjjjdf.exe109⤵PID:1384
-
\??\c:\tffvlnd.exec:\tffvlnd.exe110⤵PID:2228
-
\??\c:\rphpxf.exec:\rphpxf.exe111⤵PID:880
-
\??\c:\xvthjn.exec:\xvthjn.exe112⤵PID:2484
-
\??\c:\nnrxrfn.exec:\nnrxrfn.exe113⤵PID:2704
-
\??\c:\btjtpnv.exec:\btjtpnv.exe114⤵PID:2092
-
\??\c:\bxdpbh.exec:\bxdpbh.exe115⤵PID:1004
-
\??\c:\jblbvjj.exec:\jblbvjj.exe116⤵PID:816
-
\??\c:\vbjnx.exec:\vbjnx.exe117⤵PID:1168
-
\??\c:\flhlrh.exec:\flhlrh.exe118⤵PID:1028
-
\??\c:\jvjdv.exec:\jvjdv.exe119⤵
- System Location Discovery: System Language Discovery
PID:2620 -
\??\c:\vpjvjbd.exec:\vpjvjbd.exe120⤵PID:2548
-
\??\c:\prhxbbf.exec:\prhxbbf.exe121⤵PID:2900
-
\??\c:\ptflj.exec:\ptflj.exe122⤵PID:1824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-