Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 09:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe
-
Size
454KB
-
MD5
0bf470511ee819a2d316fc1b282dac47
-
SHA1
360f77e95e0ee38dab350a0244c10c8902b70297
-
SHA256
0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d
-
SHA512
744ad2a8538d42a6c359a2afe0be7613686d18ba1ffaa468d706b24a8b61a07677e0db5f465b24e3f57043192f671f174f2f9e204469f9fdbf5504fcaf278d2f
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeTe:q7Tc2NYHUrAwfMp3CDa
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 44 IoCs
resource yara_rule behavioral1/memory/2116-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/760-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2900-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/584-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2256-44-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2924-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2976-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2928-75-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2540-91-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1316-97-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1192-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2136-127-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2740-138-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2460-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2740-134-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2088-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/556-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2124-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/836-222-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/960-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1656-266-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2608-286-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1928-302-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1628-303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1456-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2936-323-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2936-331-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2944-363-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2872-377-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1660-432-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1660-435-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2064-507-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1420-520-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2604-551-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2780-564-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2160-620-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2828-650-0x0000000000340000-0x000000000036A000-memory.dmp family_blackmoon behavioral1/memory/1132-676-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/940-677-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2468-788-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1800-795-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/1736-869-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/264-945-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2508-1033-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 760 bjndv.exe 2900 xhhjhhv.exe 584 hftffv.exe 2256 jbtlf.exe 2924 txfhd.exe 2976 dtbpr.exe 2920 xttlh.exe 2928 hnrtx.exe 2540 xnlrt.exe 1316 bhlrxff.exe 1192 tjvllpd.exe 1652 hprjln.exe 2136 rdtrvvb.exe 2740 nhnxnf.exe 2460 tftvbj.exe 2088 vdntdb.exe 1548 brrljn.exe 1304 flljdtn.exe 556 fntvr.exe 2124 jbnnjnx.exe 2452 lhnvxv.exe 624 hvvlbl.exe 836 bxfxvb.exe 1868 txvjbvx.exe 960 vfjrrrp.exe 1004 dnnvhln.exe 2764 vdnhrn.exe 1656 jndpj.exe 2780 nvtrxr.exe 2752 ftvlftn.exe 2608 fdlxnjn.exe 1928 tbnpb.exe 1628 bprbl.exe 1456 vpfdjb.exe 1620 ntvjv.exe 2936 hptvxt.exe 2036 hppdd.exe 2964 dfflbrf.exe 2152 npfvd.exe 2980 fnfrvn.exe 2944 ffrhnr.exe 2836 ddhhtl.exe 2872 vtndtxr.exe 2272 dxlptlx.exe 1944 vbtdthr.exe 940 bdndlf.exe 944 xlhhvx.exe 3056 ltdtrn.exe 2908 bdjvt.exe 1436 prxjhhf.exe 2340 ppvdlvf.exe 1660 txrxr.exe 1780 nvdnd.exe 1632 nlrtlbx.exe 2032 rnllbb.exe 1168 ltfdphh.exe 2240 bdnpjh.exe 2052 nnfhfx.exe 2308 vpbvr.exe 2412 vlbjr.exe 1644 fdtbtr.exe 2228 lvfnxlb.exe 2064 tflxvnn.exe 2732 hrrjj.exe -
