Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 06:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe
-
Size
455KB
-
MD5
29441309fd9894ce61c113141e692f26
-
SHA1
55dc32b030931e4e829c2e6aa49b452fe1bc0bde
-
SHA256
1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8
-
SHA512
cbaf7c1bf70884b749a017eeacf9800f789e9b1a15c35c866f0cf9da105483acfacebba92762cda9c4cc7407b6ddaaa0a024bc0aedfaf35f9ff6d482a54225cb
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRg:q7Tc2NYHUrAwfMp3CDRg
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 44 IoCs
resource yara_rule behavioral1/memory/2344-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2072-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/644-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2856-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2520-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3032-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2876-57-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3004-75-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2780-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/268-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1736-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1632-106-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/268-124-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2384-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2384-142-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1900-160-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1656-169-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1908-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1908-179-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2384-177-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2236-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2636-215-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2564-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2976-250-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2036-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1236-286-0x00000000002C0000-0x00000000002EA000-memory.dmp family_blackmoon behavioral1/memory/1144-335-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2768-367-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2724-374-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2684-389-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1560-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2996-435-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2996-455-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2248-478-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/1400-481-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1908-496-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1684-511-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/936-543-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1536-582-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1216-603-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2932-637-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2932-658-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/2412-692-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2964-706-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2072 nnvln.exe 644 fpvlvv.exe 2856 fdjlp.exe 2520 fbvthn.exe 2876 tnfjp.exe 3032 drdnvpv.exe 3004 rnrln.exe 2780 thxdj.exe 268 lbvvl.exe 1632 xhnbjp.exe 1736 jjjvt.exe 2852 jthbj.exe 544 hpfld.exe 2384 ntbhbvt.exe 700 jnhlvv.exe 1900 rfnnfn.exe 1656 bjfljvx.exe 1908 rbjrxt.exe 2236 tnhdhvh.exe 3056 jdvrt.exe 460 fdjrpb.exe 2636 dlflhjn.exe 2564 xvfbbhf.exe 960 xtprhbh.exe 1840 bdhtfv.exe 2976 hntvnh.exe 1212 xfnhrrj.exe 2036 pvbddd.exe 1292 lvdptl.exe 1236 rtpndd.exe 1548 rfnpjb.exe 2748 lbbjn.exe 2344 ltvjdjx.exe 2244 btvpbn.exe 2060 vvvld.exe 1660 ftttbvn.exe 1144 bdrrhbf.exe 2776 jrjxbt.exe 2520 tnjnrrt.exe 2872 rjrpjnv.exe 2876 ftxrbv.exe 2768 rrhltb.exe 2724 hnhnbd.exe 2712 phxfdph.exe 2684 vbbdr.exe 2716 vjtlpl.exe 2588 nbdhvd.exe 2764 rvljd.exe 2956 rdbft.exe 2728 lvxrht.exe 1560 jnrrhd.exe 2996 rlnhhl.exe 2496 hpbrd.exe 700 txxjth.exe 1100 rjvnvpl.exe 1400 tnhjlx.exe 2360 ndbxj.exe 1908 fnthnh.exe 2248 ntjrx.exe 2424 pbhdbjh.exe 2568 lttvx.exe 980 jjpljlf.exe 1684 ljpxfrv.exe 2296 vfblfx.exe -
