Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 16:43
Behavioral task
behavioral1
Sample
9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe
-
Size
130KB
-
MD5
e4af08a9a62ca02d025365c1da35ad20
-
SHA1
31c7ec90fa011ee884bf32889b60d9814f3fa01f
-
SHA256
9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498b
-
SHA512
7c2b5da67f65ec44f6546c36fabd6e6400626772958a1d1213cbd57c04b9831055b1d906d8eacfaed91eddda74863730e44733466f9374b92417ba974e6ac1fe
-
SSDEEP
3072:0hOmTsF93UYfwC6GIoutX8Kikz9qI+fPl/f:0cm4FmowdHoSH5L+Zf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral1/memory/2524-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2076-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1476-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2988-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1476-26-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2988-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3020-46-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2964-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2772-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2892-82-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2892-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2364-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1108-139-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2952-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/548-159-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1800-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2152-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2152-173-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2392-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2236-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2168-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2168-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1384-228-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1496-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2600-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2600-247-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2600-245-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2664-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/816-275-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/816-274-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1680-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2596-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3048-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1608-316-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2940-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2240-407-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1656-413-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1044-420-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/696-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2248-473-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2360-475-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2360-481-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2236-489-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2360-509-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2484-528-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2596-571-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2620-577-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2924-609-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2904-628-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2204-789-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