Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 03:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe
-
Size
455KB
-
MD5
e1f5421a7824f8a21213a42eb6906b73
-
SHA1
3d523fbea75e02325fdfab4963f54e85d0d834f1
-
SHA256
b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad
-
SHA512
b2f25feed71382b8ebd53e52083fd8af653debbf925a3d71894f479b192d1a13fff2a4906041e7a7095f0f23434c8246ae00f14985eb7defa95a0711eb075c10
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeJ:q7Tc2NYHUrAwfMp3CDJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 44 IoCs
resource yara_rule behavioral1/memory/1580-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2772-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2736-28-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2812-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2928-57-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2636-67-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2824-75-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1072-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2688-93-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2892-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1728-120-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2952-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2184-143-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/832-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2464-164-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2340-161-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2340-159-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/2464-172-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/1184-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2464-199-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/2020-204-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/2020-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2880-221-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2880-224-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2004-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2840-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2364-275-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1152-293-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2360-310-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2860-349-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2332-363-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2592-365-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2632-441-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2632-442-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/332-449-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2472-470-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2116-483-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/1804-533-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1548-546-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2360-603-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2772-900-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2728-945-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/552-976-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/1776-1004-0x00000000001C0000-0x00000000001EA000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2772 nhflnp.exe 2736 nbbdhl.exe 2812 ltbnh.exe 2708 btthr.exe 2928 phhpjd.exe 2636 pfnjv.exe 2824 ntdvnv.exe 1072 jbxlt.exe 2688 prptnlv.exe 2892 xbvfff.exe 2660 pvbjh.exe 1728 lvbxpb.exe 2952 vxdjxdf.exe 832 nfbfvdt.exe 2184 pxpdft.exe 2340 bdfbxv.exe 2464 hnxxv.exe 1184 pdbrx.exe 2148 nnvjn.exe 2120 hfpvjv.exe 2020 tblvph.exe 1600 nnvnvv.exe 2880 hhndjrv.exe 2004 dffhb.exe 1548 fllvlfj.exe 2840 drvdbt.exe 1604 nvljlvd.exe 2364 hnpptth.exe 2456 tbdrl.exe 1152 hltxnl.exe 1948 trpjpp.exe 2360 hjjfvp.exe 2448 phnbn.exe 1744 dlbnn.exe 2300 vrfpb.exe 2720 frjrd.exe 2796 bfjff.exe 2860 rxfdf.exe 1064 dbtdhf.exe 2332 vjbpnph.exe 2592 dvnvdjt.exe 2576 rhxpxnt.exe 2824 nbvvxh.exe 2168 pjxnrd.exe 2572 ptxdnn.exe 2924 vhbprl.exe 1028 lxfdt.exe 2780 fjfvr.exe 2660 lxrrjt.exe 1776 fbxjf.exe 860 nnxfjrr.exe 2632 fplvx.exe 332 phnphbp.exe 524 fbfxh.exe 2340 vppnvnv.exe 1384 pxnjdjn.exe 2472 lfhxvhb.exe 2116 njnpphl.exe 2292 rhjnn.exe 1516 flnvvlv.exe 944 lhdndtt.exe 976 xphff.exe 1536 bdjlnd.exe 280 xvnlb.exe -
