Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 17:34
Behavioral task
behavioral1
Sample
07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe
Resource
win10v2004-20240226-en
General
-
Target
07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe
-
Size
1.8MB
-
MD5
e86d1bd7aa364052daebf9fc1241c02f
-
SHA1
8064ef334dab00ed877b81d13c14a4fc9e825a6c
-
SHA256
07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9
-
SHA512
996144833bc3bc722e9546d4e2cda0587180f9b3e9bccf92c400c6c48df704faaeb703e10de5e9d52c1eb14f0ebb4250d1ee5613c3a72856a1498ea6365a0a7a
-
SSDEEP
24576:YibBmRZJesDWrLbPI7xAorPGFg7IRGuEQ2fL1Xm3cl1hk0Uee7ywEhz29meheTS4:xayrLIoe6GYUJmU1hk0OIh3uWs7XYI4
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 4 IoCs
resource yara_rule behavioral1/memory/2072-93-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2604-97-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2380-99-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2860-102-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 9 IoCs
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/files/0x0007000000015f0e-5.dat UPX behavioral1/memory/2072-10-0x0000000004AB0000-0x0000000004AD0000-memory.dmp UPX behavioral1/memory/2380-54-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2860-55-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2072-93-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2604-97-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2380-99-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2860-102-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x0007000000015f0e-5.dat upx behavioral1/memory/2072-10-0x0000000004AB0000-0x0000000004AD0000-memory.dmp upx behavioral1/memory/2380-54-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2860-55-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2072-93-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2604-97-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2380-99-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2860-102-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\J: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\K: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\M: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\Q: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\V: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\H: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\L: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\P: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\X: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\Z: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\A: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\O: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\R: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\U: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\W: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\Y: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\B: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\G: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\I: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\N: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\S: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File opened (read-only) \??\T: 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\sperm catfight hole .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\IME\shared\fucking hidden feet boots (Janette).rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\config\systemprofile\black porn beast hot (!) swallow (Sandy,Liz).rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\FxsTmp\beast uncut .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\IME\shared\gay girls feet leather .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\config\systemprofile\italian animal trambling uncut .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\lingerie masturbation (Samantha).rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\FxsTmp\italian handjob bukkake sleeping (Curtney).avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\hardcore sleeping girly (Sonja,Jade).mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\hardcore catfight ash .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\hardcore lesbian high heels .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Microsoft Office\Templates\black cumshot trambling voyeur glans .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\bukkake [free] .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files\Windows Journal\Templates\lesbian [free] titts balls .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\horse girls young .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\gay full movie hotel (Sandy,Sylvia).rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Common Files\microsoft shared\danish cum lesbian several models hole .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Google\Update\Download\horse voyeur titts .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Google\Temp\sperm [bangbus] feet ejaculation .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files\DVD Maker\Shared\japanese nude fucking several models cock .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\beast hot (!) balls .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\indian cumshot fucking hot (!) .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\russian action sperm big mistress .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\japanese horse lesbian girls titts fishy (Samantha).mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Program Files\Common Files\Microsoft Shared\sperm sleeping cock (Kathrin,Liz).avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\danish kicking blowjob masturbation feet swallow .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\assembly\tmp\swedish action hardcore catfight .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\brasilian kicking lesbian [milf] feet .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\black fetish lingerie public hole .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\porn blowjob girls .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\malaysia beast hot (!) glans wifey .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_4d274741486b900c\indian cumshot hardcore hidden (Melissa).mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\brasilian cum blowjob [free] glans .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\kicking xxx [free] YEâPSè& .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_6.1.7600.16385_none_1dd3ce8d1e7524cd\cumshot fucking girls .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\fucking voyeur latex .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ea4a469ab7713182\spanish lesbian hidden YEâPSè& (Britney,Jade).avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\beastiality lesbian [milf] .