resource yara_rule behavioral1/memory/2116-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/760-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2900-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/584-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2256-44-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2924-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2976-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2920-65-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2928-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2540-91-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1192-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2136-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2740-138-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2460-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1548-159-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2088-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/556-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2124-196-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/836-222-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/960-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1656-266-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2608-286-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1928-302-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1628-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1456-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2936-323-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2936-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2872-377-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1944-384-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1660-435-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2052-493-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1420-520-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2604-551-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2948-607-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2160-620-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1132-676-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/940-677-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1340-729-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2468-788-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1736-869-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2508-1026-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrpht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjtprdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptbjth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbndxxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxlptlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlnrdvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvbfjtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfjrrrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxjtf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrbdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfhtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djfxnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vflvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htprrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtvdrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnfdhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrxndhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbfpjnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrfjtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnlpbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvdlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drxjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnlrxrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpdrtln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prxjhhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvnbdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbprpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpldhft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvxbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxjrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nddfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnpjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bljrvdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlxjfpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vphtf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnjpdlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnftdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btlpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhrhbft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdlvpx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 760 2116 0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe 30 PID 2116 wrote to memory of 760 2116 0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe 30 PID 2116 wrote to memory of 760 2116 0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe 30 PID 2116 wrote to memory of 760 2116 0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe 30 PID 760 wrote to memory of 2900 760 bjndv.exe 31 PID 760 wrote to memory of 2900 760 bjndv.exe 31 PID 760 wrote to memory of 2900 760 bjndv.exe 31 PID 760 wrote to memory of 2900 760 bjndv.exe 31 PID 2900 wrote to memory of 584 2900 xhhjhhv.exe 32 PID 2900 wrote to memory of 584 2900 xhhjhhv.exe 32 PID 2900 wrote to memory of 584 2900 xhhjhhv.exe 32 PID 2900 wrote to memory of 584 2900 xhhjhhv.exe 32 PID 584 wrote to memory of 2256 584 hftffv.exe 33 PID 584 wrote to memory of 2256 584 hftffv.exe 33 PID 584 wrote to memory of 2256 584 hftffv.exe 33 PID 584 wrote to memory of 2256 584 hftffv.exe 33 PID 2256 wrote to memory of 2924 2256 jbtlf.exe 34 PID 2256 wrote to memory of 2924 2256 jbtlf.exe 34 PID 2256 wrote to memory of 2924 2256 jbtlf.exe 34 PID 2256 wrote to memory of 2924 2256 jbtlf.exe 34 PID 2924 wrote to memory of 2976 2924 txfhd.exe 35 PID 2924 wrote to memory of 2976 2924 txfhd.exe 35 PID 2924 wrote to memory of 2976 2924 txfhd.exe 35 PID 2924 wrote to memory of 2976 2924 txfhd.exe 35 PID 2976 wrote to memory of 2920 2976 dtbpr.exe 36 PID 2976 wrote to memory of 2920 2976 dtbpr.exe 36 PID 2976 wrote to memory of 2920 2976 dtbpr.exe 36 PID 2976 wrote to memory of 2920 2976 dtbpr.exe 36 PID 2920 wrote to memory of 2928 2920 xttlh.exe 37 PID 2920 wrote to memory of 2928 2920 xttlh.exe 37 PID 2920 wrote to memory of 2928 2920 xttlh.exe 37 PID 2920 wrote to memory of 2928 2920 xttlh.exe 37 PID 2928 wrote to memory of 2540 2928 hnrtx.exe 38 PID 2928 wrote to memory of 2540 2928 hnrtx.exe 38 PID 2928 wrote to memory of 2540 2928 hnrtx.exe 38 PID 2928 wrote to memory of 2540 2928 hnrtx.exe 38 PID 2540 wrote to memory of 1316 2540 xnlrt.exe 39 PID 2540 wrote to memory of 1316 2540 xnlrt.exe 39 PID 2540 wrote to memory of 1316 2540 xnlrt.exe 39 PID 2540 wrote to memory of 1316 2540 xnlrt.exe 39 PID 1316 wrote to memory of 1192 1316 bhlrxff.exe 40 PID 1316 wrote to memory of 1192 1316 bhlrxff.exe 40 PID 1316 wrote to memory of 1192 1316 bhlrxff.exe 40 PID 1316 wrote to memory of 1192 1316 bhlrxff.exe 40 PID 1192 wrote to memory of 1652 1192 tjvllpd.exe 41 PID 1192 wrote to memory of 1652 1192 tjvllpd.exe 41 PID 1192 wrote to memory of 1652 1192 tjvllpd.exe 41 PID 1192 wrote to memory of 1652 1192 tjvllpd.exe 41 PID 1652 wrote to memory of 2136 1652 hprjln.exe 42 PID 1652 wrote to memory of 2136 1652 hprjln.exe 42 PID 1652 wrote to memory of 2136 1652 hprjln.exe 42 PID 1652 wrote to memory of 2136 1652 hprjln.exe 42 PID 2136 wrote to memory of 2740 2136 rdtrvvb.exe 43 