Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 00:06
Behavioral task
behavioral1
Sample
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe
Resource
win10v2004-20240226-en
General
-
Target
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe
-
Size
1.2MB
-
MD5
1e1d769110f5977c72c6011b7c88a3de
-
SHA1
520599bc8030c00931d3af9e56b8d2ad0c46f06e
-
SHA256
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280
-
SHA512
d2e086fcfc8f85daefdaea0233edb393d9ff82666041d957d69d656fdd0086694cadea8c7226a3f437ad7ac836a2d4e19cb80a470940b0c019a3d3f661c0a77c
-
SSDEEP
24576:t2DEBwHRoEZGcqZJuVtWOPAo87hdhH/4TRH7E39BLmpetnkCdXC:QXZhHtTYftQTRH7E3ypetnpdXC
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/3480-174-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-189-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4196-190-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1624-192-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3480-193-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-194-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-200-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-210-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-214-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-219-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-223-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-227-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-235-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-239-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-243-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-247-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3388-251-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/3388-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x00070000000231fb-5.dat UPX behavioral2/memory/4196-137-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1624-172-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3480-174-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-189-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4196-190-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1624-192-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3480-193-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-194-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-200-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-210-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-214-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-219-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-223-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-227-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-235-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-239-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-243-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-247-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3388-251-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3388-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x00070000000231fb-5.dat upx behavioral2/memory/4196-137-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1624-172-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3480-174-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-189-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4196-190-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1624-192-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3480-193-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-194-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-200-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-210-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-214-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-219-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-223-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-227-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-235-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-239-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-243-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-247-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3388-251-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\P: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\R: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\S: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\T: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\V: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\Y: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\H: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\J: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\U: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\W: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\E: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\M: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\N: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\O: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\Z: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\B: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\G: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\I: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\L: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\Q: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\X: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File opened (read-only) \??\A: b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\japanese action fucking girls cock girly .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black beastiality lingerie big blondie (Sonja,Karin).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\System32\DriverStore\Temp\lingerie licking (Janette).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\FxsTmp\chinese horse voyeur hairy .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\IME\SHARED\horse catfight (Janette).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\beast public glans .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian animal hardcore hidden castration (Gina,Sarah).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\config\systemprofile\danish kicking lingerie sleeping glans pregnant (Karin).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\black porn hardcore girls mature .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\FxsTmp\italian gang bang hardcore full movie boots .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\IME\SHARED\gay masturbation young (Sandy,Jade).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\brasilian gang bang lingerie sleeping feet black hairunshaved (Melissa).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\bukkake hidden feet hotel .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\horse full movie .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\tyrkish porn blowjob hot (!) traffic .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Common Files\microsoft shared\indian handjob lingerie masturbation feet ash (Jade).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Microsoft Office\root\Templates\danish cumshot blowjob licking titts girly .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish cum sperm lesbian glans (Kathrin,Karin).rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\horse girls hole .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\italian beastiality lingerie hidden cock shoes .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Google\Update\Download\italian beastiality lingerie public .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\chinese hardcore full movie feet shoes .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Google\Temp\tyrkish fetish gay girls feet 50+ .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\japanese fetish horse masturbation upskirt .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\russian kicking beast [free] .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\Microsoft Office\Updates\Download\danish handjob lesbian several models .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\sperm [bangbus] .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\blowjob public cock .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Microsoft\Temp\hardcore full movie pregnant .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\italian cum sperm voyeur ash .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\black nude lingerie [bangbus] Ôï .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\norwegian lesbian [milf] hole (Kathrin,Janette).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\sperm masturbation feet granny .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\InstallTemp\russian kicking blowjob uncut black hairunshaved (Sonja,Melissa).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\InputMethod\SHARED\brasilian cumshot hardcore full movie 50+ (Sonja,Jade).zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\beast licking feet .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\sperm sleeping granny .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\xxx big hole mature (Janette).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\indian beastiality beast voyeur hole 40+ .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\brasilian action xxx uncut (Sarah).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\assembly\temp\russian fetish horse public titts .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\Downloaded Program Files\hardcore several models glans pregnant (Sylvia).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\brasilian gang bang gay catfight titts wifey .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\german trambling hot (!) redhair (Kathrin,Jade).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\swedish fetish blowjob voyeur .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\assembly\tmp\lingerie voyeur feet ejaculation .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\security\templates\xxx full movie fishy .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\italian kicking lingerie catfight balls (Christine,Curtney).rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\canadian bukkake masturbation titts shower .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\indian fetish xxx catfight upskirt .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\horse lesbian [bangbus] .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\xxx catfight (Karin).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\trambling full movie latex (Kathrin,Karin).avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\action lingerie hidden redhair .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\swedish nude lesbian hot (!) glans high heels .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\italian action gay [free] titts ejaculation .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\animal xxx hidden girly .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\german hardcore several models hole .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\indian porn beast public traffic .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\black horse bukkake sleeping bedroom .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\german sperm masturbation bondage .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\beastiality sperm [bangbus] cock .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\german lesbian big hole YEâPSè& .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\beastiality lingerie girls titts .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-sharedcomponents_b03f5f7f11d50a3a_4.0.19041.1_none_47ca94859da20b28\swedish kicking gay [bangbus] beautyfull .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\PLA\Templates\horse girls titts .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\horse masturbation (Tatjana).mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\swedish animal gay [milf] beautyfull .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\brasilian animal lesbian masturbation cock .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\british horse girls glans .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\hardcore several models .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\lingerie public feet bedroom .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\sperm several models balls .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\spanish fucking voyeur hairy .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\nude lingerie uncut titts .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\Temp\swedish gang bang lesbian public glans fishy .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\british bukkake hot (!) .mpeg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\british trambling lesbian feet .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\kicking gay hidden wifey .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\american gang bang sperm voyeur titts .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\spanish hardcore hot (!) redhair .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\japanese nude fucking sleeping redhair .mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\italian handjob xxx catfight .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\action blowjob public hole 50+ (Tatjana).zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\blowjob hot (!) blondie .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\action xxx hidden hairy .rar.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\malaysia beast lesbian cock hotel (Curtney).mpg.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\cum trambling lesbian latex .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\action sperm licking titts .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\horse several models .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\hardcore [bangbus] hole .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\fucking uncut feet bedroom .zip.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\xxx licking beautyfull .avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\asian trambling girls glans hairy (Liz).avi.exe b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3480 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 1624 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4196 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 89 PID 3388 wrote to memory of 4196 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 89 PID 3388 wrote to memory of 4196 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 89 PID 3388 wrote to memory of 1624 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 90 PID 3388 wrote to memory of 1624 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 90 PID 3388 wrote to memory of 1624 3388 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 90 PID 4196 wrote to memory of 3480 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 91 PID 4196 wrote to memory of 3480 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 91 PID 4196 wrote to memory of 3480 4196 b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"C:\Users\Admin\AppData\Local\Temp\b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish cum sperm lesbian glans (Kathrin,Karin).rar.exe
Filesize728KB
MD5621640778ec9bec624c1ae2615f4a6eb
SHA12bd4843cfb2cbb196dccd18e6720212f0abad365
SHA25611a7cae00e48015c635e4f0130669195b66778f0da4dd789db985a054bb2787e
SHA512e33bbe78fef63257a4f1f93083ad445b09e63360c608a1985bc999a8640968ab82de4185eaf579a32181bd3c648d6a26fdffe85e580620dbfd5a3d97441648b8