Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2024, 18:55
Behavioral task
behavioral1
Sample
155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe
Resource
win10v2004-20240226-en
General
-
Target
155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe
-
Size
1.8MB
-
MD5
166746804407d665bae4db5100b783c1
-
SHA1
c779546fe933cb366f544d7f16daabc19a071aa5
-
SHA256
155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a
-
SHA512
689d8373491dd111b14541d09b4e3e7967dce96f8a5285b5b3b8a8d01b051df0e36cd63de1e73a703523962432838e1e18a5e9be79439e444948bc782e94ef07
-
SSDEEP
24576:VIVgWTJpYL5htqexCkPJfxyyL9gxIg8uihje2DwlUEE0lxQtdIGuVFeDWHoJEK2g:Wp+QvyBgn8u26xE0lmInVgDWHNmb8wr
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
resource yara_rule behavioral2/memory/1368-97-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3872-166-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3576-170-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3872-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-208-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-212-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-217-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-221-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-225-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-229-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-233-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-237-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-241-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-245-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3632-249-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023220-5.dat UPX behavioral2/memory/1368-97-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3872-166-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3576-170-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1368-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3872-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-208-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-212-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-217-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-221-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-225-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-229-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-233-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-237-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-241-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-245-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3632-249-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023220-5.dat upx behavioral2/memory/1368-97-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3872-166-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3576-170-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1368-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3872-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-212-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-229-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-233-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-237-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-241-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-245-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3632-249-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\G: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\J: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\L: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\R: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\U: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\E: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\N: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\T: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\W: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\Y: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\Z: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\I: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\M: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\O: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\P: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\V: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\S: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\A: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\B: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\H: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\K: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File opened (read-only) \??\Q: 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\russian action lingerie girls 50+ .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\IME\SHARED\action animal big feet latex .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\config\systemprofile\african gang bang sleeping hole latex (Ashley).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\FxsTmp\danish beast kicking [milf] hole black hairunshaved .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\IME\SHARED\danish gay cum sleeping granny .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\cumshot cumshot full movie titts castration .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\asian cum sleeping mistress .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\System32\DriverStore\Temp\asian porn voyeur feet bedroom .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\config\systemprofile\cum xxx catfight latex .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\FxsTmp\gang bang xxx voyeur .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\spanish cum trambling public .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian kicking cumshot uncut ash stockings .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Download\nude gay big ash (Curtney,Britney).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\black horse girls .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Google\Temp\sperm uncut .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Google\Update\Download\lingerie hardcore public (Britney,Christine).avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Microsoft\Temp\african nude [milf] boobs bedroom .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian action horse hot (!) .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\norwegian beastiality lesbian public sweet (Jenna,Sarah).avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\japanese cumshot horse big sweet (Liz).zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\lesbian hardcore public .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\horse [bangbus] titts (Gina).zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\british bukkake kicking several models shoes (Anniston,Kathrin).avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\dotnet\shared\indian hardcore girls circumcision .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Microsoft Office\root\Templates\danish handjob [free] black hairunshaved (Liz,Liz).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\swedish horse horse girls latex (Sarah,Liz).rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\lesbian trambling [free] .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\Common Files\microsoft shared\african horse girls boobs shower (Melissa).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\indian handjob cum [free] nipples .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\animal blowjob masturbation fishy .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\sperm [bangbus] traffic (Tatjana).avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\italian action fucking several models .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\nude action girls feet pregnant .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\beastiality catfight gorgeoushorny (Kathrin,Curtney).mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\cum voyeur .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\spanish porn action [free] boobs Ôï .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\lesbian trambling girls nipples .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\canadian sperm licking YEâPSè& .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\german cum licking femdom .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\japanese fetish cum masturbation .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\action cumshot masturbation vagina .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\action girls .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\PLA\Templates\lesbian sleeping mistress (Sonja).zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\Temp\blowjob cumshot voyeur hotel .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\black animal blowjob [bangbus] YEâPSè& .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\chinese handjob several models latex (Anniston).mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\canadian porn lesbian nipples swallow .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\norwegian fucking beast full movie feet fishy (Curtney,Samantha).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\cumshot trambling [milf] ejaculation (Britney).zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\swedish blowjob cumshot public .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\sperm [bangbus] ash upskirt .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\nude uncut vagina femdom .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\horse voyeur .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\african horse lesbian sm .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\black action catfight redhair .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\blowjob sleeping .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\handjob beast big titts blondie .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\norwegian sperm public castration .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\norwegian handjob girls .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\german gay lesbian big titts YEâPSè& .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\security\templates\japanese action trambling public (Samantha).mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\xxx voyeur .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\norwegian bukkake porn several models upskirt .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\lingerie fucking public sweet .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\beastiality lingerie masturbation blondie (Melissa,Ashley).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\lingerie handjob [free] bedroom .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\action animal hot (!) .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\american blowjob cum hidden (Karin,Curtney).mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\hardcore uncut (Liz,Sonja).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\american xxx licking nipples .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\assembly\tmp\horse [milf] (Sonja,Gina).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_c494b3b28da10665\malaysia cum cum [milf] leather (Sylvia).mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\italian fucking girls YEâPSè& .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\trambling uncut legs .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\hardcore action [free] cock bedroom .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\russian beastiality fucking full movie .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\brasilian fetish hidden fishy (Sylvia,Sonja).avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\tyrkish action catfight shoes .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\chinese blowjob sperm [milf] .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\beast kicking hidden .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\danish gang bang catfight .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\american fetish hardcore lesbian young .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\spanish cum porn hidden .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\mssrv.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\cumshot lesbian lesbian .rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\malaysia cum beastiality uncut boobs .mpg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\black animal nude voyeur boobs balls (Sonja,Britney).avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\danish animal bukkake big redhair .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\hardcore full movie cock Ôï (Sylvia).rar.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\beastiality [milf] castration .mpeg.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\lesbian uncut .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\porn kicking [bangbus] traffic .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\french blowjob kicking sleeping girly .avi.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\black bukkake full movie cock 50+ .zip.exe 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3576 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 3872 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1368 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 89 PID 3632 wrote to memory of 1368 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 89 PID 3632 wrote to memory of 1368 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 89 PID 1368 wrote to memory of 3872 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 94 PID 1368 wrote to memory of 3872 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 94 PID 1368 wrote to memory of 3872 1368 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 94 PID 3632 wrote to memory of 3576 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 95 PID 3632 wrote to memory of 3576 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 95 PID 3632 wrote to memory of 3576 3632 155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
-
C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"C:\Users\Admin\AppData\Local\Temp\155a1ee5c61a80243db4bceab6d17b4ebb58684073e6f249d272274c702cc36a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian action horse hot (!) .avi.exe
Filesize613KB
MD566b079aa21688400ae11743f74c5caa7
SHA19b510e583506953584cd62129d6e09f7df44fe89
SHA256faff241aa3665d7002827e9e3c716732b49308dc8f02a8f8b4e220fa02868b0d
SHA512e82b2cad8eca110739334084f29664df43db426e3a0568df991c8250a2cf95f8df66a84a335afb0205842c859d0434d9e7f437998b9078014071b5e5025d7c57