PID 2136 wrote to memory of 2740 2136 rdtrvvb.exe 43 PID 2136 wrote to memory of 2740 2136 rdtrvvb.exe 43 PID 2136 wrote to memory of 2740 2136 rdtrvvb.exe 43 PID 2740 wrote to memory of 2460 2740 nhnxnf.exe 44 PID 2740 wrote to memory of 2460 2740 nhnxnf.exe 44 PID 2740 wrote to memory of 2460 2740 nhnxnf.exe 44 PID 2740 wrote to memory of 2460 2740 nhnxnf.exe 44 PID 2460 wrote to memory of 2088 2460 tftvbj.exe 45 PID 2460 wrote to memory of 2088 2460 tftvbj.exe 45 PID 2460 wrote to memory of 2088 2460 tftvbj.exe 45 PID 2460 wrote to memory of 2088 2460 tftvbj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe"C:\Users\Admin\AppData\Local\Temp\0d50acbddc42d580627e1b4c729aca2962d9d0c0420318ec6def7bb86b94d94d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\bjndv.exec:\bjndv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\xhhjhhv.exec:\xhhjhhv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\hftffv.exec:\hftffv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
\??\c:\jbtlf.exec:\jbtlf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\txfhd.exec:\txfhd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\dtbpr.exec:\dtbpr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\xttlh.exec:\xttlh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\hnrtx.exec:\hnrtx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\xnlrt.exec:\xnlrt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\bhlrxff.exec:\bhlrxff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
\??\c:\tjvllpd.exec:\tjvllpd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\hprjln.exec:\hprjln.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\rdtrvvb.exec:\rdtrvvb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\nhnxnf.exec:\nhnxnf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\tftvbj.exec:\tftvbj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\vdntdb.exec:\vdntdb.exe17⤵
- Executes dropped EXE
PID:2088 -
\??\c:\brrljn.exec:\brrljn.exe18⤵
- Executes dropped EXE
PID:1548 -
\??\c:\flljdtn.exec:\flljdtn.exe19⤵
- Executes dropped EXE
PID:1304 -
\??\c:\fntvr.exec:\fntvr.exe20⤵
- Executes dropped EXE
PID:556 -
\??\c:\jbnnjnx.exec:\jbnnjnx.exe21⤵
- Executes dropped EXE
PID:2124 -
\??\c:\lhnvxv.exec:\lhnvxv.exe22⤵
- Executes dropped EXE
PID:2452 -
\??\c:\hvvlbl.exec:\hvvlbl.exe23⤵
- Executes dropped EXE
PID:624 -
\??\c:\bxfxvb.exec:\bxfxvb.exe24⤵
- Executes dropped EXE
PID:836 -
\??\c:\txvjbvx.exec:\txvjbvx.exe25⤵
- Executes dropped EXE
PID:1868 -
\??\c:\vfjrrrp.exec:\vfjrrrp.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:960 -
\??\c:\dnnvhln.exec:\dnnvhln.exe27⤵
- Executes dropped EXE
PID:1004 -
\??\c:\vdnhrn.exec:\vdnhrn.exe28⤵
- Executes dropped EXE
PID:2764 -
\??\c:\jndpj.exec:\jndpj.exe29⤵
- Executes dropped EXE
PID:1656 -
\??\c:\nvtrxr.exec:\nvtrxr.exe30⤵
- Executes dropped EXE
PID:2780 -
\??\c:\ftvlftn.exec:\ftvlftn.exe31⤵
- Executes dropped EXE
PID:2752 -
\??\c:\fdlxnjn.exec:\fdlxnjn.exe32⤵
- Executes dropped EXE
PID:2608 -
\??\c:\tbnpb.exec:\tbnpb.exe33⤵
- Executes dropped EXE
PID:1928 -
\??\c:\bprbl.exec:\bprbl.exe34⤵
- Executes dropped EXE
PID:1628 -
\??\c:\vpfdjb.exec:\vpfdjb.exe35⤵
- Executes dropped EXE
PID:1456 -
\??\c:\ntvjv.exec:\ntvjv.exe36⤵
- Executes dropped EXE
PID:1620 -
\??\c:\hptvxt.exec:\hptvxt.exe37⤵
- Executes dropped EXE
PID:2936 -
\??\c:\hppdd.exec:\hppdd.exe38⤵
- Executes dropped EXE
PID:2036 -
\??\c:\dfflbrf.exec:\dfflbrf.exe39⤵
- Executes dropped EXE
PID:2964 -
\??\c:\npfvd.exec:\npfvd.exe40⤵
- Executes dropped EXE
PID:2152 -
\??\c:\fnfrvn.exec:\fnfrvn.exe41⤵
- Executes dropped EXE
PID:2980 -
\??\c:\ffrhnr.exec:\ffrhnr.exe42⤵
- Executes dropped EXE
PID:2944 -
\??\c:\ddhhtl.exec:\ddhhtl.exe43⤵
- Executes dropped EXE
PID:2836 -
\??\c:\vtndtxr.exec:\vtndtxr.exe44⤵
- Executes dropped EXE
PID:2872 -
\??\c:\dxlptlx.exec:\dxlptlx.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
\??\c:\vbtdthr.exec:\vbtdthr.exe46⤵
- Executes dropped EXE
PID:1944 -
\??\c:\bdndlf.exec:\bdndlf.exe47⤵
- Executes dropped EXE
