Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/04/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe
Resource
win10v2004-20240226-en
General
-
Target
071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe
-
Size
1.3MB
-
MD5
45dea3bf310ef514b1d42ba895ce4185
-
SHA1
8d3e89e604bdb74d972499ec2d4fb20840324b1e
-
SHA256
071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47
-
SHA512
68dd5bb3ee75254228e443b0d1a4d0fff4b2ca375dbbffd3cba785a283a57ff1d9b9c231071c4654f13142c59f03964eca486b838a29acb71369a4a81530c8f2
-
SSDEEP
24576:lq8WN1SHaJX2jMAs/DkWSGEmI5xov5NJlOeBKdK4di3Oo55:+Ns6cwzbkWSjHQNJCZ6O2
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral1/memory/2924-0-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2456-80-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-94-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1312-104-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-105-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-110-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-113-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-116-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-121-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-124-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-127-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-130-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-133-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-136-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-139-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-142-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2924-145-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral1/memory/2924-0-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/files/0x0007000000016cab-5.dat UPX behavioral1/memory/2456-80-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/1312-90-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-94-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/1312-104-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-105-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-110-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-113-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-116-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-121-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-124-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-127-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-130-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-133-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-136-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-139-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-142-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2924-145-0x0000000000400000-0x000000000041C000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\T: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\W: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\X: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\B: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\N: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\O: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\Q: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\H: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\K: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\L: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\M: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\A: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\U: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\Y: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\P: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\S: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\V: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\Z: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\E: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\G: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\I: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File opened (read-only) \??\J: 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\shared\kicking licking .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\config\systemprofile\lingerie [milf] nipples redhair (Samantha).rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\System32\DriverStore\Temp\gay catfight ash .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\IME\shared\swedish action [milf] fishy (Curtney,Tatjana).zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\norwegian porn animal uncut penetration .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\config\systemprofile\porn animal full movie high heels .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\african lingerie beast voyeur granny .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\kicking xxx full movie titts bedroom .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\FxsTmp\tyrkish handjob kicking hot (!) .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\SysWOW64\FxsTmp\nude gay voyeur .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\blowjob nude hot (!) traffic (Melissa).rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\action uncut ejaculation .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files\Common Files\Microsoft Shared\german hardcore voyeur nipples femdom (Anniston).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files\DVD Maker\Shared\canadian beastiality lingerie masturbation ejaculation .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\danish trambling hidden .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Microsoft Office\Templates\handjob big ash YEâPSè& .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\black lingerie cum hidden feet young (Jade).mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\spanish horse fetish uncut .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\hardcore bukkake full movie .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\danish horse hot (!) traffic .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files\Windows Journal\Templates\american beast handjob public .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\german fucking hot (!) (Anniston).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\black handjob sperm licking vagina swallow .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Google\Temp\bukkake hardcore [milf] (Jenna,Liz).mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Program Files (x86)\Google\Update\Download\horse [milf] .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\british porn nude masturbation circumcision .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_6.1.7600.16385_none_2958d4a31d2ec64f\horse fetish big .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_1412267f4b3bb985\german gang bang masturbation hairy (Tatjana).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\PLA\Templates\lesbian lesbian .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\indian cumshot several models mistress .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\brasilian porn voyeur .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\canadian animal beast licking granny (Sonja).rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_dd18b2a07d49aa11\lesbian gay public blondie (Sonja).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\Downloaded Program Files\canadian cumshot [free] shower .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\swedish animal gay lesbian black hairunshaved (Anniston).rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\french nude cum sleeping .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\tyrkish cumshot lingerie several models .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\swedish lesbian [free] Ôë .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\danish blowjob trambling hidden traffic .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\brasilian animal hot (!) ejaculation .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\german handjob girls .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_4fe2107fd06efdd8\sperm beast [bangbus] cock shoes .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5d6ada54ed6d35a2\handjob uncut feet latex .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aea650787d30ed8a\british gay sperm licking legs 50+ .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\beast horse lesbian (Sandy,Kathrin).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\brasilian beastiality kicking public young .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\blowjob fucking voyeur glans latex .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\danish blowjob full movie legs sweet .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_9498b282333b64ec\spanish beastiality big .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_963e6ae24c653bfe\asian horse hardcore lesbian ìï (Jenna).mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_387a16fe7addf3b6\black blowjob handjob uncut (Britney,Sandy).rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\fetish lesbian big (Britney,Gina).mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\cumshot hidden lady (Jenna).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\animal hot (!) .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\beast porn uncut (Curtney).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\gay action masturbation stockings .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\handjob blowjob hidden sweet (Christine,Christine).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\handjob girls nipples (Christine,Britney).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\trambling fucking licking legs black hairunshaved .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\gay catfight high heels .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\lingerie public ash .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\temp\black trambling big .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\japanese cum beast masturbation feet boots .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\spanish fetish lingerie uncut boots .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\cumshot hot (!) upskirt .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_65b23d3c3a97bfaf\brasilian sperm lingerie public boobs .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\InstallTemp\brasilian xxx bukkake hot (!) ejaculation (Anniston,Janette).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\tmp\tyrkish horse [free] cock .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\asian horse masturbation boots .avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\asian cum several models .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_60c2504d62fd4f0e\trambling beast [free] boots (Janette).mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\brasilian gang bang animal big hairy .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\japanese gay voyeur shoes .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\danish fucking full movie .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\chinese lingerie kicking lesbian glans lady .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\malaysia gay fetish uncut beautyfull (Samantha,Britney).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_a945e2c500c90142\american fucking licking blondie .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\Temp\beast xxx sleeping (Tatjana,Samantha).rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_4d274741486b900c\british fetish beast full movie penetration .rar.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\chinese lesbian gay voyeur mature .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\brasilian horse hidden .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\british action beast public sm .mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\french hardcore action lesbian hotel (Ashley).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\beastiality hidden nipples stockings (Sonja).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\lingerie public stockings .mpeg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\japanese bukkake trambling voyeur beautyfull .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\black handjob gay catfight bondage .zip.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\hardcore horse public sweet (Gina,Jade).mpg.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\african horse action catfight (Jenna,Jade).avi.exe 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 1312 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2456 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 28 PID 2924 wrote to memory of 2456 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 28 PID 2924 wrote to memory of 2456 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 28 PID 2924 wrote to memory of 2456 2924 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 28 PID 2456 wrote to memory of 1312 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 29 PID 2456 wrote to memory of 1312 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 29 PID 2456 wrote to memory of 1312 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 29 PID 2456 wrote to memory of 1312 2456 071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe"C:\Users\Admin\AppData\Local\Temp\071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe"C:\Users\Admin\AppData\Local\Temp\071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe"C:\Users\Admin\AppData\Local\Temp\071a6ba731e471b6c758950a6bb4cbd03e06fca60fe6bed139255f53e977fa47.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5a201144af778a1e32fe8a1a3f76b2a81
SHA1ea08df32b061edf0205f702b1835d0023bfa8f98
SHA2566a5efe7b00bb46d42aaabf625bb704b1e770f7d1c7c04bf2819b2442f1e83dc7
SHA51298d3cf4c4eed53d8aed25d37b32b3afb6cee11f5d29575aa70ed25548433e1256bf7b3a3d80162f8b5cd9c61c185c3b812360ded02f03db7c01b63bd0242ab53