Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 06:00
Behavioral task
behavioral1
Sample
39a9c6689932d1c09723336fa4aec3ca.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
39a9c6689932d1c09723336fa4aec3ca.exe
Resource
win10v2004-20240226-en
General
-
Target
39a9c6689932d1c09723336fa4aec3ca.exe
-
Size
453KB
-
MD5
39a9c6689932d1c09723336fa4aec3ca
-
SHA1
f22a22b62ce10134d3fbe3b11ebd06f6063e0853
-
SHA256
e793f8e95cc4865f81bfc43fe1ededfe9a039de998aea4ea40dd097bb4dc9ebb
-
SHA512
fd87deead477c6a30aa7daff7117d05fa9f85f9870942b5037e49a0eef34519b1b1ebda50a828ef98f86a91e6eb992db9019f5708bc194ef2b33398e6ac888ff
-
SSDEEP
12288:6EQoSvqhQCx6N4iJI4wJ41vwNCYCCAkmuOhYBHY9Q36UgfA2J4:60Qi6NsJOYJPmzh+HszJ4
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/files/0x00070000000165de-5.dat upx behavioral1/memory/3064-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2640-31-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2228-93-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3064-96-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2640-98-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 39a9c6689932d1c09723336fa4aec3ca.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\X: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\Z: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\R: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\T: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\I: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\J: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\V: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\B: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\G: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\S: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\M: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\P: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\H: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\K: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\L: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\N: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\O: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\Q: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\A: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\E: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\U: 39a9c6689932d1c09723336fa4aec3ca.exe File opened (read-only) \??\Y: 39a9c6689932d1c09723336fa4aec3ca.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\brasilian nude blowjob hidden hole .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\black kicking blowjob uncut (Sylvia).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\brasilian cumshot horse licking black hairunshaved .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\config\systemprofile\xxx lesbian titts girly .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\FxsTmp\american nude trambling girls (Jade).avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\IME\shared\fucking several models glans wifey .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\config\systemprofile\american handjob bukkake [milf] glans .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\FxsTmp\swedish action trambling hidden (Liz).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\IME\shared\japanese handjob xxx uncut .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\russian action xxx masturbation titts .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\trambling [milf] bondage .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Common Files\microsoft shared\brasilian handjob sperm several models .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Google\Temp\xxx hot (!) castration .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Google\Update\Download\italian cum beast big wifey .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\swedish fetish xxx hidden glans wifey .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files\DVD Maker\Shared\danish fetish hardcore big titts .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files\Windows Journal\Templates\black kicking lesbian hidden .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\trambling several models .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\horse [milf] (Melissa).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\tyrkish nude sperm uncut sweet .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files\Common Files\Microsoft Shared\lingerie voyeur young .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\japanese cumshot xxx hot (!) traffic .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\blowjob sleeping lady .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\bukkake hot (!) (Sylvia).avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Program Files (x86)\Microsoft Office\Templates\horse public feet .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\brasilian horse sperm big glans 40+ .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\german xxx full movie titts traffic .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\japanese cum horse girls fishy .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\lesbian [bangbus] 40+ .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\Downloaded Program Files\danish kicking lingerie girls titts .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\xxx big titts (Gina,Sylvia).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_4fe2107fd06efdd8\african sperm hot (!) glans fishy (Melissa).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3863e9ef3f804dd9\fucking hot (!) .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\beast [free] traffic (Gina,Karin).mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\trambling masturbation (Sarah).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\norwegian trambling [milf] glans .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\SoftwareDistribution\Download\beast catfight YEâPSè& .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\action hardcore hot (!) stockings (Sonja,Tatjana).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\chinese horse hidden .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\italian handjob beast [milf] lady .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aea650787d30ed8a\spanish lesbian masturbation feet shoes (Janette).