/592-790-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2600-815-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2912-865-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1288-867-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2812-916-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2052-1021-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2376-1028-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1972-1041-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1812-1078-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2556-1130-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2928-1156-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2288-1243-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2076 ltrpplt.exe 1476 thttdjd.exe 2988 xbpnlh.exe 3020 xrvxtv.exe 2964 bdpfp.exe 2796 vnxvvf.exe 2772 bbprbr.exe 2892 dnjrl.exe 2364 bflvdrx.exe 2748 ndnpb.exe 1700 jhvdvdv.exe 1564 rjhfdj.exe 1944 fpphj.exe 2952 pfvvtn.exe 1108 vhjxx.exe 1800 lhbrf.exe 548 fflfvj.exe 2152 pllbxlj.exe 2392 txxbdhh.exe 2236 xjdptpl.exe 2168 lnphn.exe 2128 bxljbd.exe 1804 tlptfd.exe 1384 rbxxxp.exe 1496 rdpxdnh.exe 2600 vxlbf.exe 2060 fthfxpj.exe 2664 xdlftd.exe 816 rrhtvd.exe 2596 ddlptdd.exe 1680 hbddpxx.exe 2560 xttvb.exe 3048 frxvl.exe 1608 vhrxb.exe 2928 bpvnbxv.exe 3012 jptdxp.exe 2776 bnxff.exe 2904 fflvrp.exe 636 xrxvfdb.exe 2804 njvrlll.exe 536 lpbrf.exe 2772 fdphf.exe 2500 xtvdlj.exe 2940 nhtprhf.exe 1652 htdvvjj.exe 2476 xdfnj.exe 1044 jthrv.exe 2240 pdhdp.exe 1656 rdxflxl.exe 3004 xxdxnxd.exe 2368 xtbhh.exe 2952 vbnfbhr.exe 696 npvdfrd.exe 2000 rdthdx.exe 2380 lxtxh.exe 588 rvtxlb.exe 2504 rjdrhr.exe 2248 xltdxd.exe 2360 hhdrbxt.exe 2236 rnbvjfh.exe 2188 hpdpnr.exe 1348 htrxfd.exe 1624 vfbtvxf.exe 2460 vtfvrl.exe -
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000012266-6.dat upx behavioral1/memory/2524-8-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2076-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0003000000018334-18.dat upx behavioral1/memory/2524-3-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/1476-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000018b28-27.dat upx behavioral1/memory/2988-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000018b50-38.dat upx behavioral1/memory/2988-37-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000018b54-47.dat upx behavioral1/files/0x0007000000018b64-55.dat upx behavioral1/memory/2964-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000018b71-63.dat upx behavioral1/memory/2772-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000018b89-74.dat upx behavioral1/memory/2772-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2892-82-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0008000000018baf-83.dat upx behavioral1/memory/2892-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2364-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000018bbf-93.dat upx behavioral1/files/0x00280000000186b7-102.dat upx behavioral1/memory/1564-110-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001998d-109.dat upx behavioral1/files/0x0005000000019bf5-119.dat upx behavioral1/files/0x0005000000019bf6-127.dat upx behavioral1/files/0x0005000000019bf9-136.dat upx behavioral1/memory/1108-139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2952-137-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019c3c-146.dat upx behavioral1/files/0x0005000000019d61-155.dat upx behavioral1/memory/548-159-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1800-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019d62-165.dat