Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe
Resource
win10v2004-20240226-en
General
-
Target
67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe
-
Size
463KB
-
MD5
c153cd5022f4a261c43a788cfa55383b
-
SHA1
104ae49df5564e1cb05a373af897626e85b989b4
-
SHA256
67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb
-
SHA512
03bb06e27dcccaa286772315ec590893d31a98bf5c6c78e6e64fdb07e20c3f8261ff8cbbbe0ec2bb55376724520bf0359e4538c1bd7203c5ab1009516eac8413
-
SSDEEP
12288:lXa8so1u8Y1klZWILCkMGCfHHRgVHMaJ/B+CnGJlIv:lq8X88zZW7LfxCsC+C5v
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 16 IoCs
resource yara_rule behavioral2/memory/1360-36-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-182-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3480-184-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-186-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-191-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-200-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-203-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-207-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-210-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-213-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-216-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-219-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-222-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-225-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-228-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3340-231-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral2/memory/3340-0-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/files/0x0005000000022762-5.dat UPX behavioral2/memory/1360-36-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3480-155-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-182-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3480-184-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-186-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-191-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-200-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-203-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-207-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-210-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-213-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-216-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-219-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-222-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-225-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-228-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3340-231-0x0000000000400000-0x000000000041C000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\G: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\K: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\L: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\M: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\N: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\P: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\Q: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\V: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\Y: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\E: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\H: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\I: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\O: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\R: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\U: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\B: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\J: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\T: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\A: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\W: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\X: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File opened (read-only) \??\Z: 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake sleeping fishy .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\horse uncut titts girly (Curtney).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\FxsTmp\norwegian lesbian [bangbus] .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\FxsTmp\horse sleeping hole .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\IME\SHARED\xxx [bangbus] feet .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\bukkake uncut hole blondie (Jade).mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lesbian several models (Curtney).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\swedish porn lingerie catfight hole .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\config\systemprofile\xxx several models feet .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\config\systemprofile\hardcore girls (Karin).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\System32\DriverStore\Temp\japanese animal beast voyeur titts blondie (Sarah).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese cum blowjob several models pregnant .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\danish nude sperm [free] (Jade).mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\american kicking bukkake public cock .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Common Files\microsoft shared\trambling masturbation (Melissa).mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\blowjob [milf] .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Microsoft Office\Updates\Download\italian cum fucking girls fishy .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\xxx [free] feet .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\indian cumshot hardcore [bangbus] blondie .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\american gang bang lingerie voyeur glans wifey .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american animal sperm uncut mature (Sandy,Sarah).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\blowjob several models glans ash .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\beast voyeur high heels .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Google\Temp\beast girls cock (Jenna,Sarah).zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Google\Update\Download\italian horse gay sleeping hole (Sonja,Liz).mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\sperm [bangbus] cock .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Microsoft\Temp\japanese gang bang gay [bangbus] cock .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\Microsoft Office\root\Templates\japanese handjob sperm girls feet blondie .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\russian horse xxx catfight titts shower .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Program Files\dotnet\shared\japanese porn beast big glans .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\italian gang bang trambling lesbian hole .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\nude beast [milf] penetration (Britney,Samantha).mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\lesbian masturbation latex .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\action lingerie lesbian 40+ .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\canadian bukkake licking .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\canadian sperm catfight feet .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\african lesbian public glans castration .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\horse girls (Tatjana).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\canadian bukkake girls titts shoes .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\danish porn bukkake public .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\hardcore voyeur ¤ç .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\trambling uncut .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\indian fetish lingerie public penetration .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\sperm [free] cock wifey .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\InputMethod\SHARED\russian fetish trambling full movie upskirt (Britney,Janette).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\porn bukkake sleeping mistress (Sonja,Sylvia).mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\hardcore big cock 50+ (Sylvia).mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\chinese trambling several models blondie .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\asian fucking full movie cock circumcision .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\italian handjob trambling hot (!) stockings .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\horse masturbation feet .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\german bukkake licking glans .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\malaysia sperm hidden .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\lingerie hidden hole (Jenna,Jade).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\cumshot bukkake big YEâPSè& .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\tyrkish handjob xxx [free] .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\mssrv.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\tyrkish nude sperm girls swallow .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\gay sleeping hole .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\italian porn xxx full movie wifey .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\blowjob [milf] glans circumcision .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\tyrkish cum trambling lesbian cock .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\handjob beast sleeping (Jade).zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\french lingerie masturbation sweet (Jenna,Curtney).mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\french lesbian hot (!) feet (Britney,Samantha).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\canadian xxx hot (!) gorgeoushorny .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\french hardcore full movie titts .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\Temp\norwegian sperm several models titts (Anniston,Melissa).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\canadian fucking hidden cock YEâPSè& (Melissa).zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\kicking bukkake catfight (Tatjana).zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\gang bang bukkake [free] (Jade).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\african xxx hot (!) shower (Sandy,Samantha).mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\american kicking sperm big hole shoes (Melissa).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\tyrkish cumshot hardcore hidden .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\italian porn blowjob voyeur .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\black action horse [milf] ejaculation (Britney,Tatjana).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\norwegian trambling several models penetration .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\cum lingerie masturbation .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\cumshot sperm big hotel .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\canadian blowjob [milf] fishy .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\bukkake uncut .zip.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\african xxx hot (!) .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\danish handjob blowjob voyeur glans boots .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\xxx girls feet .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\action horse catfight feet (Christine,Liz).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\hardcore [milf] .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\italian kicking beast catfight titts .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\italian beastiality lingerie several models cock (Sandy,Karin).avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\japanese animal fucking masturbation pregnant .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\gay voyeur balls .avi.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\lesbian public titts traffic .mpg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\canadian hardcore several models .rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\CbsTemp\bukkake sleeping feet ash (Janette).rar.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\chinese blowjob big .mpeg.exe 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3480 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3340 wrote to memory of 1360 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 92 PID 3340 wrote to memory of 1360 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 92 PID 3340 wrote to memory of 1360 3340 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 92 PID 1360 wrote to memory of 3480 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 93 PID 1360 wrote to memory of 3480 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 93 PID 1360 wrote to memory of 3480 1360 67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe"C:\Users\Admin\AppData\Local\Temp\67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe"C:\Users\Admin\AppData\Local\Temp\67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe"C:\Users\Admin\AppData\Local\Temp\67c1190847671b81fcc7c8c4841cad19da38a5a82e77722872f90766deaa9dcb.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american animal sperm uncut mature (Sandy,Sarah).rar.exe
Filesize1.8MB
MD54918b6a49b13a9ea5cd3886a64919d89
SHA19c20747c5fba586173848a37d97cb23a36528d92
SHA256a285a36cc954516671915176f0803c6d0bbb1c0cce4c6cefea8af600f1553dd7
SHA5124cf9546ac414281c244761f4d3c1bfc189f3112d3937b580775ce4ea1be16c43c269b1c02abf9098eb6e4f28e04ee7d41043ad5138a0cd2e63bc3b6b82583857