Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 23:18
Behavioral task
behavioral1
Sample
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe
Resource
win10v2004-20240226-en
General
-
Target
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe
-
Size
1.2MB
-
MD5
de5e5c1b46f8e29fd54194774cc568d6
-
SHA1
57fd099cf119960c9dac673739745eb7e32fe320
-
SHA256
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62
-
SHA512
b8d56f6160eec22cb74479f302968f5be03d584fe2459f5aaa59b032638baa0c327588ab60cc51ab5b2038a03e00ac19c4275c8bc267c5b16b08f84ac7bc1775
-
SSDEEP
24576:0DMezrZee9E7ZdxbvQ3dp1qAMfxgIIHeDEtpPC4RbqG:yrLE77xjQ3FqAHIIH4cpjWG
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
Processes:
resource yara_rule behavioral2/memory/3560-160-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1952-161-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4600-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3560-182-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-192-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-202-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-206-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-215-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-219-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-223-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-227-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-231-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-235-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-239-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1092-243-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral2/memory/1092-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american fetish beast big .avi.exe UPX behavioral2/memory/3560-160-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1952-161-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4600-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3560-182-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-192-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-202-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-206-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-215-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-219-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-223-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-227-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-231-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-235-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-239-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1092-243-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/1092-0-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american fetish beast big .avi.exe upx behavioral2/memory/3560-160-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1952-161-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4600-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3560-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-192-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-202-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-231-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-235-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-239-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1092-243-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription ioc process File opened (read-only) \??\H: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\J: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\R: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\X: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\U: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\A: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\E: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\G: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\I: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\L: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\O: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\Q: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\B: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\N: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\P: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\T: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\W: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\Z: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\K: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\M: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\S: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\V: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File opened (read-only) \??\Y: 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Drops file in System32 directory 12 IoCs
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription ioc process File created C:\Windows\SysWOW64\IME\SHARED\danish gang bang hardcore uncut .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake voyeur .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\config\systemprofile\gay sleeping (Sarah).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\IME\SHARED\xxx full movie (Janette).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\horse masturbation hole castration .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\american kicking trambling hidden (Liz).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\config\systemprofile\russian fetish trambling sleeping titts .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\System32\DriverStore\Temp\trambling full movie feet balls (Samantha).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\FxsTmp\norwegian gay sleeping shower .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\beast sleeping shoes .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\FxsTmp\hardcore masturbation hole castration .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\trambling [bangbus] (Melissa).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Drops file in Program Files directory 18 IoCs
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription ioc process File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\black cum xxx [free] fishy .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Microsoft Office\root\Templates\sperm big feet granny (Jade).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\lingerie catfight boots .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Microsoft Office\Updates\Download\russian fetish lingerie [bangbus] (Liz).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\tyrkish fetish beast voyeur YEâPSè& (Sandy,Karin).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Google\Update\Download\tyrkish fetish trambling big .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Microsoft\Temp\indian cumshot lesbian girls titts stockings .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\gay masturbation feet hotel .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\indian horse gay hot (!) glans stockings .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\cum gay several models feet granny (Janette).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Google\Temp\horse hot (!) hole pregnant .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Common Files\microsoft shared\xxx licking (Melissa).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\cumshot gay [free] (Sylvia).zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\malaysia bukkake lesbian feet YEâPSè& (Samantha).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\brasilian beastiality lingerie several models feet leather (Janette).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\tyrkish beastiality lingerie licking (Melissa).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\dotnet\shared\american cum beast voyeur cock .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american fetish beast big .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Drops file in Windows directory 64 IoCs
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription ioc process File created C:\Windows\security\templates\tyrkish horse hardcore full movie titts .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\russian cum bukkake full movie .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\action trambling several models mistress .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\assembly\temp\danish animal blowjob hot (!) shower .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\asian fucking several models (Melissa).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\sperm full movie glans .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-sharedcomponents_b03f5f7f11d50a3a_4.0.19041.1_none_47ca94859da20b28\sperm [free] upskirt .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\african hardcore licking ash (Sonja,Janette).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\black kicking horse girls titts traffic (Liz).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\trambling uncut 50+ (Britney,Sylvia).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\mssrv.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\norwegian fucking [free] hole lady (Sylvia).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\beastiality beast girls glans .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\horse full movie black hairunshaved .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\animal fucking full movie (Janette).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\black kicking lesbian public hole girly (Karin).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\african hardcore [free] .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\kicking xxx public lady .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\cum beast licking .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\porn trambling several models swallow .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\action gay hot (!) (Tatjana).zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\russian cumshot hardcore [milf] feet .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\canadian fucking licking titts .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\spanish xxx girls glans swallow (Jade).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\russian gang bang trambling catfight cock .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\action horse [milf] titts castration .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\hardcore [bangbus] feet .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\spanish hardcore full movie glans traffic .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\lingerie masturbation cock .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\lesbian [milf] feet .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\brasilian kicking xxx [free] .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\chinese xxx voyeur hole blondie (Jade).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\gang bang xxx girls glans .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\xxx [milf] mistress .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\italian action fucking hidden .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\chinese beast masturbation (Liz).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\assembly\tmp\american cumshot gay masturbation titts fishy (Curtney).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\indian kicking bukkake full movie .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\german blowjob public cock upskirt .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\gang bang bukkake full movie hole sm (Curtney).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\asian xxx hidden glans .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\german hardcore licking .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\swedish nude lingerie [milf] feet hairy .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\french beast catfight black hairunshaved .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\canadian fucking public cock .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\french beast [bangbus] (Karin).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\InputMethod\SHARED\danish gang bang lesbian masturbation ash .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\animal blowjob [bangbus] traffic (Jenna,Sarah).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\tyrkish porn blowjob catfight cock lady (Karin).mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\chinese lesbian masturbation feet beautyfull (Janette).mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\handjob fucking sleeping (Samantha).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\gang bang blowjob [free] titts ejaculation (Jade).rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\horse fucking [milf] glans .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\sperm catfight glans circumcision .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\hardcore voyeur cock stockings .avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\indian beastiality xxx [milf] .zip.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\horse hidden cock shoes (Janette).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\cumshot lesbian lesbian .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\british fucking full movie glans balls .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\indian handjob xxx [milf] hole mistress .mpeg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\lingerie sleeping .mpg.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\cumshot beast public cock boots .rar.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_e79b400a6df5fd2c\indian nude lingerie lesbian titts fishy (Tatjana).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\norwegian lingerie big cock ash (Sylvia).avi.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exepid process 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1952 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 3560 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exedescription pid process target process PID 1092 wrote to memory of 4600 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 1092 wrote to memory of 4600 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 1092 wrote to memory of 4600 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 1092 wrote to memory of 3560 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 1092 wrote to memory of 3560 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 1092 wrote to memory of 3560 1092 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 4600 wrote to memory of 1952 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 4600 wrote to memory of 1952 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe PID 4600 wrote to memory of 1952 4600 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe 8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"C:\Users\Admin\AppData\Local\Temp\8e8bf7a5c1b9b9c9ea150a72574b9b6c8e52715c1d1af937ad3e443c45c22a62.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\american fetish beast big .avi.exe
Filesize1.3MB
MD5b974a907218bc9279603825878bd32cf
SHA1e9581c7a8defdbc5cbc64a026216a0566254af2c
SHA256418b4ea406d0d6856d9dd90d5020056c8df037903a8fee3bdf21ad765bebb4ba
SHA5120ceba30caa8f3468340c53d2f408830befc89969d2a30102c41441831881864f34a77a2778912532002fb83d40162933c8f09e33a8faaad24d35378c040c4e77