Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 19:37
Behavioral task
behavioral1
Sample
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe
Resource
win10v2004-20240226-en
General
-
Target
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe
-
Size
1.8MB
-
MD5
d45587fe561c93528664fe0dcaae59f8
-
SHA1
500e89b875f50ddc1b03ca03c985abdfb33044f2
-
SHA256
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce
-
SHA512
a3d65280f0142a3326a95e54fef22f8ca8ffc645192dd7f40f1fa0794682df1ce01a36560ab3764eddc964d3ee61b2d2791e2a031964a5c0bd6372dc00131915
-
SSDEEP
49152:+L7zWlFx6+AQ3TZY6BmLEeAbtp0HlDifi:+bIFx6+AQDFBMEfp0HlDR
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1032-56-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-89-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2628-90-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1032-91-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-93-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-92-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-99-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-112-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-115-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-118-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-121-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-124-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-129-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-132-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-135-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-138-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-141-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2972-144-0x0000000000400000-0x000000000041B000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2972-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX C:\Program Files\Windows Sidebar\Shared Gadgets\gay uncut glans girly .rar.exe UPX behavioral1/memory/2628-15-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1032-56-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-89-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2628-90-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1032-91-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-93-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-92-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-99-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-112-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-115-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-118-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-121-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-124-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-129-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-132-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-135-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-138-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-141-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2972-144-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2972-0-0x0000000000400000-0x000000000041B000-memory.dmp upx C:\Program Files\Windows Sidebar\Shared Gadgets\gay uncut glans girly .rar.exe upx behavioral1/memory/2628-15-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/1032-56-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-89-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2628-90-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/1032-91-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-93-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-92-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-99-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-112-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-115-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-118-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-121-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-124-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-129-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-132-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-135-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-138-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-141-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2972-144-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exedescription ioc process File opened (read-only) \??\Z: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\I: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\P: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\Q: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\T: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\V: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\U: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\A: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\E: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\G: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\H: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\J: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\N: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\X: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\Y: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\R: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\S: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\W: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\B: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\K: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\L: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\M: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File opened (read-only) \??\O: 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe -
Drops file in System32 directory 10 IoCs
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exedescription ioc process File created C:\Windows\System32\DriverStore\Temp\beast lesbian gorgeoushorny (Kathrin,Curtney).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\FxsTmp\nude xxx masturbation .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\IME\shared\american cum bukkake [milf] (Tatjana).avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\config\systemprofile\black handjob horse [milf] sm (Britney,Janette).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\FxsTmp\fucking big redhair .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\IME\shared\japanese cum gay several models .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\config\systemprofile\russian kicking lesbian big hotel .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\swedish action lesbian lesbian cock circumcision .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\lesbian big .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\danish action hardcore full movie feet bondage (Curtney).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe -
Drops file in Program Files directory 15 IoCs
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exedescription ioc process File created C:\Program Files (x86)\Google\Temp\indian animal blowjob [bangbus] ìï .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Google\Update\Download\bukkake hot (!) (Curtney).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\brasilian gang bang fucking sleeping wifey (Sonja,Sarah).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Microsoft Office\Templates\danish action bukkake masturbation glans upskirt (Curtney).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\beast masturbation (Curtney).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files\Common Files\Microsoft Shared\lesbian masturbation upskirt .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\gay uncut glans girly .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\lingerie public .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\fucking hot (!) feet .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\horse voyeur YEâPSè& (Gina,Liz).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files\Windows Journal\Templates\fucking uncut fishy (Ashley,Tatjana).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Common Files\microsoft shared\hardcore big ejaculation .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\american handjob xxx catfight feet shower .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files\DVD Maker\Shared\indian handjob fucking several models glans young .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\lesbian girls cock lady (Janette).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe -
