Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 19:25
Behavioral task
behavioral1
Sample
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe
Resource
win10v2004-20240319-en
General
-
Target
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe
-
Size
1.3MB
-
MD5
dd75b5bd5215a9a5c7dce002336a209b
-
SHA1
2c897efba30afd20dc1fdd73bdde8466f57f75a7
-
SHA256
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7
-
SHA512
10e4d2ca4e02dc6d8f4eb76772211ac58de932e39258820cb385b92caa2f82d0c5587cd4e83c102fe2533c2efa6f5a1b341ac2f9079ad2d8e3940ced0f993dc0
-
SSDEEP
24576:VyZhxQJpv8T2BckBQnrm9heT5ljetAiSOCmA4r8tYy2eOGDnF:sZTQJpv8T2aaYS6vFORAWQnF
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
Processes:
resource yara_rule behavioral2/memory/4212-38-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-150-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1528-165-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4212-174-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1356-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-195-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-199-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-204-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-220-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-224-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-232-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-237-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-241-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4364-245-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral2/memory/4364-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lingerie voyeur feet balls .mpg.exe UPX behavioral2/memory/4212-38-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-150-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1528-165-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4212-174-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1356-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-195-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-199-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-204-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-220-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-224-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-232-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-237-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-241-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4364-245-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4364-0-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lingerie voyeur feet balls .mpg.exe upx behavioral2/memory/4212-38-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-150-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1528-165-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4212-174-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1356-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-237-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-241-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4364-245-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription ioc process File opened (read-only) \??\J: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\S: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\G: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\T: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\A: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\B: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\E: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\N: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\Q: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\R: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\U: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\Y: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\I: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\K: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\M: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\Z: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\P: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\V: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\W: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\X: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\H: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\L: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File opened (read-only) \??\O: 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Drops file in System32 directory 12 IoCs
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\japanese kicking xxx catfight leather .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\FxsTmp\swedish fetish gay full movie castration .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\IME\SHARED\blowjob [bangbus] (Sarah).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\japanese cum gay hidden feet ash .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\sperm uncut .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese cumshot hardcore public titts .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\fucking lesbian penetration (Anniston,Sylvia).mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\FxsTmp\italian cum fucking [free] titts balls .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\brasilian cumshot bukkake lesbian glans bondage .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish handjob lingerie public titts shower (Liz).mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SysWOW64\config\systemprofile\trambling girls sweet .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\System32\DriverStore\Temp\indian handjob lesbian girls high heels .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Drops file in Program Files directory 19 IoCs
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription ioc process File created C:\Program Files\dotnet\shared\trambling lesbian 40+ .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\italian cum xxx several models young .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Microsoft Office\Updates\Download\italian fetish horse [milf] cock .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\brasilian action blowjob girls ,Ó .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Google\Update\Download\fucking licking cock circumcision .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\horse voyeur hole bondage (Janette).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Microsoft\Temp\gay [free] .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\american nude bukkake uncut cock lady (Melissa).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\indian porn sperm [milf] bondage .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lingerie voyeur feet balls .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\japanese cumshot sperm voyeur feet 50+ (Curtney).mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\fucking hidden feet balls (Sylvia).rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\british lingerie [milf] .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\xxx catfight hole stockings .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{D3EA2F86-0081-495C-8439-1E64CA71F999}\EDGEMITMP_57EE5.tmp\black kicking gay several models swallow .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Common Files\microsoft shared\gay lesbian .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Microsoft Office\root\Templates\blowjob [free] glans .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\swedish fetish xxx uncut titts .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Program Files (x86)\Google\Temp\horse uncut .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Drops file in Windows directory 64 IoCs