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\nude lesbian big cock .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\PLA\Templates\indian nude xxx masturbation fishy .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\black porn trambling lesbian feet swallow .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\black action fucking licking glans .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\brasilian gang bang gay hidden .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\bukkake public black hairunshaved .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\beast hidden shoes .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\canadian gay several models redhair .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\trambling public 50+ .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\beastiality lingerie [milf] .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\horse lesbian bedroom .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\gang bang fucking [free] titts wifey (Sarah).mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\porn lingerie full movie beautyfull .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3863e9ef3f804dd9\hardcore sleeping wifey .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\brasilian kicking hardcore several models cock stockings .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\danish cum lingerie catfight (Samantha).zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\danish beastiality lingerie lesbian .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\american animal hardcore uncut .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\kicking lesbian hidden cock .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\swedish fetish bukkake voyeur 50+ (Sonja,Janette).avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\german hardcore catfight titts high heels .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\french lingerie uncut titts .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\american handjob lingerie catfight beautyfull (Sonja,Curtney).mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8c6fc5a7aa8c435d\french blowjob [free] .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\spanish lesbian sleeping penetration .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\tyrkish porn beast voyeur cock mistress .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\brasilian cumshot trambling hidden .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\indian nude trambling hidden titts .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\american gang bang trambling hot (!) feet bondage .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\horse [bangbus] high heels (Ashley,Sylvia).mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\black handjob hardcore uncut black hairunshaved .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\british fucking sleeping (Melissa).mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3b85bcbe4734e96a\canadian beast licking titts .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\security\templates\lesbian hidden circumcision (Ashley,Sylvia).rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\InstallTemp\nude lesbian hot (!) (Sarah).avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\lesbian girls titts boots .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\tyrkish action sperm sleeping penetration .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\danish animal hardcore licking mistress .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\black animal bukkake masturbation black hairunshaved .avi.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\gay licking 40+ .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\american cum sperm voyeur bondage .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\fucking hidden glans .zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\brasilian nude sperm [free] titts sweet (Sarah).rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\Downloaded Program Files\blowjob uncut hole .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\swedish gang bang xxx hot (!) cock balls .mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\cum trambling catfight .rar.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\african blowjob [bangbus] circumcision .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\brasilian animal sperm several models (Samantha).zip.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\german bukkake [bangbus] girly .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\indian porn horse [free] .mpeg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe File created C:\Windows\winsxs\Temp\indian nude beast voyeur titts leather (Samantha).mpg.exe 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2380 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2860 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2604 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 28 PID 2072 wrote to memory of 2604 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 28 PID 2072 wrote to memory of 2604 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 28 PID 2072 wrote to memory of 2604 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 28 PID 2604 wrote to memory of 2380 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 29 PID 2604 wrote to memory of 2380 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 29 PID 2604 wrote to memory of 2380 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 29 PID 2604 wrote to memory of 2380 2604 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 29 PID 2072 wrote to memory of 2860 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 30 PID 2072 wrote to memory of 2860 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 30 PID 2072 wrote to memory of 2860 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 30 PID 2072 wrote to memory of 2860 2072 07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"C:\Users\Admin\AppData\Local\Temp\07d9d3ce52d567da8af96f6b3d1412e066c7826b4e54377137342c9e29f67ce9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
971KB
MD5b420b4aed9fd9cd10e6b19508ea04f76
SHA173470c4b1417b928b11023c4669d664dfeb5cd64
SHA25608be85e502191aa8ef987427574d29fdce9de073bd43af31300dff46186bd653
SHA5124616ac485b7fd8bde22291b64cc3e61dd47b6f57f02747cfb9f4747c3ad5f023eb59ff515d26a704ada421b70d1a0d204d361416f2579749e55e5fe397b30229
-
Filesize
183B
MD59211e7acbb345aafd3020e0bd41f8512
SHA1392a1350f66c7d59a3a9cc25b95acbd2c282d6ea
SHA256d3bf6cf30cc8b4be6b4ee980e06efe51af7debf09ca9c29043e4f76fb4b929e5
SHA5120bbb98c2fe9d5164867cebe0e83042bcd650429e96a47778d7e13cd1ab59562634131e1119a7c3c197183318c722a659257473db0d4e819835de6101c27f135e