Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 11:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe
-
Size
453KB
-
MD5
4112c1d6072012a878e7e93f19536c8d
-
SHA1
7b46324436023f2a3a82dc463f3745c0aee29f5d
-
SHA256
20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec
-
SHA512
90293eea29f5f26e82a0760417b7a21dfa26de71190d3bcf7b8c0c70f9b5a20a70a8443cc7be5e963cc04647512570c4a8cf9060800fe98984cb83b2b0f708ca
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeY:q7Tc2NYHUrAwfMp3CDY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 40 IoCs
resource yara_rule behavioral1/memory/2772-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2848-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2756-28-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2748-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2660-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2828-65-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/432-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2120-95-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/760-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3000-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2964-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1948-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2596-155-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/520-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2160-179-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2372-188-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1700-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1700-202-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/388-215-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2536-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2092-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2308-285-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1256-301-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2780-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3044-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2768-349-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/2712-360-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1988-380-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1524-394-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1988-403-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/2624-419-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/544-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2160-481-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1700-511-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/280-537-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2736-625-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1728-696-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1476-703-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1916-729-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/320-749-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2848 bbhdtl.exe 2756 nfbjbj.exe 2748 vhjjjjf.exe 2660 drhll.exe 2700 rldnbp.exe 2828 jrllrp.exe 1696 xxldtx.exe 432 btrjvdr.exe 2120 xtrbtr.exe 760 bbxlxh.exe 3000 tbbtth.exe 2696 xtbjf.exe 1140 lnhrn.exe 2964 hpvjnxp.exe 1948 hvprp.exe 2596 hvrpfvv.exe 520 pxhdx.exe 2160 ttvpfnx.exe 2372 rxpftbx.exe 2004 llhjl.exe 1700 jljrvlr.exe 388 ttjbfb.exe 736 xrfvvx.exe 1508 jhdfj.exe 2536 jlhpllf.exe 2092 npxjj.exe 1780 xjhdjdx.exe 916 pjtbvlf.exe 1704 vbnxv.exe 2032 lfrnx.exe 2308 fhblb.exe 1256 tvrhvbt.exe 2304 tbxvtvx.exe 656 pflbf.exe 2860 bdlhvhr.exe 2780 lvjjb.exe 2456 htndpt.exe 3044 jfnrndl.exe 2768 dpbdvfj.exe 2712 htflbh.exe 2108 rdldhx.exe 1072 llfbpdb.exe 1988 lbhpl.exe 2324 fhdnpvn.exe 1524 lbldldh.exe 1728 lpdxnx.exe 1236 rbfrb.exe 2624 frdhrj.exe 592 pxbbx.exe 2936 pdpfrnt.exe 2984 vtnrf.exe 3020 lbxfb.exe 1948 hlrbnhh.exe 544 fbfdtjt.exe 2376 njrph.exe 2156 bptnjhd.exe 2160 tdhntn.exe 2356 xnrhlrb.exe 1692 rvtrp.exe 956 jjjnf.exe 1700 lfxrx.exe 388 bplttx.exe 680 xnfrlt.exe 1536 pdndlfx.exe -
