Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/04/2024, 18:26
Behavioral task
behavioral1
Sample
09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe
Resource
win10v2004-20231215-en
General
-
Target
09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe
-
Size
800KB
-
MD5
1830f649fd2d2447c6bd8c825c9d2f00
-
SHA1
eaf22d0d3a50625121edfae3616e3557c583569a
-
SHA256
09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358
-
SHA512
aeda0ea99b12fa7127145f6bd28c823d00ba9fef3a5dae5d357b7f49ff83434fdbdef4b9e02424d31c666cc2cd2c682e82b1e031e8a3225b623f0ca4ec50a715
-
SSDEEP
24576:CvAqfEPWEg8FR+Us9Y6C95meFXt/9+uO7nt:TbuUeJ4mUUugt
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral1/memory/2472-60-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1304-90-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-94-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1304-104-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-105-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-110-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-113-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-116-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-121-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-124-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-127-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-130-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-133-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-136-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-139-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-142-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2308-145-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral1/memory/2308-0-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/files/0x00070000000149e1-5.dat UPX behavioral1/memory/2472-60-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/1304-90-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-94-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/1304-104-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-105-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-110-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-113-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-116-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-121-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-124-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-127-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-130-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-133-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-136-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-139-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-142-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral1/memory/2308-145-0x0000000000400000-0x000000000041F000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2308-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00070000000149e1-5.dat upx behavioral1/memory/2472-60-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1304-90-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-94-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1304-104-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-105-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-110-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-113-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-116-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-121-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-124-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-127-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-130-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-133-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-136-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-139-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-142-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2308-145-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\J: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\T: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\W: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\Q: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\S: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\V: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\Z: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\K: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\N: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\O: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\P: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\U: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\A: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\B: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\L: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\M: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\X: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\Y: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\E: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\H: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\I: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File opened (read-only) \??\R: 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\shared\fetish gay licking circumcision .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\System32\DriverStore\Temp\french cumshot blowjob hidden cock swallow .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\IME\shared\swedish lesbian voyeur leather .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\porn gang bang [bangbus] young .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\FxsTmp\italian hardcore cum sleeping cock (Anniston).mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\asian bukkake sperm catfight 50+ .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\config\systemprofile\danish trambling hardcore girls (Melissa).avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\fetish [free] boobs (Sandy,Janette).mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\FxsTmp\gang bang action girls .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SysWOW64\config\systemprofile\tyrkish bukkake bukkake catfight titts lady .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\beastiality animal catfight vagina .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\horse gay lesbian glans beautyfull .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Common Files\microsoft shared\horse [bangbus] ejaculation .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Microsoft Office\Templates\norwegian horse [bangbus] ash fishy (Jade).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\horse several models circumcision .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\african fucking lesbian masturbation .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files\DVD Maker\Shared\fucking handjob [free] .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\british beastiality sleeping ash .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Google\Temp\american animal bukkake licking lady (Kathrin,Sonja).rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\tyrkish lingerie horse licking titts .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\horse blowjob hidden boots .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files\Windows Journal\Templates\animal several models high heels .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Google\Update\Download\beast animal hot (!) redhair .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\spanish bukkake big (Curtney,Melissa).mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Program Files\Common Files\Microsoft Shared\handjob licking hole 50+ .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\cum hardcore hidden vagina .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\bukkake gay full movie .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\british lesbian sleeping swallow .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\indian horse kicking girls .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\german animal fetish hot (!) feet castration .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\mssrv.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\temp\gang bang [free] .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\indian hardcore [milf] sweet .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\british hardcore gang bang lesbian ìï (Janette,Christine).avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8c6fc5a7aa8c435d\swedish fetish public circumcision .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\norwegian kicking trambling several models hole .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\french handjob public legs redhair (Christine).avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\tyrkish cum several models stockings .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\horse animal sleeping legs hairy .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\sperm licking gorgeoushorny (Samantha,Ashley).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\american blowjob [free] fishy .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\british horse licking hole (Janette).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\black cumshot kicking full movie (Karin).mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\american xxx bukkake sleeping legs .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\beast several models circumcision (Jenna,Sarah).mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\russian gang bang lingerie hot (!) feet (Melissa,Karin).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\canadian lingerie cum [bangbus] shoes .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\french beast hot (!) feet redhair .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\SoftwareDistribution\Download\french kicking full movie hole .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\british cumshot cum [free] fishy .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\indian kicking kicking girls bondage .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\danish lingerie masturbation vagina .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\canadian gay gang bang lesbian latex .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\japanese sperm horse [free] titts circumcision .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\malaysia beastiality hardcore licking feet upskirt .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\malaysia action kicking hidden (Jenna,Anniston).mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_65b23d3c3a97bfaf\asian hardcore trambling [milf] stockings .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\british fucking kicking [free] (Melissa,Anniston).mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\swedish lingerie lesbian (Liz,Liz).avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\bukkake masturbation titts fishy .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\malaysia lingerie hot (!) mistress .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_387a16fe7addf3b6\african bukkake uncut .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\danish porn full movie hotel (Melissa,Jade).rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\Temp\french trambling gay catfight titts .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\handjob lingerie hot (!) 40+ .mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\bukkake gang bang sleeping (Sandy).mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\british gang bang hot (!) bondage .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_de-de_b4aea777fe683838\tyrkish horse lesbian traffic (Britney,Melissa).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\cum hot (!) ejaculation (Sylvia).avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\indian beast fetish [bangbus] stockings (Karin,Sandy).avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\russian trambling cum catfight young .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_657d9a203abeb154\russian beast big sweet .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\cum nude big titts .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\black horse fucking [bangbus] (Gina,Anniston).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\cumshot animal [milf] nipples (Jade,Sonja).rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\handjob full movie titts pregnant (Sonja,Anniston).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ea4a469ab7713182\british beast porn uncut boots .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\french horse several models gorgeoushorny .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\italian fucking lesbian catfight hole circumcision .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3b85bcbe4734e96a\chinese animal full movie traffic (Sonja).rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\black xxx hot (!) .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\tyrkish xxx [milf] hole .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\xxx full movie vagina .mpeg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\hardcore blowjob girls .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\russian action several models young (Britney).mpg.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_a945e2c500c90142\cumshot full movie (Sarah,Janette).zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\asian kicking uncut nipples mistress .avi.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\nude sleeping hole .rar.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\swedish action animal full movie .zip.exe 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 1304 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2472 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 28 PID 2308 wrote to memory of 2472 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 28 PID 2308 wrote to memory of 2472 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 28 PID 2308 wrote to memory of 2472 2308 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 28 PID 2472 wrote to memory of 1304 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 29 PID 2472 wrote to memory of 1304 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 29 PID 2472 wrote to memory of 1304 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 29 PID 2472 wrote to memory of 1304 2472 09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe"C:\Users\Admin\AppData\Local\Temp\09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe"C:\Users\Admin\AppData\Local\Temp\09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe"C:\Users\Admin\AppData\Local\Temp\09d08658282f25deb2db0428d15187a602bd0457b3a5a7e0c4d6d9ec3735e358.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5af96a9e69b707cbcde202870a36d2e6f
SHA1da89ae008e5e60799dc36bde70b94569de29dbab
SHA25651c7057b76395834ec99edc81d3fd7ee069284b72b66b1141743e9610d7b46e0
SHA512bd5129634722503dc30310eb1bbc237bc8824e317268f2aa1fc2c8fc5f4cddc9186bb886c7895e7e0adb93f5beaa257dbcd8c581b6d844f8128f7661402732c8