Analysis
-
max time kernel
161s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2024, 18:59
Behavioral task
behavioral1
Sample
1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe
Resource
win10v2004-20240226-en
General
-
Target
1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe
-
Size
453KB
-
MD5
4935e1001f29229cedcc5177a2a234ae
-
SHA1
0654fcd742bd2f8d5b42575513ca0f1c291cd95b
-
SHA256
1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79
-
SHA512
d644064d03d688f65bbfac3976e451d7ef48342023574160c5b2833c7d5da573edd625a6b15a5b75a471df7046165bdc9e5bce44e7c13c8f28b9ebf21de7a082
-
SSDEEP
6144:VjluQoSv4DSIo5R4nM/40ySne2hsgUNbUbNcIPNUtEbjNCkSlYX41r152k7LkXLA:VEQoSfqwBYUblXIkqYX4B152k7w5scqf
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 16 IoCs
resource yara_rule behavioral2/memory/3364-11-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-20-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4700-148-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3364-162-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3640-163-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-178-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-179-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-195-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-199-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-215-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-219-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-223-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-231-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-235-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1580-239-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 18 IoCs
resource yara_rule behavioral2/memory/1580-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023350-5.dat UPX behavioral2/memory/3364-11-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-20-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4700-148-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3364-162-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3640-163-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-178-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-179-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-195-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-199-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-215-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-219-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-223-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-231-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-235-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1580-239-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1580-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023350-5.dat upx behavioral2/memory/3364-11-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-20-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4700-148-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3364-162-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3640-163-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-178-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-179-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-231-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-235-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1580-239-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\E: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\T: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\V: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\I: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\J: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\L: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\M: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\O: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\A: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\G: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\H: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\W: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\P: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\R: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\S: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\Z: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\K: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\Q: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\U: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\B: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\N: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File opened (read-only) \??\X: 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\horse hardcore voyeur cock boots .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\IME\SHARED\horse hot (!) titts .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\brasilian animal horse lesbian 40+ (Sonja,Karin).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lesbian voyeur boots .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\config\systemprofile\russian cum lingerie public (Jade).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\FxsTmp\japanese cumshot beast [bangbus] hole (Ashley,Sylvia).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\config\systemprofile\russian kicking fucking uncut titts (Christine,Sarah).zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\System32\DriverStore\Temp\horse hot (!) (Sylvia).zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\hardcore uncut .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\IME\SHARED\tyrkish cumshot gay girls titts black hairunshaved .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\tyrkish nude hardcore several models .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\fucking lesbian (Tatjana).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Shared Gadgets\danish cumshot lingerie hot (!) hole beautyfull .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\indian kicking beast several models gorgeoushorny (Christine,Tatjana).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Google\Temp\brasilian beastiality lesbian [free] shower .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{1FAC69E2-6A78-4418-8957-20DE7094BB95}\EDGEMITMP_86547.tmp\horse masturbation glans .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\dotnet\shared\beast lesbian (Janette).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\gay hidden beautyfull .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\american beastiality beast [bangbus] mistress .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\japanese action lingerie hidden (Melissa).zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Microsoft Office\Updates\Download\russian kicking trambling sleeping glans .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\american action xxx hidden 50+ .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Microsoft Office\root\Templates\blowjob hot (!) .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\american nude hardcore big (Melissa).avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\gay full movie titts circumcision .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Google\Update\Download\sperm [bangbus] sweet .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\brasilian kicking sperm hot (!) feet .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Microsoft\Temp\trambling masturbation feet upskirt .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\xxx girls feet blondie .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files\Common Files\microsoft shared\japanese gang bang lesbian hot (!) granny .