resource yara_rule behavioral1/memory/1580-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2772-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2736-28-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2812-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2812-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2928-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2928-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2636-67-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2824-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1072-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2688-93-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2892-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1728-120-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2952-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2184-143-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/832-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2464-164-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2340-161-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1184-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2020-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2880-221-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2004-230-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2004-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1548-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2840-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2364-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1152-293-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2360-310-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2796-336-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2332-363-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2592-365-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1776-421-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/860-428-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2632-442-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/332-449-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2472-470-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1804-533-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1512-547-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1548-546-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2360-603-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2408-715-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2184-728-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2772-894-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/552-976-0x00000000003C0000-0x00000000003EA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhjfrtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvfhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlhxvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjfxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfjhll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nddtddn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnffb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdnnlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fftdnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnrjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnhvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hllxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttjrtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlrtpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtnrlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnnfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrnvhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxnjdjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnpllvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpffjdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtbltnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjpnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlljvdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbhrrnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njnpphl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhfrlhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljvlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfrnlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnxbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhbbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfxnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjfxntp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvfnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvdnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfjplx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnfnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htfhnnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnpbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thjnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtfvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhhnvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdhjpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjprftf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2772 1580 b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe 30 PID 1580 wrote to memory of 2772 1580 b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe 30 PID 1580 wrote to memory of 2772 1580 b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe 30 PID 1580 wrote to memory of 2772 1580 b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe 30 PID 2772 wrote to memory of 2736 2772 nhflnp.exe 31 PID 2772 wrote to memory of 2736 2772 nhflnp.exe 31 PID 2772 wrote to memory of 2736 2772 nhflnp.exe 31 PID 2772 wrote to memory of 2736 2772 nhflnp.exe 31 PID 2736 wrote to memory of 2812 2736 nbbdhl.exe 32 PID 2736 wrote to memory of 2812 2736 nbbdhl.exe 32 PID 2736 wrote to memory of 2812 2736 nbbdhl.exe 32 PID 2736 wrote to memory of 2812 2736 nbbdhl.exe 32 PID 2812 wrote to memory of 2708 2812 ltbnh.exe 33 PID 2812 wrote to memory of 2708 2812 ltbnh.exe 33 PID 2812 wrote to memory of 2708 2812 ltbnh.exe 33 PID 2812 wrote to memory of 2708 2812 ltbnh.exe 33 PID 2708 wrote to memory of 2928 2708 btthr.exe 34 PID 2708 wrote to memory of 2928 2708 btthr.exe 34 PID 2708 wrote to memory of 2928 2708 btthr.exe 34 PID 2708 wrote to memory of 2928 2708 btthr.exe 34 PID 2928 wrote to memory of 2636 2928 phhpjd.exe 35 PID 2928 wrote to memory of 2636 2928 phhpjd.exe 35 PID 2928 wrote to memory of 2636 2928 phhpjd.exe 35 PID 2928 wrote to memory of 2636 2928 phhpjd.exe 35 PID 2636 wrote to memory of 2824 2636 pfnjv.exe 36 PID 2636 wrote to memory of 2824 2636 pfnjv.exe 36 PID 2636 wrote to memory of 2824 2636 pfnjv.exe 36 PID 2636 wrote to memory of 2824 2636 pfnjv.exe 36 PID 2824 wrote to memory of 1072 2824 ntdvnv.exe 37 PID 2824 wrote to memory of 1072 2824 ntdvnv.exe 37 PID 2824 wrote to memory of 1072 2824 ntdvnv.exe 37 PID 2824 wrote to memory of 1072 2824 ntdvnv.exe 37 PID 1072 wrote to memory of 2688 1072 jbxlt.exe 38 PID 1072 wrote to memory of 2688 1072 jbxlt.exe 38 PID 1072 wrote to memory of 2688 1072 jbxlt.exe 38 PID 1072 wrote to memory of 2688 1072 jbxlt.exe 38 PID 2688 wrote to memory of 2892 2688 prptnlv.exe 39 PID 2688 wrote to memory of 2892 2688 prptnlv.exe 39 PID 2688 wrote to memory of 2892 2688 prptnlv.exe 39 PID 2688 wrote to memory of 2892 2688 prptnlv.exe 39 PID 2892 wrote to memory of 2660 2892 xbvfff.exe 40 PID 2892 wrote to memory of 2660 2892 xbvfff.exe 40 PID 2892 wrote to memory of 2660 2892 xbvfff.exe 40 PID 2892 wrote to memory of 2660 2892 xbvfff.exe 40 PID 2660 wrote to memory of 1728 2660 pvbjh.exe 41 PID 2660 wrote to memory of 1728 2660 pvbjh.exe 41 PID 2660 wrote to memory of 1728 2660 pvbjh.exe 41 PID 2660 wrote to memory of 1728 2660 pvbjh.exe 41 