Drops file in Windows directory 64 IoCs
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exedescription ioc process File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\danish horse lingerie hot (!) glans bondage (Karin).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\italian fetish hardcore hot (!) .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_de-de_b4aea777fe683838\norwegian xxx several models titts (Anniston,Tatjana).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\kicking beast masturbation cock swallow .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\porn hardcore licking hole shower .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_dd18b2a07d49aa11\tyrkish cumshot blowjob [milf] (Karin).avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\bukkake masturbation glans gorgeoushorny .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\horse masturbation cock (Sonja,Janette).avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\french blowjob hot (!) hole shower .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\kicking blowjob uncut hole sm .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\gang bang lesbian [free] .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\african blowjob lesbian hole .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\porn lesbian full movie .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_65b23d3c3a97bfaf\blowjob [free] shower .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\norwegian sperm public titts ash (Samantha).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\beast hidden cock balls .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\tyrkish fetish blowjob big feet traffic .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\Downloaded Program Files\tyrkish cum xxx hidden glans penetration (Samantha).avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\blowjob voyeur hairy .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\swedish cumshot xxx catfight (Curtney).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\fucking masturbation .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5d9f7d70ed4643fd\action xxx full movie castration .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\spanish xxx hot (!) cock mature (Liz).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_657d9a203abeb154\brasilian animal lesbian hot (!) .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\norwegian fucking sleeping balls .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\mssrv.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\gang bang lingerie uncut .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\Temp\bukkake voyeur ìï .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\blowjob licking (Liz).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_6.1.7600.16385_none_1dd3ce8d1e7524cd\cumshot bukkake [free] (Liz).mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\indian porn lingerie licking cock bondage .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\kicking hardcore hot (!) girly .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\SoftwareDistribution\Download\indian kicking lesbian public bondage .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\canadian bukkake [milf] (Melissa).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\fetish lingerie big high heels .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\sperm hot (!) .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\cumshot lesbian hot (!) 40+ (Anniston,Samantha).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\asian xxx hot (!) (Liz).mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\horse sperm catfight (Melissa).avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\beastiality horse catfight shower .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\animal blowjob uncut feet .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\hardcore girls (Jade).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\hardcore big titts .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\british fucking public boots (Sonja,Sylvia).mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_963e6ae24c653bfe\french beast several models .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\french beast several models (Sarah).mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\danish porn lesbian [milf] (Liz).mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\beast public .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\beast uncut feet castration .mpg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\handjob lesbian full movie castration (Christine,Samantha).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\russian animal fucking several models glans 40+ (Karin).zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\trambling public cock blondie .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\brasilian porn horse sleeping upskirt .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\indian gang bang xxx hot (!) (Melissa).avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\tyrkish animal gay [milf] hole wifey .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\cum hardcore hot (!) redhair .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aea650787d30ed8a\african sperm [free] cock 50+ .rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\italian nude sperm lesbian 40+ .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ea4a469ab7713182\asian trambling [milf] cock .zip.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\japanese animal gay [free] (Liz).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_7bfdfb15e7184c41\horse uncut shoes (Anniston,Jade).rar.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_4d274741486b900c\porn lingerie sleeping swallow .mpeg.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\norwegian hardcore licking feet high heels .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\beastiality lingerie uncut .avi.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exepid process 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 1032 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exedescription pid process target process PID 2972 wrote to memory of 2628 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2972 wrote to memory of 2628 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2972 wrote to memory of 2628 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2972 wrote to memory of 2628 2972 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2628 wrote to memory of 1032 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2628 wrote to memory of 1032 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2628 wrote to memory of 1032 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe PID 2628 wrote to memory of 1032 2628 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe 29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe"C:\Users\Admin\AppData\Local\Temp\29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe"C:\Users\Admin\AppData\Local\Temp\29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe"C:\Users\Admin\AppData\Local\Temp\29770e57e49958333a04bc604f558bd4ff3f1edcf771eac41a09763f1c03efce.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5f5892938fd202dced90123e3fb010f2e
SHA12fdefb61372e67b4ce4744a434e496173691d908
SHA25634c243a6c50fec7bbe3f2af4e0771b4dcbd825e5cd3816d433227263797de846
SHA512df95820ec89e0f460f5a00c176d729b6f9490c633d15b1d5e7c4a68d0decc9a10c3896172542a83f83a073397b5b1ce629f696741821fa35e9b063acdc536b85