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\tyrkish nude fucking public pregnant .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\black porn sperm several models castration .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\german sperm uncut glans leather .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\hardcore licking circumcision (Gina,Samantha).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\gang bang fucking several models glans bedroom .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\handjob beast several models (Karin).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\Downloaded Program Files\russian cumshot sperm [bangbus] glans pregnant .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\nude beast full movie hotel .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\gay big glans (Sonja,Sarah).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\sperm uncut mistress .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\american gang bang sperm lesbian (Sarah).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\nude sperm [milf] titts pregnant .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\french lingerie public redhair .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\italian horse horse girls redhair .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_aaeae146be52e178\american nude sperm several models hole pregnant (Jade).zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\InputMethod\SHARED\fucking [milf] hole 40+ (Sarah).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\russian fetish fucking [bangbus] cock .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\chinese beast hot (!) .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\cum sperm several models .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\trambling public .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\animal beast public cock circumcision .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\cumshot gay masturbation feet sweet (Janette).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\chinese bukkake [milf] shoes .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\british bukkake girls glans leather .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\horse licking blondie .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\canadian gay public (Jade).zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\beastiality blowjob hidden cock boots .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\tyrkish action beast masturbation .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\russian fetish trambling several models titts (Jenna,Melissa).avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\italian kicking xxx girls (Tatjana).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\horse hardcore big feet high heels (Tatjana).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\animal fucking hidden (Janette).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\asian fucking uncut beautyfull .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\PLA\Templates\american beastiality gay voyeur cock swallow .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\kicking blowjob [bangbus] glans shower (Sarah).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\norwegian lesbian catfight shoes .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\chinese beast public castration (Gina,Karin).avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\beast sleeping hole .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\security\templates\danish nude horse several models castration .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\lingerie voyeur pregnant .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\tyrkish action lesbian uncut pregnant (Christine,Sylvia).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\horse fucking licking cock balls (Sarah).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\trambling girls cock pregnant (Jade).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\chinese sperm sleeping sm .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\hardcore voyeur glans .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\fucking [bangbus] titts circumcision .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\danish action lingerie girls titts 40+ .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\animal blowjob masturbation mature (Britney,Karin).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\gay licking beautyfull .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\japanese cumshot fucking [milf] feet .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\cum sperm girls feet (Jenna,Samantha).zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\handjob bukkake masturbation titts (Anniston,Curtney).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\african lingerie several models glans .zip.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\norwegian sperm lesbian .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\nude lingerie voyeur (Samantha).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\american cum gay [bangbus] cock sm (Janette).rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\gang bang beast uncut cock sweet .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\asian bukkake [free] lady (Ashley,Curtney).mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\horse trambling [free] .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\french lingerie lesbian hole .mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\french xxx several models titts pregnant .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\french gay voyeur granny .avi.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\assembly\temp\japanese fetish gay voyeur .rar.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\danish fetish sperm lesbian hotel (Kathrin,Janette).mpeg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\swedish porn lesbian lesbian mature .mpg.exe 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3364 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 3640 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4700 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 94 PID 1580 wrote to memory of 4700 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 94 PID 1580 wrote to memory of 4700 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 94 PID 1580 wrote to memory of 3364 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 95 PID 1580 wrote to memory of 3364 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 95 PID 1580 wrote to memory of 3364 1580 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 95 PID 4700 wrote to memory of 3640 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 96 PID 4700 wrote to memory of 3640 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 96 PID 4700 wrote to memory of 3640 4700 1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"C:\Users\Admin\AppData\Local\Temp\1755af268f1c596328c8f6d2a238b9eb3efb5057625db6ad3da553aa6550bf79.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4880 --field-trial-handle=3488,i,1267426273081718772,6254127258555406296,262144 --variations-seed-version /prefetch:81⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\gay hidden beautyfull .mpeg.exe
Filesize1.9MB
MD551c6b9cb044b4afaa56ec8ced2ea3e7c
SHA148d820d262ee4c4f17003079a3d12bcae594fbc4
SHA2567af5c0e4789dc1a033dbf333f11b22f15057ec5eafc557ec6969a579f1f74669
SHA5127edfdbc6bcbad457ef8c19357187e9a7154e9d5ad9c1ae9c2e4401c8efbede3bfc14debfe4bc927eddbb7eda15153f9bea883371620493d72816eaea15f15e8e