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription ioc process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\african trambling catfight feet .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\gay voyeur feet .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\xxx several models gorgeoushorny .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\xxx [free] feet lady (Janette).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\beastiality horse big hole YEâPSè& .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\InstallTemp\beastiality horse full movie titts bondage (Tatjana).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\CbsTemp\black kicking sperm voyeur titts .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\german hardcore [free] feet .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\sperm uncut castration (Jenna,Sylvia).avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\kicking lesbian hidden feet bedroom .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\beastiality blowjob lesbian YEâPSè& .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\blowjob voyeur YEâPSè& (Sonja,Janette).mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\italian nude horse hot (!) titts granny .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\kicking gay girls penetration (Ashley,Sarah).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\danish horse sperm uncut hole (Kathrin,Curtney).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\horse beast big (Samantha).rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\japanese horse sperm licking boots .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\lesbian sleeping (Samantha).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\spanish lingerie lesbian .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\swedish action bukkake masturbation titts black hairunshaved .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\american porn trambling full movie (Sarah).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\german horse hot (!) (Liz).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\beastiality horse girls .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\russian handjob hardcore lesbian shower .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\swedish horse sperm lesbian feet high heels (Sylvia).rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\chinese bukkake public ash .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\danish cumshot bukkake catfight hole Ôï (Liz).avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\canadian beast girls (Melissa).mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\cumshot beast hidden hole .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\spanish lingerie full movie cock .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\norwegian horse voyeur feet penetration .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\spanish beast [milf] .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\black animal lingerie hot (!) glans sweet .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\danish kicking horse licking boots .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\bukkake uncut feet redhair (Samantha).rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\indian cum fucking full movie .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\black fetish blowjob voyeur bedroom .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\japanese horse gay hidden wifey (Anniston,Tatjana).mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\chinese horse [free] (Samantha).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\chinese lesbian several models sweet .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\black gang bang trambling voyeur pregnant .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\asian blowjob girls titts sm (Sarah).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\porn bukkake licking lady (Gina,Karin).avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\gay sleeping .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\black horse lingerie catfight girly .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\canadian trambling [milf] ash .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\beast licking stockings (Jenna,Jade).mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\british xxx several models granny .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\beastiality lesbian several models 50+ .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\norwegian lesbian [bangbus] hole (Britney,Curtney).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\american handjob bukkake big titts fishy .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\bukkake masturbation (Liz).rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\horse hardcore big shower .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\hardcore several models titts .mpeg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\cum lingerie several models .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\beastiality horse licking bondage .avi.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\spanish bukkake sleeping feet mistress (Melissa).rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\chinese fucking hidden .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\indian handjob horse licking cock .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\fetish sperm big 50+ .zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\british lesbian several models mistress .mpg.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\russian horse trambling licking .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\horse sleeping titts beautyfull (Curtney).zip.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\asian trambling lesbian hole .rar.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exepid process 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1356 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 4212 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exedescription pid process target process PID 4364 wrote to memory of 1528 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 4364 wrote to memory of 1528 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 4364 wrote to memory of 1528 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 4364 wrote to memory of 4212 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 4364 wrote to memory of 4212 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 4364 wrote to memory of 4212 4364 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 1528 wrote to memory of 1356 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 1528 wrote to memory of 1356 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe PID 1528 wrote to memory of 1356 1528 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe 246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"C:\Users\Admin\AppData\Local\Temp\246ead1579564c889162b3dbc68e66a08e060ee06e6a128cad7ce3e15bc08da7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3980 --field-trial-handle=3408,i,16599691418790971742,134777455365707676,262144 --variations-seed-version /prefetch:81⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lingerie voyeur feet balls .mpg.exe
Filesize395KB
MD5b7932c5670111fb4ec6921c0d66e5a80
SHA1b1beda92b4a5723dd06dd9e4ea95d654c993d819
SHA256e9910186cd9d4e0cfe9eb8aa8cd48f02427d54abcf63609214ddfc44e9eb8df6
SHA51236b5966f5b8d773c62eede86cb2af86316a4f8f6da0ab5a697c161f79b5c5ce4c7b0491297c8f717bc26b6322c3eb156740a6995821e8ec0f6d6d63e161b5d49