Analysis
-
max time kernel
164s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 04:27
Behavioral task
behavioral1
Sample
cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe
Resource
win10v2004-20240412-en
General
-
Target
cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe
-
Size
286KB
-
MD5
8344c17140c7b0d718722cfd1b44bd4d
-
SHA1
eb82e0164844d06899eafc0fb6c49b5c8aa5958a
-
SHA256
cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af
-
SHA512
99559f19368b75abe677941fbd2112642521cbeea90358566768598789c371a30937a309134fa030afd8ef888ffeef9b4718c2d3115b64fa4004db4e23f64972
-
SSDEEP
6144:CjluQoSIIo5RaqrF3h0PNrpil0hh0m+Aa9MmgNZR2T3miV:CEQoSs7SPNNI0hKmq9MmgfRPiV
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral2/memory/1136-17-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1776-18-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2884-48-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-46-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-121-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-122-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-166-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-170-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-174-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-178-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-184-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-188-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-197-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-207-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-223-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-227-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-231-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1136-235-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/1136-0-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/files/0x00070000000234fc-5.dat UPX behavioral2/memory/2884-11-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-17-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1776-18-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2884-48-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/4444-46-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-121-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-122-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-166-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-170-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-174-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-178-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-184-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-188-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-197-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-207-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-223-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-227-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-231-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1136-235-0x0000000000400000-0x000000000041F000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\Control Panel\International\Geo\Nation cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe Key value queried \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\Control Panel\International\Geo\Nation cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1136-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00070000000234fc-5.dat upx behavioral2/memory/2884-11-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-17-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1776-18-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2884-48-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4444-46-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-121-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-122-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-166-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-170-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-174-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-184-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-188-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-207-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-223-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-231-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1136-235-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\Y: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\M: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\N: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\O: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\I: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\J: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\P: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\Q: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\R: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\B: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\E: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\G: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\S: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\V: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\W: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\A: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\L: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\Z: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\X: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\H: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\K: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File opened (read-only) \??\U: cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\gay sleeping (Janette).avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\swedish gang bang bukkake several models mature (Gina,Tatjana).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian action lesbian hidden redhair (Britney,Sarah).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\config\systemprofile\swedish porn gay [bangbus] ash (Sandy,Tatjana).avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\IME\SHARED\tyrkish fetish hardcore lesbian penetration .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\horse girls titts penetration .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\config\systemprofile\black fetish beast public penetration .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\FxsTmp\italian kicking fucking public feet .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\System32\DriverStore\Temp\swedish animal trambling girls hole shower (Sarah).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\FxsTmp\horse beast masturbation cock (Ashley,Jade).zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\brasilian handjob hardcore voyeur glans .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian porn horse masturbation feet .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Download\russian horse xxx licking .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{AB96D7E8-ADA1-413B-8FB4-C011E16CC400}\EDGEMITMP_64EE6.tmp\swedish animal bukkake public (Tatjana).avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian handjob trambling lesbian .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\asian blowjob voyeur lady .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Google\Temp\lingerie hidden high heels .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Microsoft Office\Updates\Download\russian cumshot lesbian big hole .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\trambling [free] titts .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\tyrkish handjob lesbian girls (Sylvia).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Microsoft\Temp\lesbian sleeping .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Common Files\microsoft shared\japanese beastiality trambling masturbation ejaculation (Christine,Sylvia).avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\swedish horse bukkake public gorgeoushorny .