upx behavioral1/memory/2152-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2392-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019d6d-174.dat upx behavioral1/files/0x0005000000019e92-185.dat upx behavioral1/memory/2392-184-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2236-194-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2168-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019fd4-196.dat upx behavioral1/memory/2168-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019fdd-204.dat upx behavioral1/files/0x000500000001a03c-212.dat upx behavioral1/files/0x000500000001a049-220.dat upx behavioral1/memory/1384-228-0x00000000001B0000-0x00000000001D7000-memory.dmp upx behavioral1/files/0x000500000001a0b6-230.dat upx behavioral1/memory/1496-231-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001a309-239.dat upx behavioral1/files/0x000500000001a3ab-250.dat upx behavioral1/memory/2600-249-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2600-245-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x000500000001a3f6-257.dat upx behavioral1/files/0x000500000001a3f8-266.dat upx behavioral1/memory/2664-265-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001a3fd-276.dat upx behavioral1/memory/1680-288-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001a404-294.dat upx behavioral1/files/0x000500000001a400-286.dat upx behavioral1/memory/2596-284-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3048-309-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prffv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrffjvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlbvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnjrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnljbxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhhbvjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntdnjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtbnbdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfptddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbpphbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxxhtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftfvvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfxdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhhjhph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvrjptr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxdvvrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbrhfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndnbpbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fthfxpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phjrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbtlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnfvrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtnndh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhpndn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfvjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blnvrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvtvnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txplfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdphtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvrbpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxvbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpjrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhbdxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fprjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlvjj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2076 2524 