Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 00:57
Behavioral task
behavioral1
Sample
f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe
Resource
win10v2004-20240226-en
General
-
Target
f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe
-
Size
524KB
-
MD5
e93d2a6d2dc59fc706db9f97fcd3956c
-
SHA1
3566c38153964d01449723f04079ce76a3ca616e
-
SHA256
f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41
-
SHA512
69befbe9d6cc8a61970c391682d510c1bc0c6445d162b3ce4e0b0f5cc8fb0848da47119970518170e0cac0e4941e71473543e407cfb7c1d89782aa1e451b5cf0
-
SSDEEP
12288:VEQoSfqbMxnPI1KPd7xgmfN5LDyGHVZh13/WEAjcg+Ga0DSP+D:VyKPLp9DymVboYg+eg+D
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral2/memory/3752-163-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/392-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3336-182-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3752-183-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-201-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-218-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-226-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-234-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-238-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1860-242-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/1860-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x00070000000231fb-5.dat UPX behavioral2/memory/3752-163-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/392-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3336-182-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3752-183-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-201-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-218-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-226-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-234-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-238-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1860-242-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1860-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x00070000000231fb-5.dat upx behavioral2/memory/3752-163-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/392-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3336-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3752-183-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-234-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-238-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1860-242-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\E: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\G: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\N: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\P: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\R: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\W: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\B: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\L: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\M: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\O: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\Q: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\S: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\T: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\X: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\I: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\J: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\K: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\Y: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\Z: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\A: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\H: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File opened (read-only) \??\V: f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian nude lingerie several models ash .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\FxsTmp\cumshot girls .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\IME\SHARED\norwegian fucking cum lesbian (Gina).mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish beast licking fishy .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\config\systemprofile\fucking trambling catfight .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\System32\DriverStore\Temp\lingerie hot (!) lady .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\spanish horse lesbian vagina wifey .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\config\systemprofile\italian bukkake [bangbus] feet .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\fucking big .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\FxsTmp\lesbian uncut boobs sm .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SysWOW64\IME\SHARED\lingerie porn several models ejaculation .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\lesbian full movie ejaculation .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Download\blowjob cum lesbian redhair .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\xxx licking (Ashley,Gina).mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\swedish handjob [milf] hole castration .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\american beastiality masturbation .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Microsoft Office\root\Templates\nude hardcore masturbation ash young (Sonja,Curtney).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\bukkake cumshot uncut vagina .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Microsoft\Temp\kicking hot (!) (Anniston,Janette).mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american porn gay big vagina bedroom .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\gay horse voyeur titts lady .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\french blowjob cumshot sleeping penetration (Janette).avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\beastiality [bangbus] (Samantha,Sandy).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\american fucking catfight .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\Common Files\microsoft shared\fetish uncut .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files\dotnet\shared\cum masturbation .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\african lesbian cumshot big ejaculation .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Google\Temp\nude animal public castration .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Google\Update\Download\french kicking licking nipples (Melissa,Britney).mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\canadian blowjob voyeur nipples sm .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\indian hardcore lesbian 50+ .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\fetish trambling hot (!) .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\kicking lingerie [milf] balls .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\hardcore [bangbus] lady .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\horse masturbation .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\tyrkish fetish hot (!) vagina 40+ .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\italian beast nude hot (!) .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\german sperm bukkake voyeur .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\gang bang horse girls femdom .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\german kicking several models mature .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\american sperm girls vagina ejaculation .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\mssrv.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\malaysia fucking xxx voyeur high heels (Jenna).zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\indian horse [bangbus] hole .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\InstallTemp\italian kicking xxx public (Karin,Jade).mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\assembly\tmp\danish bukkake lesbian public boobs upskirt .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\danish blowjob [bangbus] 50+ .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\cum hot (!) boobs .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\fetish several models .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\action several models .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\malaysia sperm lesbian several models titts mistress .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\fucking catfight (Janette,Sonja).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\xxx girls swallow (Jade,Britney).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\african horse [free] .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\black bukkake full movie shower (Tatjana).mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\swedish trambling horse several models (Sandy).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-sharedcomponents_b03f5f7f11d50a3a_4.0.19041.1_none_47ca94859da20b28\spanish cumshot trambling several models ash YEâPSè& .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\italian beast lesbian catfight blondie (Sonja,Karin).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\malaysia fetish catfight high heels (Sarah).mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\indian porn [milf] 40+ .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\fucking voyeur hotel .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\cumshot animal several models .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\malaysia sperm uncut nipples (Ashley,Anniston).avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\porn blowjob lesbian (Tatjana,Janette).zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\sperm [free] hole circumcision .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_34e3bab50607a64b\animal handjob voyeur sm .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\fetish action lesbian .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\canadian porn masturbation (Sandy,Gina).avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\indian kicking beast [bangbus] ejaculation (Christine).mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\beast hidden .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\hardcore girls feet wifey .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\tyrkish hardcore [milf] legs (Karin,Ashley).mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\african cumshot public .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\spanish gay hot (!) balls .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\horse catfight feet lady (Sarah,Sonja).avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\indian fucking hot (!) .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\french trambling horse uncut glans (Anniston,Sonja).rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\xxx voyeur cock swallow .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\trambling masturbation feet upskirt .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\african beastiality gang bang big boots (Kathrin,Sandy).avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\german porn catfight ejaculation (Christine,Melissa).avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\indian kicking handjob big .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\tyrkish beast fetish lesbian .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\lesbian hardcore sleeping (Jenna).mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\tyrkish kicking voyeur blondie .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\tyrkish cumshot full movie swallow .mpeg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\american cum big high heels .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\fetish handjob voyeur glans .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\lingerie [milf] .zip.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\action big glans ash .mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\asian cum porn several models YEâPSè& .rar.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\handjob kicking full movie (Tatjana).mpg.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\indian hardcore public redhair .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\lesbian lesbian feet .avi.exe f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3752 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 3336 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1860 wrote to memory of 392 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 91 PID 1860 wrote to memory of 392 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 91 PID 1860 wrote to memory of 392 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 91 PID 392 wrote to memory of 3336 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 92 PID 392 wrote to memory of 3336 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 92 PID 392 wrote to memory of 3336 392 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 92 PID 1860 wrote to memory of 3752 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 93 PID 1860 wrote to memory of 3752 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 93 PID 1860 wrote to memory of 3752 1860 f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
-
C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"C:\Users\Admin\AppData\Local\Temp\f14c14cf0ea768d4563f727f182865e9ea9eac5462bd86a8a05a4427f31e9e41.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american porn gay big vagina bedroom .avi.exe
Filesize2.0MB
MD550b4de0e5717c70ef125d5978825094a
SHA1260bb45c970fba3fd299cd5c28d54f74533ed5cc
SHA256daf2c60b51675946d87037e664f9d388c8f93c71b8e77c078f2bae85f38408f9
SHA512296f69889fd60121fb1a774da353b20d1571f4116d2a3a5fc47e4d189ea00a33d9cd84fbb65d989a8d3fb5b2da0cd74fd8688cde867cbc8e2481328b7d878a2e
-
Filesize
146B
MD57fd65e2ba126a3876a6bb714d2db4346
SHA15551d4235fb8f8547bd6119bbf4d47b6696d938e
SHA25655ad5b1f5c49d201dc3d31d26d9269967ff462e74de74a9246e8e1e8f82e15f5
SHA512ac0ca13ae4a66accb9f261d718baa283498a04eb23f585385a79ea18bf82061bfc7c4d8187368ac64de38c2ccf3455d37c989cfa45283a4cb752a5a9ec529daa