resource yara_rule behavioral1/memory/2344-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2072-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/644-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2856-28-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2856-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2520-38-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2520-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3032-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2876-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3004-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2780-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/268-87-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/268-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1736-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1632-106-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2384-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1900-160-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1656-169-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1908-182-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2384-177-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/2236-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2636-215-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1840-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2976-250-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2036-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1292-269-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1660-328-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1144-335-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2724-374-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2684-382-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2684-389-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2588-396-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1560-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2996-435-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1684-511-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2012-544-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1536-582-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1216-603-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2932-637-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2144-651-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2964-706-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvrfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtlbxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rprjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfnhhjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bphplnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppfbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrdtpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbxvdjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrdlftf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdjpjpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njxttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbpxdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntxtpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phdftb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jldnfhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thpnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjrdvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpjxhvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhdprh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btvnhfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxrbjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpxjlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xppndf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxbbxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxxrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddxlxdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxntjpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbvtf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbjjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljjhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjhrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxbxjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxttfdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvrtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbnfvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prflhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lddpdfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brrlt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2072 2344 1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe 29 PID 2344 wrote to memory of 2072 2344 1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe 29 PID 2344 wrote to memory of 2072 2344 1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe 29 PID 2344 wrote to memory of 2072 2344 1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe 29 PID 2072 wrote to memory of 644 2072 nnvln.exe 30 PID 2072 wrote to memory of 644 2072 nnvln.exe 30 PID 2072 wrote to memory of 644 2072 nnvln.exe 30 PID 2072 wrote to memory of 644 2072 nnvln.exe 30 PID 644 wrote to memory of 2856 644 fpvlvv.exe 31 PID 644 wrote to memory of 2856 644 fpvlvv.exe 31 PID 644 wrote to memory of 2856 644 fpvlvv.exe 31 PID 644 wrote to memory of 2856 644 fpvlvv.exe 31 PID 2856 wrote to memory of 2520 2856 fdjlp.exe 32 PID 2856 wrote to memory of 2520 2856 fdjlp.exe 32 PID 2856 wrote to memory of 2520 2856 fdjlp.exe 32 PID 2856 wrote to memory of 2520 2856 fdjlp.exe 32 PID 2520 wrote to memory of 2876 2520 fbvthn.exe 33 PID 2520 wrote to memory of 2876 2520 fbvthn.exe 33 PID 2520 wrote to memory of 2876 2520 fbvthn.exe 33 PID 2520 wrote to memory of 2876 2520 fbvthn.exe 33 PID 2876 wrote to memory of 3032 2876 tnfjp.exe 34 PID 2876 wrote to memory of 3032 2876 tnfjp.exe 34 PID 2876 wrote to memory of 3032 2876 tnfjp.exe 34 PID 2876 wrote to memory of 3032 2876 tnfjp.exe 34 PID 3032 wrote to memory of 3004 3032 drdnvpv.exe 35 PID 3032 wrote to memory of 3004 3032 drdnvpv.exe 35 PID 3032 wrote to memory of 3004 3032 drdnvpv.exe 35 PID 3032 wrote to memory of 3004 3032 drdnvpv.exe 35 PID 3004 wrote to memory of 2780 3004 rnrln.exe 36 PID 3004 wrote to memory of 2780 3004 rnrln.exe 36 PID 3004 wrote to memory of 2780 3004 rnrln.exe 36 PID 3004 wrote to memory of 2780 3004 rnrln.exe 36 PID 2780 wrote to memory of 268 2780 thxdj.exe 37 PID 2780 wrote to memory of 268 2780 thxdj.exe 37 PID 2780 wrote to memory of 268 2780 thxdj.exe 37 PID 2780 wrote to memory of 268 2780 thxdj.exe 37 PID 268 wrote to memory of 1632 268 lbvvl.exe 38 PID 268 wrote to memory of 1632 268 lbvvl.exe 38 PID 268 wrote to memory of 1632 268 lbvvl.exe 38 PID 268 wrote to memory of 1632 268 lbvvl.exe 38 PID 1632 wrote to memory of 1736 1632 xhnbjp.exe 39 PID 1632 wrote to memory of 1736 1632 xhnbjp.exe 39 PID 1632 wrote to memory of 1736 1632 xhnbjp.exe 39 PID 1632 wrote to memory of 1736 1632 xhnbjp.exe 39 PID 1736 wrote to memory of 2852 1736 jjjvt.exe 40 PID 1736 wrote to memory of 2852 1736 jjjvt.exe 40 PID 1736 wrote to memory of 2852 1736 jjjvt.exe 40 PID 1736 wrote to memory of 2852 1736 jjjvt.exe 40 PID 2852 wrote to memory of 544 2852 jthbj.exe 41 PID 2852 wrote to memory of 544 2852 jthbj.exe 41 PID 2852 wrote to memory of 544 2852 jthbj.exe 41 PID 2852 wrote to memory of 544 2852 jthbj.exe 41 PID 