resource yara_rule behavioral1/memory/2772-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2848-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2756-28-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2748-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2828-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1696-67-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2828-65-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/432-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2120-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/760-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3000-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2964-132-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2964-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1948-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/520-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2160-179-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2372-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1700-199-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2536-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2092-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2308-285-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1256-301-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2780-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3044-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2768-343-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2712-360-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1988-380-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1728-396-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1236-404-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2624-419-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/544-453-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/544-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2160-474-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2160-481-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1700-511-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1536-524-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/280-537-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1144-568-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2456-626-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1180-658-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1728-696-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1476-703-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2888-716-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1916-729-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/320-742-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2004-777-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffpjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbdtll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrhxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnljhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jljxljn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpxhdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hndnnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhrfhpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhvxrpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjdlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltnjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbvrnrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbhxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvfjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvjbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpxfdbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bplttx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dltdxbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbxlffp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnhjljn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfjjtrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlllhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdvfdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxtnph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrltjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfdph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xltdfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjnrtdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfrtrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxjbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxdhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvllhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltlfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtjtvtf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbpnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppplxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjhxtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njbdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fthnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phxdxjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrjtvbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxbxhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2848 2772 20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe 30 PID 2772 wrote to memory of 2848 2772 20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe 30 PID 2772 wrote to memory of 2848 2772 20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe 30 PID 2772 wrote to memory of 2848 2772 20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe 30 PID 2848 wrote to memory of 2756 2848 bbhdtl.exe 31 PID 2848 wrote to memory of 2756 2848 bbhdtl.exe 31 PID 2848 wrote to memory of 2756 2848 bbhdtl.exe 31 PID 2848 wrote to memory of 2756 2848 bbhdtl.exe 31 PID 2756 wrote to memory of 2748 2756 nfbjbj.exe 32 PID 2756 wrote to memory of 2748 2756 nfbjbj.exe 32 PID 2756 wrote to memory of 2748 2756 nfbjbj.exe 32 PID 2756 wrote to memory of 2748 2756 nfbjbj.exe 32 PID 2748 wrote to memory of 2660 2748 vhjjjjf.exe 33 PID 2748 wrote to memory of 2660 2748 vhjjjjf.exe 33 PID 2748 wrote to memory of 2660 2748 vhjjjjf.exe 33 PID 2748 wrote to memory of 2660 2748 vhjjjjf.exe 33 PID 2660 wrote to memory of 2700 2660 drhll.exe 34 PID 2660 wrote to memory of 2700 2660 drhll.exe 34 PID 2660 wrote to memory of 2700 2660 drhll.exe 34 PID 2660 wrote to memory of 2700 2660 drhll.exe 34 PID 2700 wrote to memory of 2828 2700 rldnbp.exe 35 PID 2700 wrote to memory of 2828 2700 rldnbp.exe 35 PID 2700 wrote to memory of 2828 2700 rldnbp.exe 35 PID 2700 wrote to memory of 2828 2700 rldnbp.exe 35 PID 2828 wrote to memory of 1696 2828 jrllrp.exe 36 PID 2828 wrote to memory of 1696 2828 jrllrp.exe 36 PID 2828 wrote to memory of 1696 2828 jrllrp.exe 36 PID 2828 wrote to memory of 1696 2828 jrllrp.exe 36 PID 1696 wrote to memory of 432 1696 xxldtx.exe 37 PID 1696 wrote to memory of 432 1696 xxldtx.exe 37 PID 1696 wrote to memory of 432 1696 xxldtx.exe 37 PID 1696 wrote to memory of 432 1696 xxldtx.exe 37 PID 432 wrote to memory of 2120 432 btrjvdr.exe 38 PID 432 wrote to memory of 2120 432 btrjvdr.exe 38 PID 432 wrote to memory of 2120 432 btrjvdr.exe 38 PID 432 wrote to memory of 2120 432 btrjvdr.exe 38 PID 2120 wrote to memory of 760 2120 xtrbtr.exe 39 PID 2120 wrote to memory of 760 2120 xtrbtr.exe 39 PID 2120 wrote to memory of 760 2120 xtrbtr.exe 39 PID 2120 wrote to memory of 760 2120 xtrbtr.exe 39 PID 760 wrote to memory of 3000 760 bbxlxh.exe 40 PID 760 wrote to memory of 3000 760 bbxlxh.exe 40 PID 760 wrote to memory of 3000 760 bbxlxh.exe 40 PID 760 wrote to memory of 3000 760 bbxlxh.exe 40 PID 3000 wrote to memory of 2696 3000 tbbtth.exe 41 PID 3000 wrote to memory of 2696 3000 tbbtth.exe 41 PID 3000 wrote to memory of 2696 3000 tbbtth.exe 41 PID 3000 wrote to memory of 2696 3000 tbbtth.exe 41 PID 2696 wrote to memory of 1140 2696 xtbjf.exe 42 PID 2696 wrote to memory of 1140 2696 xtbjf.exe 42 PID 2696 wrote to memory of 1140 2696 xtbjf.exe 42 PID 2696 wrote to memory of 1140 2696 xtbjf.exe 42 PID 1140 wrote