9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe 30 PID 2524 wrote to memory of 2076 2524 9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe 30 PID 2524 wrote to memory of 2076 2524 9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe 30 PID 2524 wrote to memory of 2076 2524 9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe 30 PID 2076 wrote to memory of 1476 2076 ltrpplt.exe 31 PID 2076 wrote to memory of 1476 2076 ltrpplt.exe 31 PID 2076 wrote to memory of 1476 2076 ltrpplt.exe 31 PID 2076 wrote to memory of 1476 2076 ltrpplt.exe 31 PID 1476 wrote to memory of 2988 1476 thttdjd.exe 32 PID 1476 wrote to memory of 2988 1476 thttdjd.exe 32 PID 1476 wrote to memory of 2988 1476 thttdjd.exe 32 PID 1476 wrote to memory of 2988 1476 thttdjd.exe 32 PID 2988 wrote to memory of 3020 2988 xbpnlh.exe 33 PID 2988 wrote to memory of 3020 2988 xbpnlh.exe 33 PID 2988 wrote to memory of 3020 2988 xbpnlh.exe 33 PID 2988 wrote to memory of 3020 2988 xbpnlh.exe 33 PID 3020 wrote to memory of 2964 3020 xrvxtv.exe 34 PID 3020 wrote to memory of 2964 3020 xrvxtv.exe 34 PID 3020 wrote to memory of 2964 3020 xrvxtv.exe 34 PID 3020 wrote to memory of 2964 3020 xrvxtv.exe 34 PID 2964 wrote to memory of 2796 2964 bdpfp.exe 35 PID 2964 wrote to memory of 2796 2964 bdpfp.exe 35 PID 2964 wrote to memory of 2796 2964 bdpfp.exe 35 PID 2964 wrote to memory of 2796 2964 bdpfp.exe 35 PID 2796 wrote to memory of 2772 2796 vnxvvf.exe 36 PID 2796 wrote to memory of 2772 2796 vnxvvf.exe 36 PID 2796 wrote to memory of 2772 2796 vnxvvf.exe 36 PID 2796 wrote to memory of 2772 2796 vnxvvf.exe 36 PID 2772 wrote to memory of 2892 2772 bbprbr.exe 37 PID 2772 wrote to memory of 2892 2772 bbprbr.exe 37 PID 2772 wrote to memory of 2892 2772 bbprbr.exe 37 PID 2772 wrote to memory of 2892 2772 bbprbr.exe 37 PID 2892 wrote to memory of 2364 2892 dnjrl.exe 38 PID 2892 wrote to memory of 2364 2892 dnjrl.exe 38 PID 2892 wrote to memory of 2364 2892 dnjrl.exe 38 PID 2892 wrote to memory of 2364 2892 dnjrl.exe 38 PID 2364 wrote to memory of 2748 2364 bflvdrx.exe 39 PID 2364 wrote to memory of 2748 2364 bflvdrx.exe 39 PID 2364 wrote to memory of 2748 2364 bflvdrx.exe 39 PID 2364 wrote to memory of 2748 2364 bflvdrx.exe 39 PID 2748 wrote to memory of 1700 2748 ndnpb.exe 40 PID 2748 wrote to memory of 1700 2748 ndnpb.exe 40 PID 2748 wrote to memory of 1700 2748 ndnpb.exe 40 PID 2748 wrote to memory of 1700 2748 ndnpb.exe 40 PID 1700 wrote to memory of 1564 1700 jhvdvdv.exe 41 PID 1700 wrote to memory of 1564 1700 jhvdvdv.exe 41 PID 1700 wrote to memory of 1564 1700 jhvdvdv.exe 41 PID 1700 wrote to memory of 1564 1700 jhvdvdv.exe 41 PID 1564 wrote to memory of 1944 1564 rjhfdj.exe 42 PID 1564 wrote to memory of 1944 1564 rjhfdj.exe 42 PID 1564 wrote to memory of 1944 1564 rjhfdj.exe 42 PID 1564 wrote to memory of 1944 1564 rjhfdj.exe 42 PID 1944 wrote to memory of 2952 1944 fpphj.exe 43 PID 1944 wrote to memory of 2952 1944 fpphj.exe 43 PID 1944 wrote to memory of 2952 1944 fpphj.exe 43 PID 1944 wrote to memory of 2952 1944 fpphj.exe 43 PID 2952 wrote to memory of 1108 2952 pfvvtn.exe 44 PID 2952 wrote to memory of 1108 2952 pfvvtn.exe 44 PID 2952 wrote to memory of 1108 2952 pfvvtn.exe 44 PID 2952 wrote to memory of 1108 2952 pfvvtn.exe 44 PID 1108 wrote to memory of 1800 1108 vhjxx.exe 45 PID 1108 wrote to memory of 1800 1108 vhjxx.exe 45 PID 1108 wrote to memory of 1800 1108 vhjxx.exe 45 PID 1108 wrote to memory of 1800 1108 