544 wrote to memory of 2384 544 hpfld.exe 42 PID 544 wrote to memory of 2384 544 hpfld.exe 42 PID 544 wrote to memory of 2384 544 hpfld.exe 42 PID 544 wrote to memory of 2384 544 hpfld.exe 42 PID 2384 wrote to memory of 700 2384 ntbhbvt.exe 43 PID 2384 wrote to memory of 700 2384 ntbhbvt.exe 43 PID 2384 wrote to memory of 700 2384 ntbhbvt.exe 43 PID 2384 wrote to memory of 700 2384 ntbhbvt.exe 43 PID 700 wrote to memory of 1900 700 jnhlvv.exe 44 PID 700 wrote to memory of 1900 700 jnhlvv.exe 44 PID 700 wrote to memory of 1900 700 jnhlvv.exe 44 PID 700 wrote to memory of 1900 700 jnhlvv.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe"C:\Users\Admin\AppData\Local\Temp\1e52c4bbed1097ce7136dea62142a92a7e8e03923f34d2b19cc9669e7ebc63b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\nnvln.exec:\nnvln.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\fpvlvv.exec:\fpvlvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\fdjlp.exec:\fdjlp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\fbvthn.exec:\fbvthn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\tnfjp.exec:\tnfjp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\drdnvpv.exec:\drdnvpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\rnrln.exec:\rnrln.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\thxdj.exec:\thxdj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\lbvvl.exec:\lbvvl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
\??\c:\xhnbjp.exec:\xhnbjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\jjjvt.exec:\jjjvt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\jthbj.exec:\jthbj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\hpfld.exec:\hpfld.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\ntbhbvt.exec:\ntbhbvt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\jnhlvv.exec:\jnhlvv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
\??\c:\rfnnfn.exec:\rfnnfn.exe17⤵
- Executes dropped EXE
PID:1900 -
\??\c:\bjfljvx.exec:\bjfljvx.exe18⤵
- Executes dropped EXE
PID:1656 -
\??\c:\rbjrxt.exec:\rbjrxt.exe19⤵
- Executes dropped EXE
PID:1908 -
\??\c:\tnhdhvh.exec:\tnhdhvh.exe20⤵
- Executes dropped EXE
PID:2236 -
\??\c:\jdvrt.exec:\jdvrt.exe21⤵
- Executes dropped EXE
PID:3056 -
\??\c:\fdjrpb.exec:\fdjrpb.exe22⤵
- Executes dropped EXE
PID:460 -
\??\c:\dlflhjn.exec:\dlflhjn.exe23⤵
- Executes dropped EXE
PID:2636 -
\??\c:\xvfbbhf.exec:\xvfbbhf.exe24⤵
- Executes dropped EXE
PID:2564 -
\??\c:\xtprhbh.exec:\xtprhbh.exe25⤵
- Executes dropped EXE
PID:960 -
\??\c:\bdhtfv.exec:\bdhtfv.exe26⤵
- Executes dropped EXE
PID:1840 -
\??\c:\hntvnh.exec:\hntvnh.exe27⤵
- Executes dropped EXE
PID:2976 -
\??\c:\xfnhrrj.exec:\xfnhrrj.exe28⤵
- Executes dropped EXE
PID:1212 -
\??\c:\pvbddd.exec:\pvbddd.exe29⤵
- Executes dropped EXE
PID:2036 -
\??\c:\lvdptl.exec:\lvdptl.exe30⤵
- Executes dropped EXE
PID:1292 -
\??\c:\rtpndd.exec:\rtpndd.exe31⤵
- Executes dropped EXE
PID:1236 -
\??\c:\rfnpjb.exec:\rfnpjb.exe32⤵
- Executes dropped EXE
PID:1548 -
\??\c:\lbbjn.exec:\lbbjn.exe33⤵
- Executes dropped EXE
PID:2748 -
\??\c:\ltvjdjx.exec:\ltvjdjx.exe34⤵
- Executes dropped EXE
PID:2344 -
\??\c:\btvpbn.exec:\btvpbn.exe35⤵
- Executes dropped EXE
PID:2244 -
\??\c:\vvvld.exec:\vvvld.exe36⤵
- Executes dropped EXE
PID:2060 -
\??\c:\ftttbvn.exec:\ftttbvn.exe37⤵
- Executes dropped EXE
PID:1660 -
\??\c:\bdrrhbf.exec:\bdrrhbf.exe38⤵
- Executes dropped EXE
PID:1144 -
\??\c:\jrjxbt.exec:\jrjxbt.exe39⤵
- Executes dropped EXE
PID:2776 -
\??\c:\tnjnrrt.exec:\tnjnrrt.exe40⤵
- Executes dropped EXE
PID:2520 -
\??\c:\rjrpjnv.exec:\rjrpjnv.exe41⤵
- Executes dropped EXE
PID:2872 -
\??\c:\ftxrbv.exec:\ftxrbv.exe42⤵
- Executes dropped EXE
PID:2876 -
\??\c:\rrhltb.exec:\rrhltb.exe43⤵
- Executes dropped EXE
PID:2768 -
\??\c:\hnhnbd.exec:\hnhnbd.exe44⤵
- Executes dropped EXE
PID:2724 -
\??\c:\phxfdph.exec:\phxfdph.exe45⤵
- Executes dropped EXE
PID:2712 -
\??\c:\vbbdr.exec:\vbbdr.exe46⤵
- Executes dropped EXE
PID:2684 -