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\african blowjob hidden glans beautyfull .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\british gay lesbian balls .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\swedish nude horse hot (!) (Jade).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\indian animal xxx uncut hairy (Sonja,Jade).avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\blowjob hidden (Sylvia).avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\malaysia bukkake full movie .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_1412267f4b3bb985\fetish gay hot (!) glans swallow .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\InstallTemp\fetish blowjob public stockings (Ashley,Curtney).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\handjob gay lesbian cock .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\trambling hidden hotel (Britney,Tatjana).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\french sperm full movie titts ejaculation .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\horse lingerie big stockings .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\trambling catfight leather .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\bukkake big ìï .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\norwegian fucking hidden ejaculation .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\mssrv.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\tmp\danish cum beast [bangbus] ash .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\russian animal sperm lesbian glans .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\japanese horse sperm uncut traffic .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\lesbian licking hole stockings (Curtney).mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\british fucking voyeur 40+ .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\black handjob sperm hidden cock 50+ .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\xxx girls hotel .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\sperm masturbation traffic .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\cum gay [free] hole .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\hardcore masturbation 40+ .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\gang bang horse sleeping balls (Ashley,Liz).avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\malaysia xxx catfight beautyfull (Britney,Sylvia).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\blowjob [bangbus] titts 40+ .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\trambling [free] .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\indian fetish bukkake sleeping cock castration (Curtney).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\horse lesbian [milf] femdom .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\horse several models sm .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\bukkake [free] pregnant .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\russian fetish hardcore [milf] (Liz).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\french sperm [milf] feet (Ashley,Sylvia).mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\japanese handjob fucking [free] titts gorgeoushorny .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\lingerie [milf] granny .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_9498b282333b64ec\malaysia fucking [milf] feet latex .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\tyrkish horse horse uncut .rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\danish porn horse catfight (Curtney).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\trambling public (Karin).rar.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\security\templates\bukkake hot (!) .mpeg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_de-de_b4aea777fe683838\cumshot fucking catfight high heels .avi.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\malaysia bukkake big hairy .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_60c2504d62fd4f0e\malaysia xxx uncut (Liz).zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_6.1.7600.16385_none_1dd3ce8d1e7524cd\swedish handjob lesbian uncut .mpg.exe 39a9c6689932d1c09723336fa4aec3ca.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\swedish animal fucking sleeping hole .zip.exe 39a9c6689932d1c09723336fa4aec3ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2640 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe 3064 39a9c6689932d1c09723336fa4aec3ca.exe 2228 39a9c6689932d1c09723336fa4aec3ca.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3064 2228 39a9c6689932d1c09723336fa4aec3ca.exe 28 PID 2228 wrote to memory of 3064 2228 39a9c6689932d1c09723336fa4aec3ca.exe 28 PID 2228 wrote to memory of 3064 2228 39a9c6689932d1c09723336fa4aec3ca.exe 28 PID 2228 wrote to memory of 3064 2228 39a9c6689932d1c09723336fa4aec3ca.exe 28 PID 3064 wrote to memory of 2640 3064 39a9c6689932d1c09723336fa4aec3ca.exe 29 PID 3064 wrote to memory of 2640 3064 39a9c6689932d1c09723336fa4aec3ca.exe 29 PID 3064 wrote to memory of 2640 3064 39a9c6689932d1c09723336fa4aec3ca.exe 29 PID 3064 wrote to memory of 2640 3064 39a9c6689932d1c09723336fa4aec3ca.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39a9c6689932d1c09723336fa4aec3ca.exe"C:\Users\Admin\AppData\Local\Temp\39a9c6689932d1c09723336fa4aec3ca.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\39a9c6689932d1c09723336fa4aec3ca.exe"C:\Users\Admin\AppData\Local\Temp\39a9c6689932d1c09723336fa4aec3ca.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\39a9c6689932d1c09723336fa4aec3ca.exe"C:\Users\Admin\AppData\Local\Temp\39a9c6689932d1c09723336fa4aec3ca.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD59b87557ad2b872b11b7355471f34d76a
SHA13b50033c9fb0b61b07af0adb9eefc3c8f57ad698
SHA256bcf35c3afddc7d12787de75220f38259229f42b82533295deb6bfad139f378ef
SHA5125e70f69712158023b52896159825068117022ab1f4a1f4eac111e920a4a4c9840f05bb55f5309f6e0cd49fdf3e7e1d4b6651b984a7be73fb1774f72f8e4332b0
-
Filesize
146B
MD5138c6e9458a59138be22a23f3a192ee6
SHA1ea38390e88274a18310fd1cd252c9622f64f5ed7
SHA2567cd48cfa96d6ac3d038a64aa3c47813c450921e779b914ba78b66c312613354e
SHA512cf08af8a94943e07b1356135da646d4a7139fa0e532a7e4dcd78a442d69f890dc957230d120c974db5db1bf397e34997edb3a880264e6615878dba42e56f0e2c