PID 1728 wrote to memory of 2952 1728 lvbxpb.exe 42 PID 1728 wrote to memory of 2952 1728 lvbxpb.exe 42 PID 1728 wrote to memory of 2952 1728 lvbxpb.exe 42 PID 1728 wrote to memory of 2952 1728 lvbxpb.exe 42 PID 2952 wrote to memory of 832 2952 vxdjxdf.exe 43 PID 2952 wrote to memory of 832 2952 vxdjxdf.exe 43 PID 2952 wrote to memory of 832 2952 vxdjxdf.exe 43 PID 2952 wrote to memory of 832 2952 vxdjxdf.exe 43 PID 832 wrote to memory of 2184 832 nfbfvdt.exe 44 PID 832 wrote to memory of 2184 832 nfbfvdt.exe 44 PID 832 wrote to memory of 2184 832 nfbfvdt.exe 44 PID 832 wrote to memory of 2184 832 nfbfvdt.exe 44 PID 2184 wrote to memory of 2340 2184 pxpdft.exe 45 PID 2184 wrote to memory of 2340 2184 pxpdft.exe 45 PID 2184 wrote to memory of 2340 2184 pxpdft.exe 45 PID 2184 wrote to memory of 2340 2184 pxpdft.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe"C:\Users\Admin\AppData\Local\Temp\b4ccb52eb1660f7883a2501894ab81a58eacc702506c5917e52f9d9f183aadad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\nhflnp.exec:\nhflnp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\nbbdhl.exec:\nbbdhl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\ltbnh.exec:\ltbnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\btthr.exec:\btthr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\phhpjd.exec:\phhpjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\pfnjv.exec:\pfnjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\ntdvnv.exec:\ntdvnv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\jbxlt.exec:\jbxlt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\prptnlv.exec:\prptnlv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\xbvfff.exec:\xbvfff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\pvbjh.exec:\pvbjh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\lvbxpb.exec:\lvbxpb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\vxdjxdf.exec:\vxdjxdf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\nfbfvdt.exec:\nfbfvdt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
\??\c:\pxpdft.exec:\pxpdft.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\bdfbxv.exec:\bdfbxv.exe17⤵
- Executes dropped EXE
PID:2340 -
\??\c:\hnxxv.exec:\hnxxv.exe18⤵
- Executes dropped EXE
PID:2464 -
\??\c:\pdbrx.exec:\pdbrx.exe19⤵
- Executes dropped EXE
PID:1184 -
\??\c:\nnvjn.exec:\nnvjn.exe20⤵
- Executes dropped EXE
PID:2148 -
\??\c:\hfpvjv.exec:\hfpvjv.exe21⤵
- Executes dropped EXE
PID:2120 -
\??\c:\tblvph.exec:\tblvph.exe22⤵
- Executes dropped EXE
PID:2020 -
\??\c:\nnvnvv.exec:\nnvnvv.exe23⤵
- Executes dropped EXE
PID:1600 -
\??\c:\hhndjrv.exec:\hhndjrv.exe24⤵
- Executes dropped EXE
PID:2880 -
\??\c:\dffhb.exec:\dffhb.exe25⤵
- Executes dropped EXE
PID:2004 -
\??\c:\fllvlfj.exec:\fllvlfj.exe26⤵
- Executes dropped EXE
PID:1548 -
\??\c:\drvdbt.exec:\drvdbt.exe27⤵
- Executes dropped EXE
PID:2840 -
\??\c:\nvljlvd.exec:\nvljlvd.exe28⤵
- Executes dropped EXE
PID:1604 -
\??\c:\hnpptth.exec:\hnpptth.exe29⤵
- Executes dropped EXE
PID:2364 -
\??\c:\tbdrl.exec:\tbdrl.exe30⤵
- Executes dropped EXE
PID:2456 -
\??\c:\hltxnl.exec:\hltxnl.exe31⤵
- Executes dropped EXE
PID:1152 -
\??\c:\trpjpp.exec:\trpjpp.exe32⤵
- Executes dropped EXE
PID:1948 -
\??\c:\hjjfvp.exec:\hjjfvp.exe33⤵
- Executes dropped EXE
PID:2360 -
\??\c:\phnbn.exec:\phnbn.exe34⤵
- Executes dropped EXE
PID:2448 -
\??\c:\dlbnn.exec:\dlbnn.exe35⤵
- Executes dropped EXE
PID:1744 -
\??\c:\vrfpb.exec:\vrfpb.exe36⤵
- Executes dropped EXE
PID:2300 -
\??\c:\frjrd.exec:\frjrd.exe37⤵
- Executes dropped EXE
PID:2720 -
\??\c:\bfjff.exec:\bfjff.exe38⤵
- Executes dropped EXE
PID:2796 -
\??\c:\rxfdf.exec:\rxfdf.exe39⤵
- Executes dropped EXE
PID:2860 -
\??\c:\dbtdhf.exec:\dbtdhf.exe40⤵
- Executes dropped EXE
PID:1064 -
\??\c:\vjbpnph.exec:\vjbpnph.exe41⤵
- Executes dropped EXE
PID:2332 -
\??\c:\dvnvdjt.exec:\dvnvdjt.exe42⤵
- Executes dropped EXE
PID:2592 -
\??\c:\rhxpxnt.exec:\rhxpxnt.exe43⤵
- Executes dropped EXE
PID:2576 -
\??\c:\nbvvxh.exec:\nbvvxh.exe44⤵
- Executes dropped EXE
PID:2824 -
\??\c:\pjxnrd.exec:\pjxnrd.exe45⤵