to memory of 2964 1140 lnhrn.exe 43 PID 1140 wrote to memory of 2964 1140 lnhrn.exe 43 PID 1140 wrote to memory of 2964 1140 lnhrn.exe 43 PID 1140 wrote to memory of 2964 1140 lnhrn.exe 43 PID 2964 wrote to memory of 1948 2964 hpvjnxp.exe 44 PID 2964 wrote to memory of 1948 2964 hpvjnxp.exe 44 PID 2964 wrote to memory of 1948 2964 hpvjnxp.exe 44 PID 2964 wrote to memory of 1948 2964 hpvjnxp.exe 44 PID 1948 wrote to memory of 2596 1948 hvprp.exe 45 PID 1948 wrote to memory of 2596 1948 hvprp.exe 45 PID 1948 wrote to memory of 2596 1948 hvprp.exe 45 PID 1948 wrote to memory of 2596 1948 hvprp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe"C:\Users\Admin\AppData\Local\Temp\20928ff63ec9aa19f224b0b36a8c5f75b6ad06bc17d920e725572833a1b05aec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\bbhdtl.exec:\bbhdtl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\nfbjbj.exec:\nfbjbj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\vhjjjjf.exec:\vhjjjjf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\drhll.exec:\drhll.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\rldnbp.exec:\rldnbp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\jrllrp.exec:\jrllrp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\xxldtx.exec:\xxldtx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\btrjvdr.exec:\btrjvdr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
\??\c:\xtrbtr.exec:\xtrbtr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
\??\c:\bbxlxh.exec:\bbxlxh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\tbbtth.exec:\tbbtth.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\xtbjf.exec:\xtbjf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\lnhrn.exec:\lnhrn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
\??\c:\hpvjnxp.exec:\hpvjnxp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\hvprp.exec:\hvprp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\hvrpfvv.exec:\hvrpfvv.exe17⤵
- Executes dropped EXE
PID:2596 -
\??\c:\pxhdx.exec:\pxhdx.exe18⤵
- Executes dropped EXE
PID:520 -
\??\c:\ttvpfnx.exec:\ttvpfnx.exe19⤵
- Executes dropped EXE
PID:2160 -
\??\c:\rxpftbx.exec:\rxpftbx.exe20⤵
- Executes dropped EXE
PID:2372 -
\??\c:\llhjl.exec:\llhjl.exe21⤵
- Executes dropped EXE
PID:2004 -
\??\c:\jljrvlr.exec:\jljrvlr.exe22⤵
- Executes dropped EXE
PID:1700 -
\??\c:\ttjbfb.exec:\ttjbfb.exe23⤵
- Executes dropped EXE
PID:388 -
\??\c:\xrfvvx.exec:\xrfvvx.exe24⤵
- Executes dropped EXE
PID:736 -
\??\c:\jhdfj.exec:\jhdfj.exe25⤵
- Executes dropped EXE
PID:1508 -
\??\c:\jlhpllf.exec:\jlhpllf.exe26⤵
- Executes dropped EXE
PID:2536 -
\??\c:\npxjj.exec:\npxjj.exe27⤵
- Executes dropped EXE
PID:2092 -
\??\c:\xjhdjdx.exec:\xjhdjdx.exe28⤵
- Executes dropped EXE
PID:1780 -
\??\c:\pjtbvlf.exec:\pjtbvlf.exe29⤵
- Executes dropped EXE
PID:916 -
\??\c:\vbnxv.exec:\vbnxv.exe30⤵
- Executes dropped EXE
PID:1704 -
\??\c:\lfrnx.exec:\lfrnx.exe31⤵
- Executes dropped EXE
PID:2032 -
\??\c:\fhblb.exec:\fhblb.exe32⤵
- Executes dropped EXE
PID:2308 -
\??\c:\tvrhvbt.exec:\tvrhvbt.exe33⤵
- Executes dropped EXE
PID:1256 -
\??\c:\tbxvtvx.exec:\tbxvtvx.exe34⤵
- Executes dropped EXE
PID:2304 -
\??\c:\pflbf.exec:\pflbf.exe35⤵
- Executes dropped EXE
PID:656 -
\??\c:\bdlhvhr.exec:\bdlhvhr.exe36⤵
- Executes dropped EXE
PID:2860 -
\??\c:\lvjjb.exec:\lvjjb.exe37⤵
- Executes dropped EXE
PID:2780 -
\??\c:\htndpt.exec:\htndpt.exe38⤵
- Executes dropped EXE
PID:2456 -
\??\c:\jfnrndl.exec:\jfnrndl.exe39⤵
- Executes dropped EXE
PID:3044 -
\??\c:\dpbdvfj.exec:\dpbdvfj.exe40⤵
- Executes dropped EXE
PID:2768 -
\??\c:\htflbh.exec:\htflbh.exe41⤵
- Executes dropped EXE
PID:2712 -
\??\c:\rdldhx.exec:\rdldhx.exe42⤵
- Executes dropped EXE
PID:2108 -
\??\c:\llfbpdb.exec:\llfbpdb.exe43⤵
- Executes dropped EXE
PID:1072 -
\??\c:\lbhpl.exec:\lbhpl.exe44⤵
- Executes dropped EXE
PID:1988 -
\??\c:\fhdnpvn.exec:\fhdnpvn.exe45⤵
- Executes dropped EXE
PID:2324 -
\??\c:\lbldldh.exec:\lbldldh.exe46⤵
- Executes dropped EXE
PID:1524 -
\??\c:\lpdxnx.exec:\lpdxnx.exe47⤵
- Executes dropped EXE
PID:1728 -
