Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2024, 19:01
Behavioral task
behavioral1
Sample
1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe
Resource
win10v2004-20240226-en
General
-
Target
1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe
-
Size
342KB
-
MD5
4872e250d951de9ac7a051824be7d500
-
SHA1
4722437fbb8e4669d4b13333d762020e14a6c46f
-
SHA256
1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a
-
SHA512
425ce2c02af68e3845c80c2ae7b9f29d5c438824742f180523803f7512d43aa4a3d9c3cedddd8d7d4d277d688eb6dd1dc43e38464feac42aefed655ee74d7458
-
SSDEEP
6144:JjluyDM3Io5R4nM/40yJNvpIG4bPyylZZewFZ4gJHshCPhio2JDEq3K4kIsuBc:JEyDMhqhtpn4bqylZnF9JHQq52K4kR3
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/4720-33-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2936-158-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4328-160-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4720-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2936-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4328-189-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-207-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-216-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-220-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-224-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-232-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-236-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-240-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-244-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4500-248-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x000c0000000231ad-5.dat UPX behavioral2/memory/4720-33-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2936-158-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4328-160-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4720-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2936-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4328-189-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-207-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-216-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-220-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-224-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-232-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-236-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-240-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-244-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4500-248-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000c0000000231ad-5.dat upx behavioral2/memory/4720-33-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2936-158-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4328-160-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4720-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2936-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4328-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-240-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-244-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4500-248-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\Z: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\O: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\Q: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\I: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\K: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\M: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\R: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\T: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\V: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\A: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\B: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\N: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\S: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\X: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\J: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\L: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\H: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\P: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\U: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\W: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\E: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File opened (read-only) \??\G: 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\gay big glans (Anniston,Liz).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\danish cum blowjob full movie .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\brasilian beastiality blowjob [free] hole ejaculation (Jade).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\System32\DriverStore\Temp\bukkake hidden titts shoes .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\beast catfight glans bedroom .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\japanese nude fucking hot (!) feet ash .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\config\systemprofile\russian beastiality xxx hot (!) feet (Britney,Sarah).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\IME\SHARED\brasilian cum gay sleeping .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\config\systemprofile\swedish beastiality beast hidden swallow .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\FxsTmp\handjob beast [free] lady .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SysWOW64\IME\SHARED\sperm [free] cock redhair (Tatjana).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\blowjob hidden feet upskirt .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\gay hot (!) mature .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\xxx [milf] feet (Britney,Curtney).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Common Files\microsoft shared\swedish gang bang sperm full movie cock .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Microsoft Office\root\Templates\indian fetish bukkake catfight hole leather .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\indian handjob fucking sleeping (Tatjana).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\brasilian porn gay [bangbus] .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\danish handjob trambling girls feet .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Google\Temp\swedish beastiality horse [milf] .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\indian horse horse [free] bedroom .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Microsoft\Temp\lesbian uncut blondie .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\dotnet\shared\lingerie hidden hole traffic (Liz).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Microsoft Office\Updates\Download\lesbian several models (Curtney).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\horse masturbation lady .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\lingerie big balls (Sonja,Sarah).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\horse hidden (Sarah).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\horse hot (!) circumcision .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\indian kicking hardcore lesbian bondage (Kathrin,Melissa).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\lesbian girls cock .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\black action hardcore licking glans sm .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\tyrkish animal sperm uncut cock gorgeoushorny .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\british bukkake licking sweet .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\beast sleeping (Liz).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\japanese gang bang hardcore public circumcision (Anniston,Tatjana).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\cum lingerie hidden titts bondage (Curtney).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\trambling lesbian latex .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\chinese sperm voyeur .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\indian nude fucking licking glans .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\nude lingerie several models .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\british trambling hidden granny .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\cumshot sperm sleeping cock upskirt .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\african hardcore [free] titts lady (Curtney).rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\danish beastiality lingerie hidden .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\fetish xxx sleeping glans castration (Melissa).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\asian bukkake masturbation hotel .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\asian trambling uncut sweet (Britney,Melissa).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\british hardcore [free] cock leather (Samantha).mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\japanese kicking lingerie [free] hole leather .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\african fucking masturbation feet upskirt .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\german lingerie catfight Ôï .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\italian cum lingerie girls femdom .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\asian gay hot (!) girly .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\russian horse xxx girls (Jade).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\fucking girls .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\beastiality fucking uncut feet redhair (Sylvia).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\lesbian lesbian latex .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\cum lesbian sleeping feet (Kathrin,Melissa).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\black gang bang lesbian voyeur hole fishy (Tatjana).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\tyrkish nude bukkake masturbation mistress .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\sperm masturbation glans hotel (Curtney).rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\asian blowjob several models glans .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\german trambling catfight titts (Sonja,Samantha).mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\CbsTemp\black fetish fucking licking (Liz).avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\german sperm lesbian lady .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\xxx girls feet hairy (Jade).mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\norwegian gay [bangbus] swallow .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\lesbian catfight .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\bukkake hidden lady (Christine,Sylvia).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\african lesbian sleeping feet girly .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\gang bang fucking girls .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\indian porn bukkake several models penetration .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\horse sperm hidden castration (Sonja,Janette).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\chinese horse full movie young .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\lesbian [bangbus] ash .mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\brasilian handjob horse hidden swallow .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\bukkake [bangbus] hole .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\danish kicking blowjob uncut pregnant .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\norwegian trambling masturbation .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\animal beast licking upskirt .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\african blowjob hot (!) feet 40+ (Sarah).mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\nude horse several models bedroom .zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\brasilian beastiality horse hot (!) bedroom .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_d58d4747b1d5988c\french gay uncut glans Ôï (Liz).mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\sperm hidden feet mature .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\malaysia bukkake girls stockings .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\tyrkish gang bang xxx masturbation feet (Sandy,Jade).mpeg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\canadian fucking licking titts gorgeoushorny .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\chinese xxx public hairy .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_aaeae146be52e178\african sperm [bangbus] (Janette).zip.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\british xxx masturbation cock .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\canadian gay uncut granny .avi.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\japanese horse lesbian hidden hole .mpg.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\french lingerie voyeur wifey .rar.exe 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4328 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 2936 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4720 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 90 PID 4500 wrote to memory of 4720 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 90 PID 4500 wrote to memory of 4720 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 90 PID 4500 wrote to memory of 2936 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 95 PID 4500 wrote to memory of 2936 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 95 PID 4500 wrote to memory of 2936 4500 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 95 PID 4720 wrote to memory of 4328 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 96 PID 4720 wrote to memory of 4328 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 96 PID 4720 wrote to memory of 4328 4720 1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"C:\Users\Admin\AppData\Local\Temp\1804540d1670d8d4c8a1ff4055cc25612e83bd25034d92501674cb6530b6f84a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\indian handjob fucking sleeping (Tatjana).mpg.exe
Filesize1.4MB
MD5f8cba72ec3c55090fafe9293f7705faf
SHA15bc6b5d2f13ef369ec7832e94fff6c380fed9f0e
SHA256d49c634347ec61f181b51977637da72a418c2cf2803be52acc2a2dade60240b2
SHA5124b75ea286751efd56f95a0c2df7dcf2715f5c65296cf23ff443bfd525211cffd5839c9c0a2d4c9364041a529e81e349d84a08383988d85fe06423513473d427c