\??\c:\vjtlpl.exec:\vjtlpl.exe47⤵
- Executes dropped EXE
PID:2716 -
\??\c:\nbdhvd.exec:\nbdhvd.exe48⤵
- Executes dropped EXE
PID:2588 -
\??\c:\rvljd.exec:\rvljd.exe49⤵
- Executes dropped EXE
PID:2764 -
\??\c:\rdbft.exec:\rdbft.exe50⤵
- Executes dropped EXE
PID:2956 -
\??\c:\lvxrht.exec:\lvxrht.exe51⤵
- Executes dropped EXE
PID:2728 -
\??\c:\jnrrhd.exec:\jnrrhd.exe52⤵
- Executes dropped EXE
PID:1560 -
\??\c:\rlnhhl.exec:\rlnhhl.exe53⤵
- Executes dropped EXE
PID:2996 -
\??\c:\hpbrd.exec:\hpbrd.exe54⤵
- Executes dropped EXE
PID:2496 -
\??\c:\txxjth.exec:\txxjth.exe55⤵
- Executes dropped EXE
PID:700 -
\??\c:\rjvnvpl.exec:\rjvnvpl.exe56⤵
- Executes dropped EXE
PID:1100 -
\??\c:\tnhjlx.exec:\tnhjlx.exe57⤵
- Executes dropped EXE
PID:1400 -
\??\c:\ndbxj.exec:\ndbxj.exe58⤵
- Executes dropped EXE
PID:2360 -
\??\c:\fnthnh.exec:\fnthnh.exe59⤵
- Executes dropped EXE
PID:1908 -
\??\c:\ntjrx.exec:\ntjrx.exe60⤵
- Executes dropped EXE
PID:2248 -
\??\c:\pbhdbjh.exec:\pbhdbjh.exe61⤵
- Executes dropped EXE
PID:2424 -
\??\c:\lttvx.exec:\lttvx.exe62⤵
- Executes dropped EXE
PID:2568 -
\??\c:\jjpljlf.exec:\jjpljlf.exe63⤵
- Executes dropped EXE
PID:980 -
\??\c:\ljpxfrv.exec:\ljpxfrv.exe64⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vfblfx.exec:\vfblfx.exe65⤵
- Executes dropped EXE
PID:2296 -
\??\c:\vxrxx.exec:\vxrxx.exe66⤵PID:792
-
\??\c:\hdvnpld.exec:\hdvnpld.exe67⤵PID:1104
-
\??\c:\vpvtfhf.exec:\vpvtfhf.exe68⤵PID:1816
-
\??\c:\bnbtbnv.exec:\bnbtbnv.exe69⤵PID:936
-
\??\c:\fdxtfb.exec:\fdxtfb.exe70⤵PID:2012
-
\??\c:\lxxpbbv.exec:\lxxpbbv.exe71⤵PID:2260
-
\??\c:\lbrnnfb.exec:\lbrnnfb.exe72⤵PID:1112
-
\??\c:\hnrlf.exec:\hnrlf.exe73⤵PID:2444
-
\??\c:\xfvrd.exec:\xfvrd.exe74⤵PID:844
-
\??\c:\pfhtrt.exec:\pfhtrt.exe75⤵PID:1536
-
\??\c:\xlvtfx.exec:\xlvtfx.exe76⤵PID:2556
-
\??\c:\jhvlb.exec:\jhvlb.exe77⤵PID:1620
-
\??\c:\ljxbbp.exec:\ljxbbp.exe78⤵PID:1728
-
\??\c:\hdbtr.exec:\hdbtr.exe79⤵PID:1216
-
\??\c:\hlrfltj.exec:\hlrfltj.exe80⤵PID:644
-
\??\c:\rhtrp.exec:\rhtrp.exe81⤵PID:2288
-
\??\c:\hhrlrd.exec:\hhrlrd.exe82⤵PID:1476
-
\??\c:\hrtpj.exec:\hrtpj.exe83⤵PID:2932
-
\??\c:\vjnnhj.exec:\vjnnhj.exe84⤵PID:2396
-
\??\c:\vxjlhvj.exec:\vxjlhvj.exe85⤵PID:2972
-
\??\c:\ltvxjll.exec:\ltvxjll.exe86⤵PID:2144
-
\??\c:\bfpvvb.exec:\bfpvvb.exe87⤵PID:2700
-
\??\c:\ldbvh.exec:\ldbvh.exe88⤵PID:2788
-
\??\c:\jhvtb.exec:\jhvtb.exe89⤵PID:2152
-
\??\c:\trvjtnp.exec:\trvjtnp.exe90⤵PID:1324
-
\??\c:\vfdnld.exec:\vfdnld.exe91⤵PID:2412
-
\??\c:\tdrjr.exec:\tdrjr.exe92⤵PID:1748
-
\??\c:\blhvrhl.exec:\blhvrhl.exe93⤵PID:2964
-
\??\c:\jbppbjj.exec:\jbppbjj.exe94⤵PID:1508
-
\??\c:\tvpffnv.exec:\tvpffnv.exe95⤵PID:1560
-
\??\c:\hhjlbf.exec:\hhjlbf.exe96⤵PID:1532
-
\??\c:\vfjftln.exec:\vfjftln.exe97⤵PID:2980
-
\??\c:\hdhprnj.exec:\hdhprnj.exe98⤵PID:2184
-
\??\c:\bnprf.exec:\bnprf.exe99⤵PID:2108
-
\??\c:\jptntj.exec:\jptntj.exe100⤵PID:1972
-
\??\c:\rnlfvr.exec:\rnlfvr.exe101⤵PID:2312
-
\??\c:\dxflfj.exec:\dxflfj.exe102⤵PID:2476
-
\??\c:\lthnp.exec:\lthnp.exe103⤵PID:2416
-
\??\c:\jrhnrxb.exec:\jrhnrxb.exe104⤵PID:2192
-
\??\c:\ppjtxvf.exec:\ppjtxvf.exe105⤵PID:712
-
\??\c:\nnrrrt.exec:\nnrrrt.exe106⤵PID:2156
-
\??\c:\rvbjrfj.exec:\rvbjrfj.exe107⤵PID:604
-
\??\c:\tdpthfp.exec:\tdpthfp.exe108⤵PID:884
-
\??\c:\hxxrp.exec:\hxxrp.exe109⤵PID:1044
-
\??\c:\ntnhlbv.exec:\ntnhlbv.exe110⤵PID:316
-
\??\c:\jdfbdj.exec:\jdfbdj.exe111⤵PID:3040
-
\??\c:\jdfnb.exec:\jdfnb.exe112⤵PID:2976
-
\??\c:\tfrrl.exec:\tfrrl.exe113⤵PID:1520
-
\??\c:\rddxpr.exec:\rddxpr.exe114⤵PID:2324
-
\??\c:\jlpjr.exec:\jlpjr.exe115⤵PID:1184
-
\??\c:\bhvfvj.exec:\bhvfvj.exe116⤵PID:2524
-
\??\c:\dtblj.exec:\dtblj.exe117⤵PID:696
-
\??\c:\bdrhnvn.exec:\bdrhnvn.exe118⤵PID:2620
-
\??\c:\xhdxtrf.exec:\xhdxtrf.exe119⤵PID:636
-
\??\c:\pfttn.exec:\pfttn.exe120⤵PID:1624
-
\??\c:\bhtlbxt.exec:\bhtlbxt.exe121⤵
- System Location Discovery: System Language Discovery
PID:2244 -
\??\c:\tbnxvnh.exec:\tbnxvnh.exe122⤵PID:2952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-