Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 02:09
Behavioral task
behavioral1
Sample
ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe
Resource
win10v2004-20240226-en
General
-
Target
ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe
-
Size
535KB
-
MD5
703309d0adcb84035312ef0ab4ac0017
-
SHA1
5586852924899b6c2fb98df36a20058714623112
-
SHA256
ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab
-
SHA512
267dfead5703409c16fc88895cea04402fc1a69f6379416445bd3e319cbe749c96450140e8f6647b27ea8afaaa92b458e23bef6079cc5013a82e2e24c43e0d88
-
SSDEEP
12288:0EQoSCHxlIJMaMcNEu5/WOjx7M6rVtup4xQRkQQ6K1vZ2Y1tQtG4XGq:0GfaKz6nucQRrNKxAQWtpXN
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral2/memory/868-15-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1120-17-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-19-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3164-144-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/868-156-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-158-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-195-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-200-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-204-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-208-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-212-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-218-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-232-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-236-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2880-240-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/2880-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023232-5.dat UPX behavioral2/memory/3164-10-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/868-15-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1120-17-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-19-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3164-144-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/868-156-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-158-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-195-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-200-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-204-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-208-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-212-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-218-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-232-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-236-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2880-240-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2880-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023232-5.dat upx behavioral2/memory/3164-10-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/868-15-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1120-17-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-19-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3164-144-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/868-156-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-158-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-200-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-212-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2880-240-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\J: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\M: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\Q: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\B: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\E: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\S: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\V: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\W: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\X: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\Y: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\A: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\L: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\R: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\Z: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\I: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\N: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\O: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\P: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\T: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\U: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\H: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File opened (read-only) \??\K: ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\russian animal gay uncut titts 50+ (Jade).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\FxsTmp\canadian hardcore sleeping boots .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\italian gang bang lesbian masturbation cock (Anniston,Liz).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black horse xxx hidden glans .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\config\systemprofile\indian gang bang trambling lesbian fishy .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\IME\SHARED\black cum beast hot (!) balls (Kathrin,Curtney).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\config\systemprofile\indian action gay voyeur (Tatjana).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\blowjob hidden feet granny .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\FxsTmp\lingerie full movie fishy .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake several models hole stockings .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian gang bang horse girls titts young (Samantha).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SysWOW64\IME\SHARED\italian porn lingerie catfight high heels .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\gay catfight stockings .mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lingerie lesbian ash .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\black gang bang xxx girls .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\russian handjob blowjob [free] girly .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Common Files\microsoft shared\italian gang bang gay [free] titts upskirt (Curtney).zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Microsoft Office\root\Templates\japanese cum sperm lesbian shower .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Microsoft Office\Updates\Download\american porn trambling masturbation (Curtney).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\tyrkish fetish xxx hidden cock fishy (Janette).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\lesbian catfight mistress .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\danish action sperm big hole blondie (Karin).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\nude lesbian voyeur (Sylvia).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\indian porn gay lesbian (Janette).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\hardcore lesbian (Liz).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Google\Update\Download\american horse gay catfight cock .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\horse several models ash (Sonja,Curtney).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\tyrkish cum trambling big (Karin).rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Program Files (x86)\Google\Temp\russian cumshot horse masturbation mature .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\handjob fucking girls feet swallow .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\japanese porn fucking [milf] wifey .mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\xxx licking hole .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\porn gay uncut feet black hairunshaved .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\asian beast public hole mature .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\asian xxx [free] glans .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\brasilian porn fucking licking hole traffic (Melissa).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\african bukkake catfight pregnant (Ashley,Sylvia).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\black horse gay hidden feet balls (Karin).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\assembly\temp\hardcore [free] pregnant .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\german horse hot (!) cock .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\german lingerie [milf] boots .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\spanish trambling girls titts young .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\spanish beast public castration .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\chinese xxx [milf] .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\beast hot (!) (Sarah).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\animal fucking hot (!) ash .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\lesbian several models (Curtney).zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\brasilian porn blowjob public cock femdom .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\gang bang gay [milf] mistress .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\french gay licking wifey .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\spanish xxx masturbation (Liz).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\xxx uncut .mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\chinese fucking hidden .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\brasilian handjob xxx [milf] latex .mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\lingerie lesbian upskirt .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\beastiality lesbian sleeping .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\horse full movie beautyfull .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\horse sperm hidden feet latex .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\lesbian [bangbus] hole YEâPSè& (Liz).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\indian porn horse [milf] (Melissa).zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\swedish porn horse girls titts .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\lesbian hot (!) cock young .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\handjob xxx several models 50+ .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\japanese porn lingerie full movie cock sweet .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\indian cumshot sperm catfight feet boots (Sarah).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\InputMethod\SHARED\indian action bukkake uncut titts ejaculation (Janette).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\malaysia lesbian uncut Ôï .mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\lingerie sleeping titts .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\CbsTemp\xxx public upskirt .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\bukkake masturbation cock YEâPSè& .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\american porn trambling girls glans black hairunshaved .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\kicking xxx licking gorgeoushorny .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\indian cumshot trambling big titts bedroom (Curtney).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\american gang bang fucking hot (!) feet young .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\asian horse uncut hairy (Jenna,Jade).zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\italian cumshot hardcore masturbation hole penetration .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\spanish lingerie [milf] hole latex .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\bukkake licking glans traffic .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\british fucking sleeping .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\cum horse hidden .mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\nude fucking catfight castration .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\indian porn fucking hot (!) cock boots .avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\animal beast licking cock hotel .rar.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\SoftwareDistribution\Download\black gang bang hardcore big hole traffic (Liz).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\handjob gay [free] bedroom .zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\blowjob [bangbus] cock .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\italian horse hardcore big (Karin).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\black animal bukkake big feet (Gina,Janette).zip.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\kicking lingerie big feet .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\french beast [bangbus] shoes (Jenna,Janette).avi.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\swedish beastiality lesbian lesbian feet (Sandy,Samantha).mpeg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\danish action bukkake uncut feet Œã (Samantha).mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\spanish bukkake several models feet lady .mpg.exe ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 868 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 1120 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3164 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 87 PID 2880 wrote to memory of 3164 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 87 PID 2880 wrote to memory of 3164 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 87 PID 3164 wrote to memory of 868 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 89 PID 3164 wrote to memory of 868 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 89 PID 3164 wrote to memory of 868 3164 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 89 PID 2880 wrote to memory of 1120 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 90 PID 2880 wrote to memory of 1120 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 90 PID 2880 wrote to memory of 1120 2880 ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
-
C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"C:\Users\Admin\AppData\Local\Temp\ba692ad6a3534608ccfacede01fa08bbc212e835e82fee2c4f0e5681fdb510ab.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lingerie lesbian ash .zip.exe
Filesize319KB
MD5f38af05e90a1656f4d148962a8daf428
SHA17dd502d2c2c5284a16b55b2724186b91024a6983
SHA256e194869189b3c8f69c278be66f7372729ac9939c4da5c22cef265a7d698ff67c
SHA512c27b90ce5799e804c77fc6a6c717c8b6288657d71d2becb7a15ed9217c7a075f4fa9ea510c919e4c067d4a38a00535f732a1393557008eb008f6519af3d258cf