- Executes dropped EXE
PID:2168 -
\??\c:\ptxdnn.exec:\ptxdnn.exe46⤵
- Executes dropped EXE
PID:2572 -
\??\c:\vhbprl.exec:\vhbprl.exe47⤵
- Executes dropped EXE
PID:2924 -
\??\c:\lxfdt.exec:\lxfdt.exe48⤵
- Executes dropped EXE
PID:1028 -
\??\c:\fjfvr.exec:\fjfvr.exe49⤵
- Executes dropped EXE
PID:2780 -
\??\c:\lxrrjt.exec:\lxrrjt.exe50⤵
- Executes dropped EXE
PID:2660 -
\??\c:\fbxjf.exec:\fbxjf.exe51⤵
- Executes dropped EXE
PID:1776 -
\??\c:\nnxfjrr.exec:\nnxfjrr.exe52⤵
- Executes dropped EXE
PID:860 -
\??\c:\fplvx.exec:\fplvx.exe53⤵
- Executes dropped EXE
PID:2632 -
\??\c:\phnphbp.exec:\phnphbp.exe54⤵
- Executes dropped EXE
PID:332 -
\??\c:\fbfxh.exec:\fbfxh.exe55⤵
- Executes dropped EXE
PID:524 -
\??\c:\vppnvnv.exec:\vppnvnv.exe56⤵
- Executes dropped EXE
PID:2340 -
\??\c:\pxnjdjn.exec:\pxnjdjn.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1384 -
\??\c:\lfhxvhb.exec:\lfhxvhb.exe58⤵
- Executes dropped EXE
PID:2472 -
\??\c:\njnpphl.exec:\njnpphl.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
\??\c:\rhjnn.exec:\rhjnn.exe60⤵
- Executes dropped EXE
PID:2292 -
\??\c:\flnvvlv.exec:\flnvvlv.exe61⤵
- Executes dropped EXE
PID:1516 -
\??\c:\lhdndtt.exec:\lhdndtt.exe62⤵
- Executes dropped EXE
PID:944 -
\??\c:\xphff.exec:\xphff.exe63⤵
- Executes dropped EXE
PID:976 -
\??\c:\bdjlnd.exec:\bdjlnd.exe64⤵
- Executes dropped EXE
PID:1536 -
\??\c:\xvnlb.exec:\xvnlb.exe65⤵
- Executes dropped EXE
PID:280 -
\??\c:\lbrphv.exec:\lbrphv.exe66⤵PID:780
-
\??\c:\rlltbtx.exec:\rlltbtx.exe67⤵PID:1468
-
\??\c:\txvrpb.exec:\txvrpb.exe68⤵PID:1804
-
\??\c:\tvpxfr.exec:\tvpxfr.exe69⤵PID:1548
-
\??\c:\fjllnt.exec:\fjllnt.exe70⤵PID:1512
-
\??\c:\jnxln.exec:\jnxln.exe71⤵PID:1604
-
\??\c:\pxldnpp.exec:\pxldnpp.exe72⤵PID:2672
-
\??\c:\fxhjb.exec:\fxhjb.exe73⤵PID:1628
-
\??\c:\fvhhl.exec:\fvhhl.exe74⤵PID:2456
-
\??\c:\ddthp.exec:\ddthp.exe75⤵PID:2504
-
\??\c:\rjdbfr.exec:\rjdbfr.exe76⤵PID:2516
-
\??\c:\bjhfdx.exec:\bjhfdx.exe77⤵PID:1480
-
\??\c:\vjnbr.exec:\vjnbr.exe78⤵PID:2360
-
\??\c:\ftvlt.exec:\ftvlt.exe79⤵PID:2448
-
\??\c:\pdxdlv.exec:\pdxdlv.exe80⤵PID:2700
-
\??\c:\rvnvpbp.exec:\rvnvpbp.exe81⤵PID:2792
-
\??\c:\jdldpdt.exec:\jdldpdt.exe82⤵PID:2736
-
\??\c:\bhtrdfr.exec:\bhtrdfr.exe83⤵PID:2716
-
\??\c:\pbjfr.exec:\pbjfr.exe84⤵PID:2812
-
\??\c:\txbbptl.exec:\txbbptl.exe85⤵PID:2620
-
\??\c:\rfpnb.exec:\rfpnb.exe86⤵PID:2764
-
\??\c:\xprjhf.exec:\xprjhf.exe87⤵PID:2592
-
\??\c:\bjrdvlp.exec:\bjrdvlp.exe88⤵PID:2412
-
\??\c:\jxpntrn.exec:\jxpntrn.exe89⤵PID:1648
-
\??\c:\djllrx.exec:\djllrx.exe90⤵PID:1072
-
\??\c:\vrbrb.exec:\vrbrb.exe91⤵PID:2228
-
\??\c:\llnbffh.exec:\llnbffh.exe92⤵PID:2580
-
\??\c:\vtdlnn.exec:\vtdlnn.exe93⤵PID:2904
-
\??\c:\ddrhjb.exec:\ddrhjb.exe94⤵PID:2836
-
\??\c:\brxnld.exec:\brxnld.exe95⤵PID:2396
-
\??\c:\plxpvrt.exec:\plxpvrt.exe96⤵PID:1924
-
\??\c:\nbnvfv.exec:\nbnvfv.exe97⤵PID:2408
-
\??\c:\htjtp.exec:\htjtp.exe98⤵PID:860
-
\??\c:\vfhlnh.exec:\vfhlnh.exe99⤵PID:2184
-
\??\c:\vlhxvpl.exec:\vlhxvpl.exe100⤵PID:2212
-
\??\c:\xntdp.exec:\xntdp.exe101⤵PID:1216
-
\??\c:\vbfrtdp.exec:\vbfrtdp.exe102⤵PID:2416
-
\??\c:\rrpdpl.exec:\rrpdpl.exe103⤵PID:2460
-
\??\c:\xfvbdn.exec:\xfvbdn.exe104⤵PID:2352
-
\??\c:\ljrvxnv.exec:\ljrvxnv.exe105⤵PID:2140
-
\??\c:\vblrxth.exec:\vblrxth.exe106⤵PID:1808
-
\??\c:\prxvftl.exec:\prxvftl.exe107⤵PID:2176
-
\??\c:\xxdjdt.exec:\xxdjdt.exe108⤵PID:1136
-
\??\c:\rvrvbn.exec:\rvrvbn.exe109⤵PID:1852
-
\??\c:\jlhfx.exec:\jlhfx.exe110⤵PID:2028
-
\??\c:\jvlrj.exec:\jvlrj.exe111⤵PID:2436
-
\??\c:\hjdvxlt.exec:\hjdvxlt.exe112⤵PID:1716
-
\??\c:\xbrjjp.exec:\xbrjjp.exe113⤵PID:1468
-
\??\c:\bnbjl.exec:\bnbjl.exe114⤵PID:1504
-
\??\c:\dhxxf.exec:\dhxxf.exe115⤵PID:2080
-
\??\c:\bhrvpn.exec:\bhrvpn.exe116⤵PID:1616
-
\??\c:\rtnbb.exec:\rtnbb.exe117⤵PID:2368
-
\??\c:\jlvfr.exec:\jlvfr.exe118⤵PID:1332
-
\??\c:\npxbdhb.exec:\npxbdhb.exe119⤵PID:848
-
\??\c:\bhdhd.exec:\bhdhd.exe120⤵PID:1696
-
\??\c:\tnpllvj.exec:\tnpllvj.exe121⤵
- System Location Discovery: System Language Discovery
PID:2232 -
\??\c:\bbvnlv.exec:\bbvnlv.exe122⤵PID:1692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-