PID:940 -
\??\c:\xlhhvx.exec:\xlhhvx.exe48⤵
- Executes dropped EXE
PID:944 -
\??\c:\ltdtrn.exec:\ltdtrn.exe49⤵
- Executes dropped EXE
PID:3056 -
\??\c:\bdjvt.exec:\bdjvt.exe50⤵
- Executes dropped EXE
PID:2908 -
\??\c:\prxjhhf.exec:\prxjhhf.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436 -
\??\c:\ppvdlvf.exec:\ppvdlvf.exe52⤵
- Executes dropped EXE
PID:2340 -
\??\c:\txrxr.exec:\txrxr.exe53⤵
- Executes dropped EXE
PID:1660 -
\??\c:\nvdnd.exec:\nvdnd.exe54⤵
- Executes dropped EXE
PID:1780 -
\??\c:\nlrtlbx.exec:\nlrtlbx.exe55⤵
- Executes dropped EXE
PID:1632 -
\??\c:\rnllbb.exec:\rnllbb.exe56⤵
- Executes dropped EXE
PID:2032 -
\??\c:\ltfdphh.exec:\ltfdphh.exe57⤵
- Executes dropped EXE
PID:1168 -
\??\c:\bdnpjh.exec:\bdnpjh.exe58⤵
- Executes dropped EXE
PID:2240 -
\??\c:\nnfhfx.exec:\nnfhfx.exe59⤵
- Executes dropped EXE
PID:2052 -
\??\c:\vpbvr.exec:\vpbvr.exe60⤵
- Executes dropped EXE
PID:2308 -
\??\c:\vlbjr.exec:\vlbjr.exe61⤵
- Executes dropped EXE
PID:2412 -
\??\c:\fdtbtr.exec:\fdtbtr.exe62⤵
- Executes dropped EXE
PID:1644 -
\??\c:\lvfnxlb.exec:\lvfnxlb.exe63⤵
- Executes dropped EXE
PID:2228 -
\??\c:\tflxvnn.exec:\tflxvnn.exe64⤵
- Executes dropped EXE
PID:2064 -
\??\c:\hrrjj.exec:\hrrjj.exe65⤵
- Executes dropped EXE
PID:2732 -
\??\c:\ljldx.exec:\ljldx.exe66⤵PID:1420
-
\??\c:\rhfxlbn.exec:\rhfxlbn.exe67⤵PID:1600
-
\??\c:\fxrbl.exec:\fxrbl.exe68⤵PID:1364
-
\??\c:\dvvxtbr.exec:\dvvxtbr.exe69⤵PID:2520
-
\??\c:\hrxprlf.exec:\hrxprlf.exe70⤵PID:2764
-
\??\c:\bxjnl.exec:\bxjnl.exe71⤵PID:2604
-
\??\c:\fvxxhn.exec:\fvxxhn.exe72⤵PID:2376
-
\??\c:\nlprt.exec:\nlprt.exe73⤵PID:2780
-
\??\c:\lrpht.exec:\lrpht.exe74⤵
- System Location Discovery: System Language Discovery
PID:2616 -
\??\c:\ttvxdp.exec:\ttvxdp.exe75⤵PID:1520
-
\??\c:\pdnnvn.exec:\pdnnvn.exe76⤵PID:2104
-
\??\c:\rblpfx.exec:\rblpfx.exe77⤵PID:2224
-
\??\c:\hvllprr.exec:\hvllprr.exe78⤵PID:2212
-
\??\c:\pvjhh.exec:\pvjhh.exe79⤵PID:1588
-
\??\c:\hrxtfp.exec:\hrxtfp.exe80⤵PID:2424
-
\??\c:\lvlbd.exec:\lvlbd.exe81⤵PID:2948
-
\??\c:\hhxxd.exec:\hhxxd.exe82⤵PID:2160
-
\??\c:\hdtpfdf.exec:\hdtpfdf.exe83⤵PID:2312
-
\??\c:\rdnjbn.exec:\rdnjbn.exe84⤵PID:2108
-
\??\c:\pnlvbn.exec:\pnlvbn.exe85⤵PID:2968
-
\??\c:\tpxjx.exec:\tpxjx.exe86⤵PID:1740
-
\??\c:\vxnjl.exec:\vxnjl.exe87⤵PID:2828
-
\??\c:\hvnbdb.exec:\hvnbdb.exe88⤵
- System Location Discovery: System Language Discovery
PID:2564 -
\??\c:\rndvv.exec:\rndvv.exe89⤵PID:2548
-
\??\c:\fnnhnr.exec:\fnnhnr.exe90⤵PID:984
-
\??\c:\tnltn.exec:\tnltn.exe91⤵PID:1132
-
\??\c:\jfpdf.exec:\jfpdf.exe92⤵PID:940
-
\??\c:\lffnbnt.exec:\lffnbnt.exe93⤵PID:2996
-
\??\c:\drjtf.exec:\drjtf.exe94⤵PID:1516
-
\??\c:\dlhxfph.exec:\dlhxfph.exe95⤵PID:1832
-
\??\c:\drjvbv.exec:\drjvbv.exe96⤵PID:2740
-
\??\c:\rbdvhpt.exec:\rbdvhpt.exe97⤵PID:1352
-
\??\c:\pbrrn.exec:\pbrrn.exe98⤵PID:2460
-
\??\c:\fvtjvft.exec:\fvtjvft.exe99⤵PID:1408
-
\??\c:\phldxx.exec:\phldxx.exe100⤵PID:1340
-
\??\c:\jnlvt.exec:\jnlvt.exe101⤵PID:1028
-
\??\c:\jxpjp.exec:\jxpjp.exe102⤵PID:2216
-
\??\c:\prhjbl.exec:\prhjbl.exe103⤵PID:2232
-
\??\c:\pxnfhl.exec:\pxnfhl.exe104⤵PID:1964
-
\??\c:\xfjjd.exec:\xfjjd.exe105⤵PID:2436
-
\??\c:\nxxnvrr.exec:\nxxnvrr.exe106⤵PID:1876
-
\??\c:\jxbth.exec:\jxbth.exe107⤵PID:2200
-
\??\c:\hrjnjp.exec:\hrjnjp.exe108⤵PID:2468
-
\??\c:\hnpvp.exec:\hnpvp.exe109⤵PID:1800
-
\??\c:\lbndrxt.exec:\lbndrxt.exe110⤵PID:1868
-
\??\c:\dlrbbr.exec:\dlrbbr.exe111⤵PID:1540
-
\??\c:\ddtfrvh.exec:\ddtfrvh.exe112⤵PID:2264
-
\??\c:\ftxxhr.exec:\ftxxhr.exe113⤵PID:960
-
\??\c:\dbjvhvv.exec:\dbjvhvv.exe114⤵PID:1088
-
\??\c:\tbpjnpv.exec:\tbpjnpv.exe115⤵PID:1744
-
\??\c:\xnjvlvp.exec:\xnjvlvp.exe116⤵PID:1768
-
\??\c:\fppdbhv.exec:\fppdbhv.exe117⤵PID:2632
-
\??\c:\prppbvf.exec:\prppbvf.exe118⤵PID:2752
-
\??\c:\rtvdrd.exec:\rtvdrd.exe119⤵
- System Location Discovery: System Language Discovery
PID:2608 -
\??\c:\tnpvfn.exec:\tnpvfn.exe120⤵PID:2044
-
\??\c:\rtprbl.exec:\rtprbl.exe121⤵PID:1736
-
\??\c:\vndhddf.exec:\vndhddf.exe122⤵PID:2420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-