\??\c:\rbfrb.exec:\rbfrb.exe48⤵
- Executes dropped EXE
PID:1236 -
\??\c:\frdhrj.exec:\frdhrj.exe49⤵
- Executes dropped EXE
PID:2624 -
\??\c:\pxbbx.exec:\pxbbx.exe50⤵
- Executes dropped EXE
PID:592 -
\??\c:\pdpfrnt.exec:\pdpfrnt.exe51⤵
- Executes dropped EXE
PID:2936 -
\??\c:\vtnrf.exec:\vtnrf.exe52⤵
- Executes dropped EXE
PID:2984 -
\??\c:\lbxfb.exec:\lbxfb.exe53⤵
- Executes dropped EXE
PID:3020 -
\??\c:\hlrbnhh.exec:\hlrbnhh.exe54⤵
- Executes dropped EXE
PID:1948 -
\??\c:\fbfdtjt.exec:\fbfdtjt.exe55⤵
- Executes dropped EXE
PID:544 -
\??\c:\njrph.exec:\njrph.exe56⤵
- Executes dropped EXE
PID:2376 -
\??\c:\bptnjhd.exec:\bptnjhd.exe57⤵
- Executes dropped EXE
PID:2156 -
\??\c:\tdhntn.exec:\tdhntn.exe58⤵
- Executes dropped EXE
PID:2160 -
\??\c:\xnrhlrb.exec:\xnrhlrb.exe59⤵
- Executes dropped EXE
PID:2356 -
\??\c:\rvtrp.exec:\rvtrp.exe60⤵
- Executes dropped EXE
PID:1692 -
\??\c:\jjjnf.exec:\jjjnf.exe61⤵
- Executes dropped EXE
PID:956 -
\??\c:\lfxrx.exec:\lfxrx.exe62⤵
- Executes dropped EXE
PID:1700 -
\??\c:\bplttx.exec:\bplttx.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:388 -
\??\c:\xnfrlt.exec:\xnfrlt.exe64⤵
- Executes dropped EXE
PID:680 -
\??\c:\pdndlfx.exec:\pdndlfx.exe65⤵
- Executes dropped EXE
PID:1536 -
\??\c:\lrlbffp.exec:\lrlbffp.exe66⤵PID:280
-
\??\c:\dhbvhrv.exec:\dhbvhrv.exe67⤵PID:1796
-
\??\c:\bdvfdx.exec:\bdvfdx.exe68⤵
- System Location Discovery: System Language Discovery
PID:1040 -
\??\c:\tvdxh.exec:\tvdxh.exe69⤵PID:324
-
\??\c:\bjdtjjl.exec:\bjdtjjl.exe70⤵PID:2312
-
\??\c:\tpjxljn.exec:\tpjxljn.exe71⤵PID:2228
-
\??\c:\brfvr.exec:\brfvr.exe72⤵PID:1144
-
\??\c:\vfrlbjb.exec:\vfrlbjb.exe73⤵PID:1028
-
\??\c:\dtpnrdb.exec:\dtpnrdb.exe74⤵PID:740
-
\??\c:\bbbdth.exec:\bbbdth.exe75⤵PID:1032
-
\??\c:\fxnjh.exec:\fxnjh.exe76⤵PID:1688
-
\??\c:\rjdpt.exec:\rjdpt.exe77⤵PID:2772
-
\??\c:\hxxhntj.exec:\hxxhntj.exe78⤵PID:2872
-
\??\c:\pbnxxh.exec:\pbnxxh.exe79⤵PID:2912
-
\??\c:\dvrlvth.exec:\dvrlvth.exe80⤵PID:2736
-
\??\c:\xttrnv.exec:\xttrnv.exe81⤵PID:2456
-
\??\c:\jjvnrxj.exec:\jjvnrxj.exe82⤵PID:2824
-
\??\c:\tbtjj.exec:\tbtjj.exe83⤵PID:1740
-
\??\c:\vfhpjh.exec:\vfhpjh.exe84⤵PID:2712
-
\??\c:\bvjfvv.exec:\bvjfvv.exe85⤵PID:1716
-
\??\c:\pvhrh.exec:\pvhrh.exe86⤵PID:1180
-
\??\c:\tbvrnrb.exec:\tbvrnrb.exe87⤵
- System Location Discovery: System Language Discovery
PID:1696 -
\??\c:\rjfdjrl.exec:\rjfdjrl.exe88⤵PID:2128
-
\??\c:\nrbdpj.exec:\nrbdpj.exe89⤵PID:1680
-
\??\c:\lfjvtpf.exec:\lfjvtpf.exe90⤵PID:1928
-
\??\c:\jdbjr.exec:\jdbjr.exe91⤵PID:1728
-
\??\c:\hflpfnb.exec:\hflpfnb.exe92⤵PID:1476
-
\??\c:\hrpxtl.exec:\hrpxtl.exe93⤵PID:1480
-
\??\c:\lpnbvl.exec:\lpnbvl.exe94⤵PID:2920
-
\??\c:\pdhxtrv.exec:\pdhxtrv.exe95⤵PID:2888
-
\??\c:\xhjxtfn.exec:\xhjxtfn.exe96⤵PID:1916
-
\??\c:\tfvrt.exec:\tfvrt.exe97⤵PID:1668
-
\??\c:\vbbllt.exec:\vbbllt.exe98⤵PID:2100
-
\??\c:\xpxjr.exec:\xpxjr.exe99⤵PID:320
-
\??\c:\dvnhhh.exec:\dvnhhh.exe100⤵PID:2452
-
\??\c:\txvjld.exec:\txvjld.exe101⤵PID:2396
-
\??\c:\xjhnhvn.exec:\xjhnhvn.exe102⤵PID:2348
-
\??\c:\vrbvtv.exec:\vrbvtv.exe103⤵PID:2476
-
\??\c:\tljhr.exec:\tljhr.exe104⤵PID:2004
-
\??\c:\hpnfj.exec:\hpnfj.exe105⤵PID:1960
-
\??\c:\tbjrxp.exec:\tbjrxp.exe106⤵PID:880
-
\??\c:\vvtrn.exec:\vvtrn.exe107⤵PID:2116
-
\??\c:\drhfnp.exec:\drhfnp.exe108⤵PID:1868
-
\??\c:\lxxrt.exec:\lxxrt.exe109⤵PID:1756
-
\??\c:\btpjxt.exec:\btpjxt.exe110⤵PID:2536
-
\??\c:\xplvrp.exec:\xplvrp.exe111⤵PID:1852
-
\??\c:\fblxfhh.exec:\fblxfhh.exe112⤵PID:2408
-
\??\c:\bbnfvbx.exec:\bbnfvbx.exe113⤵PID:2288
-
\??\c:\vjlxv.exec:\vjlxv.exe114⤵PID:928
-
\??\c:\njbdn.exec:\njbdn.exe115⤵
- System Location Discovery: System Language Discovery
PID:1676 -
\??\c:\fvrldx.exec:\fvrldx.exe116⤵PID:1488
-
\??\c:\dltdxbx.exec:\dltdxbx.exe117⤵
- System Location Discovery: System Language Discovery
PID:1504 -
\??\c:\lfnff.exec:\lfnff.exe118⤵PID:1252
-
\??\c:\fbvpjdf.exec:\fbvpjdf.exe119⤵PID:1032
-
\??\c:\hnxrtn.exec:\hnxrtn.exe120⤵PID:2776
-
\??\c:\xpvdjdh.exec:\xpvdjdh.exe121⤵PID:2848
-
\??\c:\nbtpbf.exec:\nbtpbf.exe122⤵PID:2860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-