Analysis
-
max time kernel
211s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 01:03
Static task
static1
Behavioral task
behavioral1
Sample
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe
Resource
win10v2004-20221111-en
General
-
Target
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe
-
Size
930KB
-
MD5
2587361063e1b8f928f9011242f7ae70
-
SHA1
e775eebc421666e802d49cb35603576f207a556b
-
SHA256
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52
-
SHA512
d761332d81660a8e7aeaf8d99ff4fd1b5ac298499c208d2ddbc75d561479d1ba6c6073cf72ed8012fe6096526944e51a0cc1b64de11adf7c4aef413cf30c4005
-
SSDEEP
24576:2W/bl/Ddphp9ZwgzOf+jkCazpmHhDzIo1L0:z/pLrIgzoQkpmBPLZ0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exedescription ioc process File opened (read-only) \??\H: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\T: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\A: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\I: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\K: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\P: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\Z: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\S: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\W: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\B: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\E: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\F: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\G: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\N: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\R: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\V: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\X: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\J: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\L: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\M: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\O: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\Q: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\U: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File opened (read-only) \??\Y: ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe -
Drops file in System32 directory 10 IoCs
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exedescription ioc process File created C:\Windows\System32\DriverStore\Temp\spanish kicking girls boots .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\FxsTmp\brasilian beast blowjob licking hole boots .mpg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\IME\shared\cum lesbian catfight penetration .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\IME\shared\fetish catfight wifey .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\FxsTmp\handjob fucking masturbation traffic .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\config\systemprofile\german horse nude hot (!) .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\beast lesbian (Kathrin).mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\asian blowjob masturbation traffic .mpg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\config\systemprofile\fucking licking traffic (Gina,Anniston).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\brasilian fucking lingerie [bangbus] ejaculation .mpg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe -
Drops file in Program Files directory 15 IoCs
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exedescription ioc process File created C:\Program Files (x86)\Google\Update\Download\british trambling [bangbus] black hairunshaved (Sylvia).zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\german gay public leather .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files\Windows Journal\Templates\spanish lesbian horse masturbation (Sonja,Sandy).zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\cum big latex .mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Google\Temp\spanish cumshot action voyeur mature .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\japanese beastiality several models castration .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\trambling sleeping .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files\Common Files\Microsoft Shared\japanese porn sleeping legs redhair .mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files\DVD Maker\Shared\german gay cum public YEâPSè& .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Common Files\microsoft shared\swedish nude sleeping .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\kicking masturbation sm .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\gay big .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\japanese bukkake big upskirt (Sonja).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\kicking gang bang [free] (Jenna,Gina).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Program Files (x86)\Microsoft Office\Templates\french lesbian sleeping glans (Anniston).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe -
Drops file in Windows directory 31 IoCs
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exedescription ioc process File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\danish action handjob several models boots .mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\brasilian gay uncut .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\animal lingerie catfight vagina (Sandy).mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\norwegian cum licking nipples swallow (Jade).mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\xxx [milf] .mpg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\german gang bang trambling [milf] (Sonja).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\indian porn hardcore girls .mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\mssrv.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\african porn big mistress (Britney).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\african horse kicking uncut titts bedroom .mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\german gay gay licking boots .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\PLA\Templates\danish hardcore public (Sonja,Sarah).mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\security\templates\german horse [bangbus] ìï .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\danish fucking hardcore [free] boobs ejaculation (Curtney).mpg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\brasilian nude [bangbus] femdom .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\brasilian beast kicking public gorgeoushorny .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\temp\gang bang big (Christine,Sandy).mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\Downloaded Program Files\malaysia kicking hot (!) high heels .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\black horse hot (!) latex .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\trambling bukkake sleeping YEâPSè& .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\SoftwareDistribution\Download\action fetish [milf] nipples leather .zip.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\tyrkish handjob [bangbus] balls (Sarah,Christine).mpg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\handjob big feet .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\tmp\chinese lesbian fetish several models boobs high heels (Gina,Sonja).mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\animal lesbian lady (Sandy).avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\norwegian hardcore lesbian [bangbus] .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\french beast bukkake masturbation blondie (Tatjana).rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\african kicking beast several models lady .rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\african lesbian lingerie voyeur .mpeg.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\chinese kicking bukkake catfight mature .avi.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\trambling gang bang [bangbus] (Britney,Gina).rar.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exead4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exead4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exepid process 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe 1268 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exead4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exedescription pid process target process PID 1000 wrote to memory of 556 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 1000 wrote to memory of 556 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 1000 wrote to memory of 556 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 1000 wrote to memory of 556 1000 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 556 wrote to memory of 1268 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 556 wrote to memory of 1268 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 556 wrote to memory of 1268 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe PID 556 wrote to memory of 1268 556 ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe"C:\Users\Admin\AppData\Local\Temp\ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe"C:\Users\Admin\AppData\Local\Temp\ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe"C:\Users\Admin\AppData\Local\Temp\ad4483050a52e29f283dab4a5bb011bdc56944be87090c43e92348967f7c9e52.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268