Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 19:58
Behavioral task
behavioral1
Sample
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe
Resource
win10v2004-20231215-en
General
-
Target
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe
-
Size
300KB
-
MD5
a44050b2e9518961d9ef9a40f771e670
-
SHA1
19a229a6e23837e937e6e40a1efebe37ae955333
-
SHA256
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661
-
SHA512
2cfff9d49f97f8632e85b2553d88c5ebbfa325308bdccdc0ceb8cc122f56bc8a9ae1cd4906987030c646001aa0627e668e7fe38bb7883c0221b98d34aaafc6c7
-
SSDEEP
6144:VjluQoSv4DSIo5R4nM/40yLCwaj1f2saCbCflZhmpzVRni0GNw1XCsfz7:VEQoSfq+lf2DCbCtZ8pDiDsfz7
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2604-65-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/856-90-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-94-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2604-103-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/856-104-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-105-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-110-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-113-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-116-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-121-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-124-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-127-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-130-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-133-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-136-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-139-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-142-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2208-145-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\lingerie girls lady (Sonja,Samantha).rar.exe UPX behavioral1/memory/2604-65-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/856-90-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-94-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2604-103-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/856-104-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-105-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-110-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-113-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-116-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-121-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-124-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-127-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-130-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-133-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-136-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-139-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-142-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2208-145-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\lingerie girls lady (Sonja,Samantha).rar.exe upx behavioral1/memory/2604-65-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/856-90-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-94-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2604-103-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/856-104-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-105-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-110-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-113-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-116-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-121-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-124-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-127-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-130-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-133-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-136-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-139-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-142-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2208-145-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exedescription ioc process File opened (read-only) \??\L: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\P: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\W: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\Y: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\E: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\J: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\K: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\Q: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\S: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\X: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\A: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\B: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\N: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\R: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\T: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\U: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\G: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\H: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\O: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\Z: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\I: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\M: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File opened (read-only) \??\V: 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe -
Drops file in System32 directory 10 IoCs
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\russian action trambling several models (Liz).mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\FxsTmp\beast [milf] ash .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\config\systemprofile\horse [bangbus] cock hotel .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\tyrkish handjob gay [milf] titts latex (Liz).mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\FxsTmp\sperm hidden titts mature .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\IME\shared\tyrkish fetish beast catfight titts 40+ (Karin).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\config\systemprofile\italian horse lesbian [free] (Samantha).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\System32\DriverStore\Temp\brasilian horse xxx public granny .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\SysWOW64\IME\shared\tyrkish cum trambling hidden feet black hairunshaved .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\brasilian horse xxx full movie titts .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe -
Drops file in Program Files directory 15 IoCs
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exedescription ioc process File created C:\Program Files (x86)\Google\Update\Download\gay several models latex .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\indian cumshot lesbian full movie .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Microsoft Office\Templates\lingerie hot (!) (Janette).avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\indian porn sperm [milf] .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\lingerie girls lady (Sonja,Samantha).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Common Files\microsoft shared\indian cum sperm uncut lady .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files\Windows Journal\Templates\swedish kicking lingerie uncut titts YEâPSè& .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\black fetish lingerie full movie circumcision .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\italian horse sperm [milf] .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files\Common Files\Microsoft Shared\danish porn gay big titts .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files\DVD Maker\Shared\danish horse lesbian sleeping titts blondie .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\lesbian licking redhair .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\hardcore full movie 50+ .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\horse lingerie full movie hole sweet .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Program Files (x86)\Google\Temp\lesbian [milf] hole hotel .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe -
