Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 08:56
Behavioral task
behavioral1
Sample
ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe
Resource
win10v2004-20240226-en
General
-
Target
ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe
-
Size
1.4MB
-
MD5
5b66ad545cc71e297ffa7f303b4f4768
-
SHA1
bf7b669a41d09ef7d83d095b19ade25553823bd7
-
SHA256
ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835
-
SHA512
dc63656abf0b8c86d8be2cc2f814849784630ccfa3e6a56f1a4fe9543eab96529c272fc473a5308fd41c1c0b1dc6fcb178989d852515109cbc2ef1f96ae675c3
-
SSDEEP
24576:VcAIZx2ZPJNjV5ZkW95uMqMcbTx5qgREgBKaj1g5Fuhcq4dz5Tss3Uf8:eAIKZhlVkW9gMncbTbqgCcKaj1+uKqEx
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/2196-3-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-12-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-13-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2288-14-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4168-15-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-16-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3500-17-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-20-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-31-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-119-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-166-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-199-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-213-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-221-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-225-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2196-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral2/memory/2196-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-3-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0009000000023265-6.dat UPX behavioral2/memory/2196-12-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-13-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2288-14-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4168-15-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-16-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3500-17-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-20-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-31-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-119-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-166-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-199-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-213-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-221-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-225-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2196-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2196-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-3-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0009000000023265-6.dat upx behavioral2/memory/2196-12-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-13-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2288-14-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4168-15-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-16-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3500-17-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-20-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-31-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-119-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-166-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2196-230-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\H: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\J: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\L: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\M: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\O: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\P: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\R: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\S: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\W: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\Y: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\E: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\V: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\I: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\K: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\Q: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\U: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\X: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\Z: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\A: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\G: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\N: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File opened (read-only) \??\T: ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\LogFiles\Fax\Incoming\spanish beastiality fucking voyeur vagina .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\config\systemprofile\sperm horse sleeping .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\FxsTmp\beastiality public mature (Karin,Janette).mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\french horse big .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\config\systemprofile\cum big ¼ë (Gina,Liz).avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\System32\DriverStore\Temp\handjob licking glans gorgeoushorny .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\FxsTmp\african cum fucking [milf] hole swallow (Ashley).avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\IME\SHARED\german porn gang bang masturbation .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black trambling hidden (Tatjana).zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian cumshot action [milf] black hairunshaved .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\IME\SHARED\asian lingerie masturbation .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\cumshot catfight sm .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\canadian lingerie full movie boots (Anniston,Melissa).mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\italian gang bang [milf] shower (Sandy,Anniston).mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Microsoft\Temp\norwegian fucking cumshot hidden mistress (Tatjana,Melissa).mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Common Files\microsoft shared\italian trambling lingerie public .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Microsoft Office\root\Templates\malaysia trambling blowjob licking hotel (Samantha).zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Microsoft Office\Updates\Download\hardcore catfight bondage .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\swedish hardcore lingerie [free] gorgeoushorny (Jade).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\spanish horse [milf] (Curtney,Ashley).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Google\Update\Download\horse uncut boobs YEâPSè& (Liz,Curtney).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese action [free] vagina .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\danish kicking big boobs (Liz).mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\indian sperm several models glans mature .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\fetish handjob lesbian circumcision (Sylvia).mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\dotnet\shared\sperm fucking hidden boobs .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\japanese sperm blowjob hot (!) blondie .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A22979E4-D188-4AF0-A888-04FE21284B11}\EDGEMITMP_19EA3.tmp\chinese cumshot xxx [bangbus] (Jade).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\lesbian lesbian full movie feet .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\gang bang animal [bangbus] .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Program Files (x86)\Google\Temp\russian nude [milf] .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Drops file in Windows directory 50 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\Downloads\asian cum animal hidden titts ash (Christine).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\british gang bang public redhair .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\british lesbian licking .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\norwegian sperm hardcore sleeping feet .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\hardcore full movie legs 50+ (Anniston,Curtney).avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\japanese beast lingerie several models castration .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\assembly\tmp\spanish xxx fetish [free] nipples .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\Downloaded Program Files\lesbian fucking several models (Jade).avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\cum masturbation .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\swedish lesbian big boobs .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\lesbian horse masturbation (Gina).mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\tyrkish lingerie lesbian [bangbus] ash (Melissa,Sarah).mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\kicking big boobs penetration (Liz,Britney).mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\assembly\temp\asian fucking animal full movie ash .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\PLA\Templates\french action [milf] feet .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\russian lingerie [free] redhair .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\kicking girls balls .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\CbsTemp\tyrkish lesbian porn licking (Janette,Kathrin).mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\nude horse girls ¼ë (Sonja,Jade).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\security\templates\malaysia porn bukkake lesbian 50+ .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\gang bang full movie .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\hardcore [milf] 50+ (Melissa,Karin).avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\black nude masturbation bedroom .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\animal [bangbus] cock .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\lingerie horse hidden nipples mature .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\tyrkish beastiality animal voyeur penetration (Curtney,Anniston).zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\InputMethod\SHARED\kicking [free] .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\fucking masturbation shower (Britney,Sylvia).rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\japanese cumshot kicking sleeping glans 50+ .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\fucking lingerie lesbian feet .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\blowjob animal [milf] mature .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\russian fucking licking redhair .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\canadian cum hot (!) femdom .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\japanese handjob hot (!) boobs .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\spanish porn uncut shower .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\chinese xxx kicking voyeur 40+ .mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\bukkake full movie glans .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\indian action several models legs .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\mssrv.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\lingerie public vagina shoes (Kathrin,Liz).mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\sperm catfight .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\lingerie lesbian lesbian .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\sperm several models blondie .zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\japanese sperm girls (Sonja,Tatjana).mpg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\cumshot trambling full movie circumcision .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\lingerie beast big titts .mpeg.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\gay horse licking shoes .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SoftwareDistribution\Download\action lesbian .avi.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\malaysia bukkake lesbian ash .rar.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\russian action fetish [milf] (Samantha).zip.exe ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 3500 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 4168 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2288 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 100 PID 2196 wrote to memory of 2288 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 100 PID 2196 wrote to memory of 2288 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 100 PID 2196 wrote to memory of 4168 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 101 PID 2196 wrote to memory of 4168 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 101 PID 2196 wrote to memory of 4168 2196 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 101 PID 2288 wrote to memory of 3500 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 102 PID 2288 wrote to memory of 3500 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 102 PID 2288 wrote to memory of 3500 2288 ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"C:\Users\Admin\AppData\Local\Temp\ae90659bbe0da26da4407ef19b01a82397ae7efa844b0d9d94fcab0913a7e835.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4220 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese action [free] vagina .rar.exe
Filesize1.1MB
MD57f9226db7104eeebddd90023609abf84
SHA12a000f5fdd95abeea3428042fa0ac0d721612c9b
SHA256b4835eec1719c2d3d648f020c9412ab91eda4ee5b95cf9eac0e447bbe0d32abf
SHA5122105c0afa609301190150775f0218616a8a2dc678527cc0b6c46ee7fe4250e2db1c8c9febea1c1596f45b8e8694c208c7ff2b0071ce772fe29b3d9c9254fa63d