Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 20:49
Behavioral task
behavioral1
Sample
664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe
Resource
win10v2004-20240226-en
General
-
Target
664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe
-
Size
1.3MB
-
MD5
ba7ba8a9cfb5c443a7abb63cc046e016
-
SHA1
4c77da8c64f01296f85e518e6201e84ef47ca240
-
SHA256
664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c
-
SHA512
a03c1d2a48154da1fc4d60b3f2ecc872bd5a1a905edd9030b421ca460f5749a4b41363967c5f67b3e7cc71640519cb025b78091f155405224090ac285d95e6c5
-
SSDEEP
24576:YiGOMRGQ5YJ3S3sl11srY+l0Du1NpQhUPFA7C4PgU/Qqx0h/kttBPGPsU:xGrl3wUJ51xAlhQqx0h/kni
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 6 IoCs
resource yara_rule behavioral1/memory/2680-17-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2504-57-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2804-92-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2680-95-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2548-98-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2504-101-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 9 IoCs
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/files/0x0007000000015c2f-5.dat UPX behavioral1/memory/2680-17-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2548-55-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2504-57-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2804-92-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2680-95-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2548-98-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2504-101-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x0007000000015c2f-5.dat upx behavioral1/memory/2680-17-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2548-55-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2504-57-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2804-92-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2680-95-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2548-98-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2504-101-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\B: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\I: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\J: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\K: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\N: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\R: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\S: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\A: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\G: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\L: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\U: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\Z: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\H: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\M: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\P: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\Q: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\V: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\W: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\Y: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\E: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\O: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File opened (read-only) \??\X: 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\LogFiles\Fax\Incoming\trambling big hole YEâPSè& (Jade).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\config\systemprofile\french xxx public cock Ôë .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\cumshot sperm big (Sylvia).mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\FxsTmp\lesbian lesbian cock .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\config\systemprofile\tyrkish handjob horse uncut latex .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\lingerie catfight glans (Jenna,Sylvia).mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\System32\DriverStore\Temp\danish porn hardcore [free] hole .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\FxsTmp\russian porn horse uncut black hairunshaved .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\IME\shared\beast sleeping latex (Sonja,Liz).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SysWOW64\IME\shared\trambling voyeur feet high heels .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Windows Journal\Templates\danish porn beast full movie hotel .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Microsoft Office\Templates\danish porn fucking hot (!) hole .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\hardcore licking hole stockings .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files\DVD Maker\Shared\blowjob public hole ejaculation (Curtney).avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\american handjob xxx girls bondage .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\tyrkish nude fucking voyeur feet pregnant .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files\Common Files\Microsoft Shared\japanese nude blowjob public redhair .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\trambling hot (!) glans .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Google\Temp\american beastiality hardcore [milf] high heels (Ashley,Curtney).mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Google\Update\Download\japanese action gay voyeur (Karin).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\russian gang bang lingerie uncut redhair (Britney,Tatjana).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\japanese gang bang fucking several models .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\tyrkish cum xxx [milf] mistress .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\hardcore masturbation (Karin).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\hardcore masturbation titts (Britney,Curtney).mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\russian nude beast big lady .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\blowjob several models titts femdom .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_65b23d3c3a97bfaf\malaysia blowjob hot (!) hairy (Christine,Curtney).mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\german hardcore full movie .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\danish kicking horse [milf] beautyfull .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_7bfdfb15e7184c41\french blowjob public .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\action beast hot (!) feet ejaculation .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\russian beastiality fucking [free] young .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\italian beastiality blowjob girls (Jade).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\horse several models swallow .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\asian hardcore [free] .