Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 19:10
Behavioral task
behavioral1
Sample
10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe
Resource
win10v2004-20240412-en
General
-
Target
10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe
-
Size
126KB
-
MD5
3812a9cda64039b9095e5805861e68d0
-
SHA1
ebe050574c3ebfa140b9d7c3c0048d2036b8ce2d
-
SHA256
10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42
-
SHA512
d66fddd464fef3219ac0951320053dd600d772b65a6aef4d47d25676eeddd0756a3c0935dacbdd89133227ee38ad8046ae1f859b6d49579928b04e4ac4a0e9df
-
SSDEEP
3072:VjbLl/gvQoutv4DQ1Tj4mYWR/R4nkPR/1aVuydlaW7HBVJoxdAN0JjpTZK:VjluQoSv4DSIo5R4nM/40ydlaW7lsto
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
resource yara_rule behavioral2/memory/4880-130-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2632-161-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-177-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4880-178-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4380-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2632-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-184-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-199-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-203-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-208-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-212-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-216-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-220-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-224-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-232-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-236-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2328-240-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/2328-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x000700000002342a-5.dat UPX behavioral2/memory/4880-130-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2632-161-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-177-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4880-178-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4380-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2632-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-184-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-199-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-203-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-208-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-212-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-216-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-220-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-224-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-232-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-236-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2328-240-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2328-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000700000002342a-5.dat upx behavioral2/memory/4880-130-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2632-161-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-177-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4880-178-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4380-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2632-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-203-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-212-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2328-240-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\J: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\M: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\Q: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\G: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\H: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\K: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\L: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\W: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\X: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\Y: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\Z: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\E: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\N: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\O: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\P: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\S: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\U: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\V: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\A: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\R: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\T: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File opened (read-only) \??\B: 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\brasilian animal blowjob lesbian titts sweet .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\IME\SHARED\american action lesbian catfight feet .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\hardcore hot (!) .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\FxsTmp\brasilian gang bang beast hidden feet .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\IME\SHARED\beast full movie titts .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish porn bukkake licking cock (Gina,Jade).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\config\systemprofile\bukkake hidden black hairunshaved .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\FxsTmp\malaysia lesbian hot (!) .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\beast full movie fishy (Jenna,Tatjana).zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish porn lingerie several models titts .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\config\systemprofile\trambling lesbian (Karin).avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black gang bang xxx sleeping ejaculation .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\malaysia fucking girls cock .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\american nude beast uncut stockings .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\spanish xxx full movie titts circumcision (Sarah).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\danish fetish lesbian voyeur cock gorgeoushorny .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\bukkake licking upskirt .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Google\Update\Download\beast sleeping stockings .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Microsoft\Temp\swedish action hardcore catfight titts .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\swedish porn horse big (Janette).zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\danish kicking trambling masturbation (Janette).avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Common Files\microsoft shared\hardcore licking hole Ôï .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese fetish blowjob full movie titts lady (Sarah).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\italian kicking gay lesbian bedroom .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Microsoft Office\Updates\Download\swedish nude gay masturbation feet .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Google\Temp\japanese porn trambling girls shower .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Microsoft Office\root\Templates\american animal lesbian masturbation .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\beast masturbation hotel .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\tyrkish kicking blowjob several models glans stockings (Karin).zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\horse hot (!) titts .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\british trambling [milf] titts .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\xxx catfight glans (Ashley,Janette).rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\xxx girls glans shoes (Tatjana).avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\gang bang lesbian hidden hole (Christine,Melissa).zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\animal lesbian several models titts (Christine,Melissa).avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\danish animal lingerie [bangbus] hole .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\norwegian fucking hidden girly (Kathrin,Curtney).rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\chinese blowjob public young .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\chinese blowjob sleeping 40+ .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\german gay licking feet .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\trambling voyeur sm .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\Downloaded Program Files\american cumshot lesbian [free] stockings .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\cum trambling full movie hole .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\fucking girls (Karin).mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\cumshot lingerie public cock hairy (Karin).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\norwegian bukkake catfight cock mature (Samantha).rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\horse lingerie licking hole .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\CbsTemp\brasilian handjob hardcore licking .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\fetish gay lesbian glans 40+ .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\sperm voyeur (Jade).avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\french horse full movie titts .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\italian gang bang lesbian [bangbus] ¼ë (Britney,Melissa).mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\brasilian action horse [bangbus] leather .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\russian animal hardcore public bedroom .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_e79b400a6df5fd2c\action trambling lesbian titts upskirt .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\bukkake [bangbus] Œã .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\asian bukkake public .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\canadian xxx hidden cock girly .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\german hardcore full movie bondage .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\beastiality gay girls (Tatjana).mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\american action trambling hidden hole sweet .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\blowjob voyeur .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\action lingerie catfight mature .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\black cum xxx full movie .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\british bukkake hot (!) (Janette).rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\Temp\brasilian cum blowjob lesbian (Karin).rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\tyrkish handjob lingerie licking .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\cumshot bukkake [free] hairy (Kathrin,Samantha).zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\cum trambling catfight YEâPSè& .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\cum bukkake catfight glans swallow .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\german bukkake catfight glans mature .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\cum fucking voyeur cock hotel .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\sperm hot (!) titts Ôï .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\african blowjob licking mature .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\chinese blowjob [bangbus] titts .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\russian fetish sperm catfight feet .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\trambling uncut titts beautyfull .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\russian cum lingerie several models wifey (Sonja,Sarah).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\assembly\temp\brasilian cum gay lesbian feet 40+ .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\gang bang blowjob catfight glans gorgeoushorny .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\french lingerie catfight (Liz).avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\french bukkake hot (!) glans black hairunshaved (Liz).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\malaysia blowjob [bangbus] feet Ôï .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\horse [free] titts latex (Curtney).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\norwegian xxx big hole wifey .zip.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\assembly\tmp\fucking full movie mistress (Sandy,Janette).mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\chinese horse full movie feet .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\british lingerie [bangbus] .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\brasilian porn lesbian licking cock castration .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\lingerie [bangbus] hole .rar.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\cumshot fucking catfight boots .mpg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\french blowjob [milf] gorgeoushorny .mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\british lesbian girls feet (Gina,Janette).mpeg.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\italian handjob beast catfight feet black hairunshaved .avi.exe 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2632 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 4380 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4880 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 92 PID 2328 wrote to memory of 4880 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 92 PID 2328 wrote to memory of 4880 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 92 PID 4880 wrote to memory of 4380 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 95 PID 4880 wrote to memory of 4380 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 95 PID 4880 wrote to memory of 4380 4880 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 95 PID 2328 wrote to memory of 2632 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 96 PID 2328 wrote to memory of 2632 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 96 PID 2328 wrote to memory of 2632 2328 10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"C:\Users\Admin\AppData\Local\Temp\10bef2995f79d2d2c372db16bec8188cab343df8528c0f00eb59ff65ff20bc42.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\italian kicking gay lesbian bedroom .zip.exe
Filesize627KB
MD5bcb4eebe0e111698ebc0be1fd9cfc93c
SHA15f2169278e062586462e5340a9899086d1c747ef
SHA2561afc0aca41fda1a6ffaf12961b4b1c86e4353308a60c52c9a853f0a5ad9d2d3f
SHA512fe3c3107654785a5b409aa0ab303a4c31e6803c2a90f499d803a1660bfa263f8c00dcb77a6ff3c52228da39bf63f7afd48f8c8858d0a6ba556108aee624c922e