Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 21:58
Behavioral task
behavioral1
Sample
74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe
Resource
win10v2004-20240226-en
General
-
Target
74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe
-
Size
477KB
-
MD5
884b75308d59f601c30f167d8a5978ba
-
SHA1
107eaa702f21d9ef90ab459502137bbb8c5d93b5
-
SHA256
74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29
-
SHA512
f0bca9e5ed390718fbd5bf19660fb5a643939127cec324ab4896cc148f27aad471292fbc79f9614ba3d1b687c6543f24be1a991c30bb58f78e73e55009237677
-
SSDEEP
12288:VEQoSfqu2nUjoRQ/maCGulJiaUTGSN9QWJFwr1MPkXb65SYqQX:VR2n1T/iaSdN9QeFI1YkL65t
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral1/memory/3036-16-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-89-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2532-91-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-92-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-93-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-99-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-112-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-115-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-118-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-121-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-124-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-129-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-132-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-135-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-138-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-141-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2216-144-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral1/memory/2216-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/files/0x000a000000015bf3-5.dat UPX behavioral1/memory/3036-16-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-89-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2532-91-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-92-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-93-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-97-0x0000000005240000-0x000000000525E000-memory.dmp UPX behavioral1/memory/2216-99-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-112-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-115-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-118-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-121-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-124-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-129-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-132-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-135-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-138-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-141-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2216-144-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2216-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x000a000000015bf3-5.dat upx behavioral1/memory/3036-16-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-89-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2532-91-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-92-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-93-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-97-0x0000000005240000-0x000000000525E000-memory.dmp upx behavioral1/memory/2216-99-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-112-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-115-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-118-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-121-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-124-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-129-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-132-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-135-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-138-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-141-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2216-144-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\Y: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\A: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\O: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\Q: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\T: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\W: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\Z: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\G: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\L: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\M: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\N: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\V: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\B: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\H: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\J: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\P: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\U: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\E: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\I: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\K: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\R: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File opened (read-only) \??\S: 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\sperm catfight (Samantha).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\italian cum blowjob public .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\System32\DriverStore\Temp\american horse horse [free] .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\config\systemprofile\american beastiality trambling [free] mature (Kathrin,Sarah).mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\IME\shared\american horse lingerie catfight titts mature (Tatjana).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\FxsTmp\french hardcore licking .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\IME\shared\tyrkish handjob blowjob sleeping glans sm (Jade).rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\tyrkish handjob horse licking .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\indian nude gay big 40+ (Sonja,Melissa).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SysWOW64\FxsTmp\danish animal beast voyeur hole (Sandy,Samantha).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\horse masturbation .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files\Windows Journal\Templates\japanese horse lesbian several models sweet .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\danish nude lingerie sleeping (Janette).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Common Files\microsoft shared\brasilian beastiality horse big .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\indian fetish horse sleeping glans .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\sperm voyeur tÛ (Kathrin,Sylvia).zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\japanese kicking horse big glans granny .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\beast masturbation sweet .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Google\Update\Download\japanese action horse full movie balls .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\asian fucking full movie (Sarah).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\black beastiality horse big glans upskirt (Sylvia).mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\bukkake masturbation .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files\DVD Maker\Shared\indian animal blowjob [free] titts mature .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Google\Temp\danish action trambling [free] .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Program Files (x86)\Microsoft Office\Templates\lingerie several models (Melissa).zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\italian action bukkake [free] ejaculation (Christine,Curtney).mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3863e9ef3f804dd9\chinese lesbian [bangbus] hole bedroom .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\british xxx lesbian hole penetration .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\black porn horse catfight sm .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\norwegian xxx lesbian hole .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\german gay uncut (Janette).zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\malaysia trambling [milf] young .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\security\templates\swedish animal gay public glans swallow .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\gang bang horse big titts (Christine,Janette).mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\Downloaded Program Files\tyrkish beastiality trambling hidden hole latex .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\trambling voyeur titts latex .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\brasilian gang bang horse several models blondie (Sonja,Sarah).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_9498b282333b64ec\animal lingerie [free] .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\russian handjob sperm sleeping granny .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\danish animal blowjob full movie latex .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\brasilian horse trambling girls hole bondage (Melissa).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\russian handjob lesbian masturbation sm .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\american cum trambling catfight titts gorgeoushorny (Curtney).zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\indian cum sperm [free] mistress (Gina,Sarah).mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\danish fetish sperm licking (Karin).mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\gang bang hardcore voyeur lady (Sandy,Janette).zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_963e6ae24c653bfe\black porn fucking several models bondage (Christine,Karin).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\sperm lesbian glans swallow (Curtney).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\african sperm uncut hole .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\kicking gay big blondie .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\mssrv.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\lingerie sleeping black hairunshaved (Britney,Sylvia).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\hardcore full movie circumcision .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\japanese cumshot hardcore girls hole upskirt .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\animal blowjob [milf] boots (Sonja,Janette).zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\british lesbian girls titts .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\cumshot trambling full movie cock YEâPSè& .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\beast hidden feet (Sonja,Sarah).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5d9f7d70ed4643fd\kicking trambling public .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\danish beastiality beast voyeur feet .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\british sperm hot (!) penetration .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\british lesbian public .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\horse beast [milf] feet .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\beastiality gay masturbation .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\SoftwareDistribution\Download\blowjob masturbation glans redhair .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\gay public hole femdom .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\malaysia blowjob full movie cock sweet .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\german fucking voyeur swallow .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5d6ada54ed6d35a2\british hardcore hidden ash .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\german blowjob uncut hole pregnant (Sarah).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\xxx several models (Tatjana).rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\blowjob [milf] .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\Temp\sperm uncut titts .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\gay [bangbus] stockings .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\black handjob horse public (Sarah).rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\blowjob [milf] feet shower .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\brasilian cum lesbian catfight mature .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\bukkake girls sweet .rar.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\indian action lesbian girls (Melissa).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\swedish fetish xxx [free] (Samantha).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\trambling catfight (Jade).mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\russian gang bang trambling [milf] femdom (Ashley,Liz).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_657d9a203abeb154\fucking hot (!) hole sm (Liz).avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\malaysia blowjob [milf] 50+ .mpg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\cum gay several models gorgeoushorny .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\assembly\tmp\horse sleeping stockings .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\horse xxx voyeur black hairunshaved .zip.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\danish nude lingerie hidden glans upskirt .avi.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\fetish gay [bangbus] ìï .mpeg.exe 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2532 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3036 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 28 PID 2216 wrote to memory of 3036 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 28 PID 2216 wrote to memory of 3036 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 28 PID 2216 wrote to memory of 3036 2216 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 28 PID 3036 wrote to memory of 2532 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 29 PID 3036 wrote to memory of 2532 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 29 PID 3036 wrote to memory of 2532 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 29 PID 3036 wrote to memory of 2532 3036 74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe"C:\Users\Admin\AppData\Local\Temp\74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe"C:\Users\Admin\AppData\Local\Temp\74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe"C:\Users\Admin\AppData\Local\Temp\74b9563b32915dcd2e1de6bb7b768eec3bcf8e1e6d9f7c5b67976ab138960b29.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD54b242a4830f2d37d56026a2213e85efe
SHA1f5354997dc7ccd4a8716db436cf5408be52904a9
SHA256c7c653d46f0ecc18f392e80d42862aa30e8fc3d9cc01747ea144de23d4b5dd1c
SHA5122e3aa127a4e7a72e42a21bf6214d66f37137d409b5cec254a6056f490ddfcded59f2b8265df03b9b01e6530a0e5a34e19f69ef1a5484bace99dc214d75702e38