Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 00:32
Behavioral task
behavioral1
Sample
fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe
Resource
win10v2004-20231215-en
General
-
Target
fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe
-
Size
747KB
-
MD5
50a43b87a6cfe2bbd5c65c946d09dabd
-
SHA1
8523f9311baecc47062458abecf7e3aad643fe2b
-
SHA256
fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c
-
SHA512
ae2afe6d328870f1608bef44ab30788fd4289f8f3bf6aa8980660932837533683bdc9307ad009bc78d2dfc7d6f72340ff5b54d968a67e95b9246c09caa72d1f3
-
SSDEEP
12288:tEQoS9qhvQWCdG6HfwSoZnUVJFnbiM1OyAjk2SW4ZDb5RzIfu24NAXiSk0:t2P2GIoZnUrxvOyAQ2SWK/HeMSV
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/4216-120-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3652-171-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2400-174-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-183-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4216-184-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3652-185-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2400-186-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-188-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-194-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-205-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-209-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-214-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-218-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-222-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-226-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-230-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-234-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-238-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-242-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/368-246-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/368-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x00060000000231ee-5.dat UPX behavioral2/memory/4216-120-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3652-171-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2400-174-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-183-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4216-184-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3652-185-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2400-186-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-188-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-194-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-205-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-209-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-214-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-218-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-222-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-226-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-230-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-234-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-238-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-242-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/368-246-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/368-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x00060000000231ee-5.dat upx behavioral2/memory/4216-120-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3652-171-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2400-174-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-183-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4216-184-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3652-185-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2400-186-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-188-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-194-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-205-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-209-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-214-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-218-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-222-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-226-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-230-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-234-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-238-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-242-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/368-246-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\W: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\X: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\E: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\H: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\M: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\N: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\A: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\K: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\S: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\Z: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\R: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\V: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\I: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\J: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\L: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\P: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\U: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\Y: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\B: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\G: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\Q: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File opened (read-only) \??\T: fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\malaysia fucking [free] feet (Gina,Sarah).rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\IME\SHARED\danish beastiality blowjob hidden .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\italian horse bukkake big .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\trambling masturbation girly .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\config\systemprofile\russian action gay hidden sweet (Sonja,Tatjana).mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\FxsTmp\italian kicking horse [bangbus] .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\config\systemprofile\beast [free] .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\System32\DriverStore\Temp\brasilian handjob fucking hidden (Janette).mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\IME\SHARED\russian gang bang horse sleeping castration (Britney,Sylvia).avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish kicking fucking masturbation hole pregnant .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\brasilian nude horse public (Curtney).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\american kicking blowjob several models feet ash .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\lingerie voyeur .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\dotnet\shared\blowjob [free] shoes .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\tyrkish porn bukkake big .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\indian porn xxx uncut boots .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Microsoft\Temp\gay big titts lady (Janette).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\swedish gang bang horse uncut cock lady .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Microsoft Office\Updates\Download\sperm licking blondie .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\malaysia hardcore several models mature (Sonja,Curtney).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\fucking full movie glans (Sonja,Curtney).rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Microsoft Office\root\Templates\beast hot (!) (Jade).avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\black cum hardcore lesbian titts .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\russian cumshot lesbian catfight 50+ .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Google\Temp\tyrkish animal lingerie public .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Google\Update\Download\italian cum blowjob [free] .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\bukkake voyeur (Sylvia).avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\american cum xxx hot (!) shower .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\xxx uncut redhair (Anniston,Melissa).mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\gay hidden feet .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\american cum hardcore masturbation feet stockings (Karin).rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\danish cum bukkake [bangbus] hairy .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\Downloaded Program Files\hardcore masturbation (Janette).mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\porn xxx hot (!) mature .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\kicking beast hidden cock .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\japanese gang bang lesbian sleeping .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\german sperm several models glans balls .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\indian beastiality lesbian girls (Sylvia).avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\danish porn trambling sleeping glans (Kathrin,Karin).avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\asian blowjob masturbation .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\tyrkish action hardcore [milf] beautyfull .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\kicking beast [free] .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\cumshot hardcore uncut (Liz).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\gang bang sperm hidden beautyfull .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\british bukkake several models stockings (Gina,Melissa).mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\brasilian fetish trambling voyeur leather .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\british hardcore masturbation granny .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\gay lesbian balls .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\brasilian nude xxx sleeping glans 40+ .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\asian horse masturbation .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\chinese lesbian [free] .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\british hardcore big 40+ .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\german fucking big glans .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\gang bang bukkake licking cock .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\kicking horse masturbation titts sweet (Karin).mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_e79b400a6df5fd2c\american nude hardcore girls hole swallow (Samantha).mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\asian xxx catfight .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\animal fucking hot (!) cock sweet (Tatjana).rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\horse [milf] titts femdom (Liz).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\japanese cum bukkake full movie titts .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\norwegian gay full movie feet .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\lingerie hot (!) .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\swedish cumshot horse catfight shower .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\xxx hidden titts .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\trambling lesbian feet young .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\horse fucking public hairy .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\gay voyeur hairy .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\fetish hardcore licking (Karin).mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\canadian hardcore girls stockings (Britney,Jade).mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\bukkake hidden feet stockings (Karin).mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\british blowjob [bangbus] cock balls .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\asian gay masturbation titts black hairunshaved .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\PLA\Templates\lesbian big glans redhair (Jade).rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\trambling licking beautyfull (Sonja,Jade).mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\fucking big upskirt .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\blowjob girls glans stockings .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\horse bukkake several models (Samantha).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\norwegian horse voyeur hairy .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\horse uncut mistress .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\indian handjob beast [milf] (Janette).zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\bukkake voyeur .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\italian cum sperm sleeping .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\norwegian bukkake catfight feet .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\tyrkish cumshot fucking big cock .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\american gang bang lingerie [milf] .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\indian action trambling big .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\InputMethod\SHARED\horse licking sweet .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\french fucking uncut .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\french bukkake hidden Ôï .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\russian porn xxx sleeping .mpg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\bukkake voyeur feet .rar.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\kicking trambling catfight .zip.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\security\templates\bukkake several models hole .mpeg.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\tyrkish cum horse big hole .avi.exe fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 3652 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 2400 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 368 wrote to memory of 4216 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 85 PID 368 wrote to memory of 4216 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 85 PID 368 wrote to memory of 4216 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 85 PID 4216 wrote to memory of 3652 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 86 PID 4216 wrote to memory of 3652 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 86 PID 4216 wrote to memory of 3652 4216 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 86 PID 368 wrote to memory of 2400 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 87 PID 368 wrote to memory of 2400 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 87 PID 368 wrote to memory of 2400 368 fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"C:\Users\Admin\AppData\Local\Temp\fbd66979ce7f2ce360555a590aa834283bf80e21343f8633e54e088f3f27db1c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\xxx uncut redhair (Anniston,Melissa).mpeg.exe
Filesize1.4MB
MD59687f9681b2ca4d3c151c4f5071d161c
SHA13dc57de433935bd706f9db23c2635b860f5880d3
SHA25642bd651a6d99ffbd5359521f41d503e2ad4e1a91c18125720287eb08f34eb5e3
SHA512e28c894bdcaaf22d3d0076379f855f53a5018257554f57f5a6a32f30e02a6c845a13ff0e86ae18148c6b56fd2729a6ac09fb10ae4d4eec427245bef48d61204b