Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 21:40
Behavioral task
behavioral1
Sample
6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe
Resource
win10v2004-20240226-en
General
-
Target
6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe
-
Size
790KB
-
MD5
b3a044246f59c3f5efb6aa4e40152506
-
SHA1
8976be8951f691e3a9e2e5112a4c9b6e40e0b4d4
-
SHA256
6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e
-
SHA512
4084cfffc61bb8cd86f3c9a9589bc9936ff5bf66c72884b4199113f2006980edf5d6612df0ea441e73a388ca20cd0b7dca32e24a146548b0db7bf4fbcb6ad4f8
-
SSDEEP
12288:VEQoSfqvoM6/+n8kN8Eh1sF9ELRPU/hz7fYe1gFz45z0GRlHa9Z8WFQYZ93zsZ37:V0t6W8q/FNU/9jYetAGRpaBFQo93gZL
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral2/memory/4336-18-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-27-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4892-28-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5016-49-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4336-51-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-145-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-146-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-154-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-209-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-213-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-217-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-221-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-225-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-229-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-233-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3992-237-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/3992-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023223-5.dat UPX behavioral2/memory/4892-10-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4336-18-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-27-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4892-28-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5016-49-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4336-51-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-145-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-146-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-154-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-209-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-213-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-217-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-221-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-225-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-229-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-233-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3992-237-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3992-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023223-5.dat upx behavioral2/memory/4892-10-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4336-18-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-27-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4892-28-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5016-49-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4336-51-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-145-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-146-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-154-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-229-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-233-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3992-237-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\P: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\S: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\U: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\Z: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\T: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\V: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\H: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\J: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\K: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\L: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\Q: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\R: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\W: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\X: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\G: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\M: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\O: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\Y: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\A: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\B: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\I: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File opened (read-only) \??\N: 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\trambling several models feet (Sonja,Tatjana).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\FxsTmp\danish action sperm big feet sweet .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\IME\SHARED\fucking girls cock shoes (Melissa).mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\FxsTmp\gay full movie beautyfull .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\System32\DriverStore\Temp\hardcore voyeur latex .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\swedish handjob fucking uncut cock ejaculation (Sylvia).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\hardcore catfight titts (Sonja,Samantha).rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\american horse lingerie public titts 40+ (Tatjana).zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\config\systemprofile\american cumshot trambling licking titts (Jenna,Sarah).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\IME\SHARED\sperm several models titts gorgeoushorny .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\blowjob [bangbus] feet .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\japanese fetish lingerie big glans latex (Tatjana).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\black action sperm [milf] titts bedroom (Tatjana).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Microsoft Office\root\Templates\blowjob [free] sm .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\swedish fetish trambling [free] (Samantha).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\black action lesbian [bangbus] fishy (Gina,Tatjana).zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\bukkake uncut cock .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Google\Temp\tyrkish horse blowjob voyeur YEâPSè& (Anniston,Melissa).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\swedish beastiality trambling catfight penetration .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian cum fucking lesbian .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\bukkake hot (!) hole femdom .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\sperm girls .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\trambling sleeping redhair (Ashley,Sarah).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Google\Update\Download\horse gay catfight (Melissa).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\brasilian beastiality gay hidden glans .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Microsoft\Temp\horse lesbian sm .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Common Files\microsoft shared\indian action trambling hot (!) sm .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\italian kicking trambling public glans latex (Sylvia).rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files\Microsoft Office\Updates\Download\indian gang bang sperm hot (!) titts shoes .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\sperm full movie penetration .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\kicking blowjob [free] (Tatjana).mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\fetish lesbian girls feet sm .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\malaysia fucking voyeur high heels .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\russian cum hardcore voyeur feet blondie (Janette).zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\beast catfight glans .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\beast lesbian cock .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\french hardcore lesbian bondage .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\russian animal lesbian uncut gorgeoushorny .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\danish porn fucking public feet stockings .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\lesbian several models titts 40+ .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\german fucking catfight .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\german blowjob lesbian cock bedroom (Curtney).zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\indian cum beast masturbation titts .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\brasilian fetish blowjob hot (!) femdom (Gina,Samantha).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\horse beast [milf] titts Ôï .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\british hardcore [milf] feet fishy .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\spanish beast licking (Janette).mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\malaysia bukkake masturbation cock (Gina,Samantha).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\blowjob public 50+ .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\blowjob sleeping (Sylvia).rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\black beastiality gay [bangbus] girly .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\fucking [bangbus] ejaculation .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\french gay sleeping (Curtney).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\bukkake catfight .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\black gang bang bukkake full movie bedroom (Sonja,Jade).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\chinese sperm licking (Jade).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\lingerie several models cock shoes .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\brasilian nude bukkake several models .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\tyrkish kicking blowjob hot (!) cock .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\cum beast catfight granny .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\canadian gay big cock YEâPSè& (Curtney).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\russian kicking beast full movie Ôï .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\assembly\temp\indian cum gay public feet .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\CbsTemp\lingerie uncut hole 50+ .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\indian action lingerie several models granny .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\canadian fucking big (Janette).zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\asian xxx full movie .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\cumshot trambling hot (!) hole (Sandy,Sylvia).mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\action horse lesbian titts bedroom (Melissa).zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\black cumshot beast full movie balls .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\InputMethod\SHARED\black porn beast uncut titts granny .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\hardcore uncut beautyfull .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\american beastiality beast hidden ejaculation .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\norwegian xxx girls hole (Jenna,Jade).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\gang bang lesbian catfight .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\german xxx [free] ash (Kathrin,Janette).rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\assembly\tmp\hardcore sleeping feet swallow .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\japanese porn sperm big feet .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\black action sperm hot (!) girly (Britney,Karin).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\porn gay public boots .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\mssrv.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\hardcore [bangbus] hole shoes .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\japanese action hardcore voyeur glans fishy .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\italian gang bang sperm full movie .avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\german beast hot (!) feet .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\SoftwareDistribution\Download\lingerie several models feet .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\russian cum xxx several models ash .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\american cumshot lingerie big upskirt .zip.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\nude trambling licking feet .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\british trambling catfight sm .rar.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\german lingerie catfight swallow (Anniston,Melissa).mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\tyrkish gang bang lingerie big glans .mpg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\Downloaded Program Files\blowjob full movie feet hairy .mpeg.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\black handjob sperm girls titts (Christine,Liz).avi.exe 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4336 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 5016 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4892 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 91 PID 3992 wrote to memory of 4892 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 91 PID 3992 wrote to memory of 4892 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 91 PID 3992 wrote to memory of 5016 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 92 PID 3992 wrote to memory of 5016 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 92 PID 3992 wrote to memory of 5016 3992 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 92 PID 4892 wrote to memory of 4336 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 93 PID 4892 wrote to memory of 4336 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 93 PID 4892 wrote to memory of 4336 4892 6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"C:\Users\Admin\AppData\Local\Temp\6e24c1a21a715d4af5ca65cb3f2c1a142b8c9a3c68f2ad17b83d85822da2099e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian cum fucking lesbian .mpeg.exe
Filesize271KB
MD5cbafd7741f989223cdbfd8f5ca2b8524
SHA1ae18fbba570d509135307ad168e0853ec638cf61
SHA256d45cf9a015dc4abb36d1236dd3aa634b745dabb212d24bea4e95c765071ab901
SHA5124f404851ccd8b3e63e3856be2b815d339d47dc1caa7a0d715f3a411231cbc5b5907e2d72048e1065f10e7909268ed391f209565468735c947932b816c355a10d