vhjxx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe"C:\Users\Admin\AppData\Local\Temp\9aea6b8cfdb629d27b7b4dcab3cf5e81eafb5aac2be8d49df2886775f9fd498bN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\ltrpplt.exec:\ltrpplt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\thttdjd.exec:\thttdjd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\xbpnlh.exec:\xbpnlh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\xrvxtv.exec:\xrvxtv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\bdpfp.exec:\bdpfp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\vnxvvf.exec:\vnxvvf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\bbprbr.exec:\bbprbr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\dnjrl.exec:\dnjrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\bflvdrx.exec:\bflvdrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\ndnpb.exec:\ndnpb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\jhvdvdv.exec:\jhvdvdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\rjhfdj.exec:\rjhfdj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\fpphj.exec:\fpphj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\pfvvtn.exec:\pfvvtn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\vhjxx.exec:\vhjxx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\lhbrf.exec:\lhbrf.exe17⤵
- Executes dropped EXE
PID:1800 -
\??\c:\fflfvj.exec:\fflfvj.exe18⤵
- Executes dropped EXE
PID:548 -
\??\c:\pllbxlj.exec:\pllbxlj.exe19⤵
- Executes dropped EXE
PID:2152 -
\??\c:\txxbdhh.exec:\txxbdhh.exe20⤵
- Executes dropped EXE
PID:2392 -
\??\c:\xjdptpl.exec:\xjdptpl.exe21⤵
- Executes dropped EXE
PID:2236 -
\??\c:\lnphn.exec:\lnphn.exe22⤵
- Executes dropped EXE
PID:2168 -
\??\c:\bxljbd.exec:\bxljbd.exe23⤵
- Executes dropped EXE
PID:2128 -
\??\c:\tlptfd.exec:\tlptfd.exe24⤵
- Executes dropped EXE
PID:1804 -
\??\c:\rbxxxp.exec:\rbxxxp.exe25⤵
- Executes dropped EXE
PID:1384 -
\??\c:\rdpxdnh.exec:\rdpxdnh.exe26⤵
- Executes dropped EXE
PID:1496 -
\??\c:\vxlbf.exec:\vxlbf.exe27⤵
- Executes dropped EXE
PID:2600 -
\??\c:\fthfxpj.exec:\fthfxpj.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060 -
\??\c:\xdlftd.exec:\xdlftd.exe29⤵
- Executes dropped EXE
PID:2664 -
\??\c:\rrhtvd.exec:\rrhtvd.exe30⤵
- Executes dropped EXE
PID:816 -
\??\c:\ddlptdd.exec:\ddlptdd.exe31⤵
- Executes dropped EXE
PID:2596 -
\??\c:\hbddpxx.exec:\hbddpxx.exe32⤵
- Executes dropped EXE
PID:1680 -
\??\c:\xttvb.exec:\xttvb.exe33⤵
- Executes dropped EXE
PID:2560 -
\??\c:\frxvl.exec:\frxvl.exe34⤵
- Executes dropped EXE
PID:3048 -
\??\c:\vhrxb.exec:\vhrxb.exe35⤵
- Executes dropped EXE
PID:1608 -
\??\c:\bpvnbxv.exec:\bpvnbxv.exe36⤵
- Executes dropped EXE
PID:2928 -
\??\c:\jptdxp.exec:\jptdxp.exe37⤵
- Executes dropped EXE
PID:3012 -
\??\c:\bnxff.exec:\bnxff.exe38⤵
- Executes dropped EXE
PID:2776 -
\??\c:\fflvrp.exec:\fflvrp.exe39⤵
- Executes dropped EXE
PID:2904 -
\??\c:\xrxvfdb.exec:\xrxvfdb.exe40⤵
- Executes dropped EXE
PID:636 -
\??\c:\njvrlll.exec:\njvrlll.exe41⤵
- Executes dropped EXE
PID:2804 -
\??\c:\lpbrf.exec:\lpbrf.exe42⤵
- Executes dropped EXE
PID:536 -
\??\c:\fdphf.exec:\fdphf.exe43⤵
- Executes dropped EXE
PID:2772 -
\??\c:\xtvdlj.exec:\xtvdlj.exe44⤵
- Executes dropped EXE
PID:2500 -
\??\c:\nhtprhf.exec:\nhtprhf.exe45⤵
- Executes dropped EXE
PID:2940 -
\??\c:\htdvvjj.exec:\htdvvjj.exe46⤵
- Executes dropped EXE
PID:1652 -
\??\c:\xdfnj.exec:\xdfnj.exe47⤵
- Executes dropped EXE
PID:2476 -
\??\c:\jthrv.exec:\jthrv.exe48⤵
- Executes dropped EXE
PID:1044 -
\??\c:\pdhdp.exec:\pdhdp.exe49⤵
- Executes dropped EXE
PID:2240 -
\??\c:\rdxflxl.exec:\rdxflxl.exe50⤵
- Executes dropped EXE
PID:1656 -
\??\c:\xxdxnxd.exec:\xxdxnxd.exe51⤵
- Executes dropped EXE
PID:3004 -