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\fucking hot (!) glans leather .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\swedish cumshot blowjob lesbian titts Ôï .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Microsoft Office\root\Templates\swedish animal hardcore [bangbus] .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\swedish beastiality xxx uncut titts boots (Jade).mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\russian action blowjob voyeur feet (Sonja,Curtney).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files\dotnet\shared\indian beastiality trambling catfight .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\tyrkish cum trambling uncut (Jade).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\black animal beast public (Curtney).zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\black handjob hardcore hidden sm .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\fucking public feet .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\trambling licking cock blondie .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\lingerie [bangbus] bedroom (Sandy,Curtney).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\nude trambling several models sm .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\xxx lesbian glans .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\danish porn fucking lesbian .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\beast full movie upskirt (Sonja,Melissa).avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\xxx lesbian cock (Christine,Jade).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\indian cum lesbian catfight cock .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\black animal horse [milf] .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\sperm full movie (Janette).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\italian fetish fucking [free] hole bedroom .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\russian action blowjob public redhair .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\CbsTemp\xxx sleeping feet mature (Liz).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\Downloaded Program Files\russian cum beast girls glans granny .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\security\templates\danish porn lesbian public glans .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\blowjob uncut sm .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\InputMethod\SHARED\fucking hidden titts pregnant .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\danish cumshot xxx sleeping hole .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\french horse [free] granny .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\mssrv.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\black kicking blowjob voyeur sweet .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\american horse xxx voyeur girly .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\swedish handjob fucking girls fishy .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\french bukkake big pregnant .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\italian horse sperm sleeping glans .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\beast big YEâPSè& .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\assembly\temp\gay voyeur cock swallow .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\beast lesbian .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\horse catfight .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SoftwareDistribution\Download\black animal lingerie lesbian titts 50+ (Sylvia).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\asian lesbian hidden (Curtney).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\assembly\tmp\xxx sleeping fishy .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\lingerie full movie titts .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\sperm [free] cock shoes .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\swedish gang bang hardcore [bangbus] hole .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\kicking trambling hidden penetration .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\fucking girls .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\black porn hardcore licking feet (Sonja,Melissa).rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\cum beast hidden cock 40+ (Karin).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\cum lesbian lesbian cock ash .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\beast masturbation fishy .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\black fetish lesbian [milf] hole circumcision .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\xxx girls ash .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\norwegian hardcore hidden .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\PLA\Templates\american action bukkake catfight (Samantha).mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\xxx [free] glans blondie .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\russian kicking fucking girls bondage .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\blowjob [bangbus] feet .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\american animal blowjob full movie fishy .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\gay big gorgeoushorny (Kathrin,Janette).mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\german beast full movie gorgeoushorny (Christine,Liz).zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\british lingerie girls granny .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\chinese bukkake licking stockings .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\tyrkish porn horse [bangbus] hole .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\tyrkish gang bang lesbian hidden sm .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\tyrkish beastiality fucking several models cock shoes .mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\beastiality beast catfight glans sweet .zip.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\danish animal fucking voyeur bondage .rar.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\beastiality hardcore public balls .avi.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\french blowjob licking .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\japanese cumshot bukkake hot (!) cock granny (Jade).mpg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\beastiality horse lesbian castration .mpeg.exe cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 2884 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 4444 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1776 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 94 PID 1136 wrote to memory of 1776 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 94 PID 1136 wrote to memory of 1776 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 94 PID 1136 wrote to memory of 4444 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 97 PID 1136 wrote to memory of 4444 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 97 PID 1136 wrote to memory of 4444 1136 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 97 PID 1776 wrote to memory of 2884 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 98 PID 1776 wrote to memory of 2884 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 98 PID 1776 wrote to memory of 2884 1776 cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"C:\Users\Admin\AppData\Local\Temp\cd52c1b758221d4711bd40ca1c8e272575cf2ae626e58a49a77b33b84e4ee0af.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian handjob trambling lesbian .mpg.exe
Filesize1.4MB
MD576bffd0742884ed46fc2d0b03f701504
SHA11456abdb56c9a407fc9f2984b13ec44ed4f240d3
SHA256745c8d93062397a7b1bcb231ff60e1bd9d4044d685ddd6f76cf5fc4ff355c869
SHA512789f9ec931b6e433f2179c30743452036d9fd53129935a8c8368fd054984d0aba88d6d3368a3bc297a5584cba91e8bf58cedf50fe513f546e8dee87dc711f4cc