Drops file in Windows directory 64 IoCs
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exedescription ioc process File created C:\Windows\SoftwareDistribution\Download\italian kicking horse masturbation cock .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\blowjob voyeur titts beautyfull .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\tyrkish action lesbian [bangbus] titts young .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\chinese beast [free] titts sm .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\asian trambling [bangbus] hole circumcision (Sarah).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\sperm [milf] 40+ .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\Downloaded Program Files\horse big hole castration .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\russian porn beast public ash (Jenna,Samantha).avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\canadian lingerie girls bondage (Britney,Tatjana).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\norwegian hardcore full movie high heels .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\black gang bang beast [milf] ejaculation .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\american handjob horse full movie 50+ .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\tyrkish cum lingerie [milf] feet mature .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\hardcore several models cock .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_4d274741486b900c\black porn gay uncut beautyfull .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\lingerie [milf] (Jade).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\french fucking public ejaculation .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\fetish blowjob several models wifey .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\norwegian lingerie [bangbus] ash (Kathrin,Melissa).mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\indian gang bang hardcore big glans traffic .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\brasilian action gay catfight cock .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\african trambling catfight penetration .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_657d9a203abeb154\malaysia xxx full movie stockings .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\cum horse hidden balls .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\PLA\Templates\sperm masturbation .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\danish handjob lesbian [free] latex .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\japanese fetish trambling masturbation glans bedroom .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\tmp\japanese beastiality xxx several models (Curtney).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\russian beastiality fucking licking hole .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_387a16fe7addf3b6\canadian lesbian masturbation 40+ .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\security\templates\tyrkish gang bang xxx hot (!) .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\african hardcore lesbian wifey .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\porn trambling voyeur balls .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\asian beast full movie high heels .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\kicking fucking licking swallow .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\brasilian fetish sperm hidden cock leather (Janette).zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\nude xxx sleeping bedroom .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\russian handjob blowjob several models beautyfull .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\canadian blowjob [free] .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\british blowjob hidden boots (Sandy,Curtney).avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\blowjob masturbation high heels .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\handjob hardcore full movie feet ìï (Curtney).mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\nude blowjob full movie latex .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\japanese porn lesbian several models gorgeoushorny .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\japanese cum bukkake big pregnant .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\trambling voyeur sweet .rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\japanese action sperm hot (!) feet YEâPSè& (Curtney).zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\hardcore licking cock mature (Sarah).rar.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\InstallTemp\tyrkish beastiality trambling licking (Jade).mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\cum bukkake voyeur wifey .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\cumshot lingerie sleeping .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\american horse gay voyeur .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\brasilian action gay lesbian titts .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\cumshot sperm [bangbus] hole .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\german trambling licking .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\black nude bukkake licking wifey .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\danish gang bang horse public hairy .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\asian beast hot (!) fishy .avi.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\bukkake masturbation gorgeoushorny .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\horse hidden hole mature (Liz).mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_60c2504d62fd4f0e\nude lingerie girls hole sweet .mpg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\horse lesbian beautyfull .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\Temp\bukkake masturbation .zip.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe File created C:\Windows\winsxs\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_dd18b2a07d49aa11\tyrkish action horse catfight .mpeg.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exepid process 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 856 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exedescription pid process target process PID 2208 wrote to memory of 2604 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2208 wrote to memory of 2604 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2208 wrote to memory of 2604 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2208 wrote to memory of 2604 2208 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2604 wrote to memory of 856 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2604 wrote to memory of 856 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2604 wrote to memory of 856 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe PID 2604 wrote to memory of 856 2604 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe 341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe"C:\Users\Admin\AppData\Local\Temp\341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe"C:\Users\Admin\AppData\Local\Temp\341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe"C:\Users\Admin\AppData\Local\Temp\341b0c1ce9737a12d3ba6d935f3bf846febd62b1ac414f52a2e978769b54a661.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\lingerie girls lady (Sonja,Samantha).rar.exe
Filesize853KB
MD57ec47b1511937e4ea7fe8123a07c6b4a
SHA10add8a6447116b60f2196fc2018c6be47c48ad45
SHA2563e2a28694b95322371e4a12160d834add10fc81a880dfc9f69fd4ae039c167bb
SHA5123cd869e7822f0decc2bfbfa0791a58017d2eac9f8cb2bfea199b65b22515543d2c68406362ca12da53e79a995a3c04bc92961a9834b9e2be3a15b43dcad2bebf