\??\c:\xtbhh.exec:\xtbhh.exe52⤵
- Executes dropped EXE
PID:2368 -
\??\c:\vbnfbhr.exec:\vbnfbhr.exe53⤵
- Executes dropped EXE
PID:2952 -
\??\c:\npvdfrd.exec:\npvdfrd.exe54⤵
- Executes dropped EXE
PID:696 -
\??\c:\rdthdx.exec:\rdthdx.exe55⤵
- Executes dropped EXE
PID:2000 -
\??\c:\lxtxh.exec:\lxtxh.exe56⤵
- Executes dropped EXE
PID:2380 -
\??\c:\rvtxlb.exec:\rvtxlb.exe57⤵
- Executes dropped EXE
PID:588 -
\??\c:\rjdrhr.exec:\rjdrhr.exe58⤵
- Executes dropped EXE
PID:2504 -
\??\c:\xltdxd.exec:\xltdxd.exe59⤵
- Executes dropped EXE
PID:2248 -
\??\c:\hhdrbxt.exec:\hhdrbxt.exe60⤵
- Executes dropped EXE
PID:2360 -
\??\c:\rnbvjfh.exec:\rnbvjfh.exe61⤵
- Executes dropped EXE
PID:2236 -
\??\c:\hpdpnr.exec:\hpdpnr.exe62⤵
- Executes dropped EXE
PID:2188 -
\??\c:\htrxfd.exec:\htrxfd.exe63⤵
- Executes dropped EXE
PID:1348 -
\??\c:\vfbtvxf.exec:\vfbtvxf.exe64⤵
- Executes dropped EXE
PID:1624 -
\??\c:\vtfvrl.exec:\vtfvrl.exe65⤵
- Executes dropped EXE
PID:2460 -
\??\c:\lhrdft.exec:\lhrdft.exe66⤵PID:1100
-
\??\c:\fhjlxth.exec:\fhjlxth.exe67⤵PID:2484
-
\??\c:\lhbnd.exec:\lhbnd.exe68⤵PID:2600
-
\??\c:\hbvxj.exec:\hbvxj.exe69⤵PID:1552
-
\??\c:\rdjnt.exec:\rdjnt.exe70⤵PID:1004
-
\??\c:\nxxrvnv.exec:\nxxrvnv.exe71⤵PID:1060
-
\??\c:\rhdpnbx.exec:\rhdpnbx.exe72⤵PID:1332
-
\??\c:\hvdvrpv.exec:\hvdvrpv.exe73⤵PID:1020
-
\??\c:\hrvrx.exec:\hrvrx.exe74⤵PID:2596
-
\??\c:\bntlp.exec:\bntlp.exe75⤵PID:2620
-
\??\c:\dtvndb.exec:\dtvndb.exe76⤵PID:2528
-
\??\c:\rtvptj.exec:\rtvptj.exe77⤵PID:1692
-
\??\c:\rxfvjb.exec:\rxfvjb.exe78⤵
- System Location Discovery: System Language Discovery
PID:1708 -
\??\c:\pplrbjh.exec:\pplrbjh.exe79⤵PID:2244
-
\??\c:\dbllf.exec:\dbllf.exe80⤵PID:2924
-
\??\c:\fthhrp.exec:\fthhrp.exe81⤵PID:2876
-
\??\c:\pfvfdnr.exec:\pfvfdnr.exe82⤵PID:2932
-
\??\c:\xjltv.exec:\xjltv.exe83⤵PID:2904
-
\??\c:\hprhr.exec:\hprhr.exe84⤵PID:2884
-
\??\c:\lxhhlrl.exec:\lxhhlrl.exe85⤵PID:2964
-
\??\c:\bxplnbh.exec:\bxplnbh.exe86⤵PID:2784
-
\??\c:\vdhdddh.exec:\vdhdddh.exe87⤵PID:2788
-
\??\c:\jbfxdv.exec:\jbfxdv.exe88⤵PID:2508
-
\??\c:\bfrhd.exec:\bfrhd.exe89⤵PID:2892
-
\??\c:\fhjptp.exec:\fhjptp.exe90⤵PID:2544
-
\??\c:\nlpxfn.exec:\nlpxfn.exe91⤵PID:2476
-
\??\c:\lhnnj.exec:\lhnnj.exe92⤵PID:1044
-
\??\c:\rfbjbj.exec:\rfbjbj.exe93⤵PID:2240
-
\??\c:\frhdrpf.exec:\frhdrpf.exe94⤵PID:2860
-
\??\c:\tbxdtp.exec:\tbxdtp.exe95⤵PID:3004
-
\??\c:\ddrrtrl.exec:\ddrrtrl.exe96⤵PID:2112
-
\??\c:\nvxbnlr.exec:\nvxbnlr.exe97⤵PID:284
-
\??\c:\hvltl.exec:\hvltl.exe98⤵PID:696
-
\??\c:\rplhrvt.exec:\rplhrvt.exe99⤵PID:1880
-
\??\c:\bnbff.exec:\bnbff.exe100⤵PID:2428
-
\??\c:\txnxpr.exec:\txnxpr.exe101⤵PID:2400
-
\??\c:\ldlvv.exec:\ldlvv.exe102⤵PID:2404
-
\??\c:\hnbfvh.exec:\hnbfvh.exe103⤵PID:2392
-
\??\c:\vrfdfv.exec:\vrfdfv.exe104⤵PID:976
-
\??\c:\rnbrv.exec:\rnbrv.exe105⤵PID:864
-
\??\c:\xpxhvb.exec:\xpxhvb.exe106⤵PID:904
-
\??\c:\ldxhd.exec:\ldxhd.exe107⤵PID:840
-
\??\c:\tvrdxvl.exec:\tvrdxvl.exe108⤵PID:1348
-
\??\c:\tlhbjlh.exec:\tlhbjlh.exe109⤵PID:2204
-
\??\c:\dnldr.exec:\dnldr.exe110⤵PID:592
-
\??\c:\xhpffrl.exec:\xhpffrl.exe111⤵PID:2624
-
\??\c:\xxhhhl.exec:\xxhhhl.exe112⤵PID:1536
-
\??\c:\fpdfj.exec:\fpdfj.exe113⤵PID:2600
-
\??\c:\xdhvbtt.exec:\xdhvbtt.exe114⤵PID:1552
-
\??\c:\dvfjfn.exec:\dvfjfn.exe115⤵PID:2420
-
\??\c:\nrbvn.exec:\nrbvn.exe116⤵PID:1060
-
\??\c:\rrddl.exec:\rrddl.exe117⤵PID:1332
-
\??\c:\hlndl.exec:\hlndl.exe118⤵PID:1020
-
\??\c:\bbhtdhf.exec:\bbhtdhf.exe119⤵PID:2596
-
\??\c:\vfbxf.exec:\vfbxf.exe120⤵PID:2620
-
\??\c:\jtnljlv.exec:\jtnljlv.exe121⤵PID:2912
-
\??\c:\nxljt.exec:\nxljt.exe122⤵PID:1288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-