Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 19:16
Behavioral task
behavioral1
Sample
400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe
Resource
win10v2004-20231215-en
General
-
Target
400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe
-
Size
659KB
-
MD5
d910fd7e83c8dfdc55d8dc751a8083da
-
SHA1
3756aff613cf1305a73744961b0844a8407476d6
-
SHA256
400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66
-
SHA512
149805cbe20da3af358caab02ad967c37ce97070fc04fba21f81591f5f0e7e2d93e961fe0c1a50d53f9c383ebba8fd4f000a293d747181104d58ab4757d0c043
-
SSDEEP
12288:JEyDMhqhFp975vxxGB2iXNmyboACgb7l+av5JxUwr2tnHMQh9yjHDxB:JBLxRGdcjACgdzuTnVyDDxB
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/2096-40-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4564-166-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5268-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2096-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4564-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-190-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-207-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-216-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-220-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-224-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-239-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-243-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-247-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-251-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-255-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4116-259-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/4116-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0006000000023205-5.dat UPX behavioral2/memory/2096-40-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4564-166-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5268-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2096-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4564-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-190-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-207-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-216-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-220-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-224-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-239-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-243-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-247-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-251-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-255-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4116-259-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4116-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0006000000023205-5.dat upx behavioral2/memory/2096-40-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4564-166-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5268-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2096-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4564-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-239-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-243-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-247-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-251-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-255-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4116-259-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\R: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\V: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\A: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\B: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\L: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\N: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\P: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\X: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\Y: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\Z: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\U: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\W: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\G: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\H: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\J: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\K: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\O: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\I: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\E: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\M: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\S: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File opened (read-only) \??\T: 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\german fetish porn sleeping shower .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\action sperm hot (!) ash hotel (Sarah,Janette).mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\african sperm porn [bangbus] (Karin,Karin).avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\norwegian beast lesbian voyeur legs bedroom .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\config\systemprofile\handjob trambling full movie glans girly .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\FxsTmp\british trambling gay uncut young .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\IME\SHARED\nude [bangbus] 40+ .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\config\systemprofile\indian porn fucking full movie nipples .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\System32\DriverStore\Temp\handjob sleeping .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\FxsTmp\american xxx sleeping .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\chinese horse catfight glans .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\porn lesbian girls penetration .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\chinese animal porn sleeping ejaculation .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\spanish fetish cumshot hidden leather .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Microsoft\Temp\danish hardcore lingerie [free] .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Common Files\microsoft shared\american hardcore public (Samantha).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Microsoft Office\root\Templates\beast xxx uncut ash .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\danish cum licking feet (Britney,Sarah).zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\blowjob fucking sleeping glans sm .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Google\Update\Download\black beast hot (!) nipples .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\black horse action hidden lady (Liz,Gina).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\russian fucking sleeping hotel .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\beastiality several models .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\french nude hardcore hot (!) castration (Sylvia).mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\animal kicking girls circumcision .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\american gang bang kicking hot (!) (Sandy).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\bukkake handjob sleeping nipples upskirt .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files\Microsoft Office\Updates\Download\african beast cum masturbation shower (Karin).mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Google\Temp\danish trambling porn [bangbus] cock 40+ (Karin,Tatjana).avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\british kicking lesbian girls pregnant .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\japanese fucking lesbian 50+ .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\swedish xxx sleeping hole traffic .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\mssrv.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\french porn public leather .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\malaysia nude big .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\action hot (!) girly .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\kicking public .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\assembly\temp\animal fucking hot (!) leather .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\american gay uncut .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\danish horse xxx hot (!) cock black hairunshaved .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\tyrkish horse catfight .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\animal sleeping boobs young (Kathrin).avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\fetish uncut (Janette,Liz).rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\spanish gay porn [bangbus] stockings .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\asian nude fetish hidden feet .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-sharedcomponents_b03f5f7f11d50a3a_4.0.19041.1_none_47ca94859da20b28\german horse gay licking .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\beastiality hot (!) cock shower .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\gay uncut .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\norwegian cumshot catfight shoes .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\german blowjob uncut 40+ .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\cum handjob full movie granny .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\japanese blowjob voyeur boobs bondage .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\beast catfight (Jenna,Jenna).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\malaysia kicking [free] nipples (Jade,Jade).avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\german hardcore voyeur hole .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\brasilian handjob porn [free] balls (Karin).avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\canadian sperm beast hidden titts femdom .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\danish hardcore lingerie sleeping .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\japanese kicking hidden circumcision .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\canadian bukkake [milf] 40+ .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\fucking gay several models 50+ .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\canadian blowjob big young .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\animal [free] traffic .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_a4f93129c473df49\cum lingerie hidden vagina .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\kicking [bangbus] (Samantha).zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\lingerie [bangbus] upskirt .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\malaysia action hardcore public circumcision (Sonja,Sonja).mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\chinese porn public .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\indian blowjob sleeping (Janette,Sylvia).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\french blowjob nude voyeur hairy (Anniston,Melissa).avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\french beastiality cum uncut .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\horse gang bang voyeur granny .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\InputMethod\SHARED\malaysia fetish animal voyeur hole YEâPSè& .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\sperm public hole sm .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\japanese handjob cumshot [free] .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\russian kicking [bangbus] .mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\fetish handjob licking .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\german beastiality sleeping circumcision .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\american gay uncut .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\animal masturbation hole Ôï .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\italian nude sperm public .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\fetish masturbation titts .mpeg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\hardcore animal hot (!) .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\chinese beast full movie hole young .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\japanese gay cum girls mistress (Sonja,Sarah).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\blowjob cum hot (!) .rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\russian trambling cumshot several models legs .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\british beastiality [free] nipples bondage .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\german blowjob big boobs high heels (Christine).mpg.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\horse lingerie hot (!) ash ejaculation .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\german horse xxx [milf] legs lady .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\british hardcore several models (Jade).rar.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\porn [milf] cock .zip.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\beastiality [milf] beautyfull .avi.exe 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4564 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 5268 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4116 wrote to memory of 2096 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 84 PID 4116 wrote to memory of 2096 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 84 PID 4116 wrote to memory of 2096 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 84 PID 4116 wrote to memory of 5268 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 85 PID 4116 wrote to memory of 5268 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 85 PID 4116 wrote to memory of 5268 4116 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 85 PID 2096 wrote to memory of 4564 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 86 PID 2096 wrote to memory of 4564 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 86 PID 2096 wrote to memory of 4564 2096 400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"C:\Users\Admin\AppData\Local\Temp\400b1311412d4cc2d6b6028b5d6bec683e8b7bb2d4dc85c2ec74618dbf344c66.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\black horse action hidden lady (Liz,Gina).mpg.exe
Filesize1.4MB
MD5c7fa6f1b1e88696a142930cebd1f4689
SHA1988206e80b4082ee98f4804a2d5077c38efd726d
SHA25679574f501e871943b58b1bf48278b280568fdd8d33d2c95debfc12b63fc5a1fb
SHA5124a4e46f1bdc799a61b07be5537a1de901702b2ff652f11c1e5262f2c6bc36aba7ae70bdcfdca26fd923e2d508a3e265f69d57e39600191d6523bbf7ce53a539b