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\norwegian beast [bangbus] titts black hairunshaved .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\nude hardcore big (Jade).mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\cum gay full movie titts leather .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\sperm masturbation balls .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\spanish bukkake public mistress .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\norwegian beast full movie 40+ .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\chinese sperm hot (!) cock (Kathrin,Sarah).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\horse uncut 40+ (Sandy,Curtney).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\british gay uncut (Janette).mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\animal bukkake [free] hole femdom (Curtney).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_387a16fe7addf3b6\cum hardcore uncut pregnant (Gina,Liz).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\SoftwareDistribution\Download\danish porn hardcore several models 50+ (Gina,Liz).avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_963e6ae24c653bfe\russian cum hardcore uncut (Tatjana).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\security\templates\xxx catfight ìï .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8c6fc5a7aa8c435d\african lingerie sleeping .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\Temp\swedish horse blowjob several models hole .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\black kicking xxx hot (!) .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\mssrv.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\beast girls mature (Jenna,Liz).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_657d9a203abeb154\african lingerie girls mature .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\russian gang bang trambling girls ash .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\asian hardcore full movie titts mistress (Karin).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\brasilian nude lesbian [bangbus] glans .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\lesbian [free] bondage .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\lesbian masturbation mature .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\nude beast public upskirt .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\black animal lingerie several models (Janette).avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\norwegian horse full movie feet .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\horse trambling public .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\tmp\bukkake licking feet mistress .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\fetish bukkake masturbation penetration .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\italian cumshot blowjob big blondie .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_6.1.7600.16385_none_1dd3ce8d1e7524cd\canadian xxx girls cock hotel .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\japanese action blowjob masturbation 50+ .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\lingerie [milf] feet swallow (Jade).mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\asian fucking public feet latex .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\black horse blowjob masturbation stockings .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\handjob fucking catfight .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\bukkake [bangbus] glans shower (Sarah).mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\gang bang lesbian big 50+ .avi.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\american kicking beast public (Liz).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\norwegian trambling hidden hole upskirt (Jade).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\japanese porn xxx full movie mistress (Ashley,Karin).mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\lingerie several models (Karin).mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\american fetish horse big penetration .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\swedish animal trambling hidden YEâPSè& .mpg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\malaysia sperm masturbation leather .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\horse hidden ash .rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\fucking [milf] glans .mpeg.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\trambling full movie titts young (Sylvia).rar.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\russian cumshot trambling masturbation swallow .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\chinese blowjob catfight .zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\brasilian cumshot trambling licking glans bondage (Karin).zip.exe 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2504 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 2548 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2680 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 28 PID 2804 wrote to memory of 2680 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 28 PID 2804 wrote to memory of 2680 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 28 PID 2804 wrote to memory of 2680 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 28 PID 2680 wrote to memory of 2548 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 29 PID 2680 wrote to memory of 2548 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 29 PID 2680 wrote to memory of 2548 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 29 PID 2680 wrote to memory of 2548 2680 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 29 PID 2804 wrote to memory of 2504 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 30 PID 2804 wrote to memory of 2504 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 30 PID 2804 wrote to memory of 2504 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 30 PID 2804 wrote to memory of 2504 2804 664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"C:\Users\Admin\AppData\Local\Temp\664096daffdb7ce5e1544844dee4d098103a02e2bea7a201afa711b93190608c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778KB
MD57fc91a96d008772f8342812913da7da9
SHA151724ce98a0bee19fe5a9de2875ceaef986e534c
SHA25657553874db6e9c5a0883d4f441b40a03ce6b05a1a8a484a0ca428388cc1e5f53
SHA512ca33968b57e92040e9fca13fa4d9805b1ce0331b3ac9dd70bf68579a7ce6bca500ef5f148ea6aa535cdf53d49a2d488056dbecf32741d60c9195fa65f9312b59
-
Filesize
183B
MD5ffce9650ee7b04a6688a1e0e4b4e03b0
SHA111f39a6ed668f69f097336215e59f521e3012abf
SHA25628db24e3bffea397aae76553c0cbdce75f068275c3fbf9069118066d391f1742
SHA512c24f3fed9a9244c2abcc6dbb784c2746256bb166035bd81bf8f14f5cfab45078629cd9355d48a33a78201e771c63879799987f229567e6500508ccc7c9a3df0a