Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 18:27
Behavioral task
behavioral1
Sample
06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe
Resource
win10v2004-20240412-en
General
-
Target
06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe
-
Size
747KB
-
MD5
7fea664f72a43d2e8fb9d4661e8f3713
-
SHA1
f00fbf2073e449379fe5967898f95812f7d0bccc
-
SHA256
06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7
-
SHA512
152b0dcf3b60f887e607d3c7e3ec35c5999086bbd3a5677953b6dddc28012dc128739015f3d3824718ef44e6f554a5ed5f633bf83572a2343aaa5558ce99126d
-
SSDEEP
12288:tEQoS9qhn/k+KfXnlikQHsboNOItdHY/qVklHnX7a06zPH26lz7y86/aglN:t2n/APXAvVYX6bH2ea8u
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 16 IoCs
resource yara_rule behavioral2/memory/2884-137-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-181-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3740-183-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-185-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-190-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-200-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-203-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-207-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-210-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-213-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-216-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-219-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-222-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-225-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-228-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4980-231-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 18 IoCs
resource yara_rule behavioral2/memory/4980-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x00080000000233e7-5.dat UPX behavioral2/memory/2884-137-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-181-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3740-183-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-185-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-190-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-200-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-203-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-207-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-210-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-213-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-216-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-219-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-222-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-225-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-228-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4980-231-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4980-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x00080000000233e7-5.dat upx behavioral2/memory/2884-137-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-181-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3740-183-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-185-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-190-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-200-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-203-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-207-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-210-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-213-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-216-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-219-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-222-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-225-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-228-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4980-231-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\S: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\G: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\J: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\M: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\N: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\O: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\Q: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\T: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\U: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\W: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\Y: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\A: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\L: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\P: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\E: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\H: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\I: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\K: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\X: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\B: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\V: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File opened (read-only) \??\Z: 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\bukkake full movie titts .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\indian kicking hardcore big titts high heels .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\bukkake uncut bondage .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\config\systemprofile\brasilian animal xxx voyeur bedroom .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\FxsTmp\tyrkish porn sperm several models .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\IME\SHARED\hardcore hidden hole circumcision .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\hardcore [free] bondage .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\System32\DriverStore\Temp\trambling masturbation cock boots (Karin).mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\trambling hidden cock .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\FxsTmp\gang bang blowjob voyeur (Samantha).mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\italian cum lesbian [milf] .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese animal horse girls titts mature (Sylvia).zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\brasilian fetish trambling hidden cock lady .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\american cumshot beast masturbation ash .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\bukkake full movie titts sweet .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\japanese cum horse girls gorgeoushorny (Anniston,Liz).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\danish cum bukkake hidden blondie .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\bukkake several models hole shower (Jade).zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\brasilian animal bukkake catfight titts shower (Sarah).rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\black action fucking [free] black hairunshaved .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Google\Update\Download\bukkake full movie .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Microsoft\Temp\gay big high heels .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Common Files\microsoft shared\brasilian cum lesbian big latex (Kathrin,Janette).rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Microsoft Office\root\Templates\fucking full movie .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Microsoft Office\Updates\Download\italian nude xxx [free] cock granny .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\french hardcore [bangbus] stockings .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\horse big cock lady .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\xxx hidden ejaculation .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\brasilian porn xxx several models hole leather .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Program Files (x86)\Google\Temp\fucking public titts (Jenna,Samantha).rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\spanish lesbian voyeur (Melissa).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\swedish handjob gay lesbian glans upskirt .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\animal lesbian girls hole .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\brasilian animal lesbian lesbian titts high heels .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\african lesbian licking hole .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\swedish cum lingerie voyeur ejaculation .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\danish handjob beast public (Jade).zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\tyrkish porn gay [bangbus] glans pregnant (Samantha).mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\beast catfight cock mature .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\cumshot gay [free] high heels .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\black porn lesbian sleeping bondage .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\swedish cumshot lesbian big hole blondie (Janette).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\black cumshot trambling masturbation feet Ôï .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\lingerie hot (!) hole .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\canadian blowjob [milf] hole .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\lesbian girls feet .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\japanese gang bang trambling [milf] mature .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_d58d4747b1d5988c\american action beast catfight titts .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\italian animal lingerie sleeping glans (Ashley,Jade).rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\danish porn blowjob girls hole blondie .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\indian animal lingerie girls titts hairy (Curtney).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\american fetish xxx public cock hotel .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\american beastiality fucking masturbation glans boots (Janette).zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\cumshot lingerie full movie latex .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\tyrkish kicking gay big titts redhair (Liz).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\african horse several models (Melissa).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\canadian fucking full movie young .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\nude lesbian full movie ash .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\gang bang horse hot (!) (Samantha).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\french lesbian [milf] penetration (Sandy,Jade).zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\malaysia lingerie public .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\assembly\temp\brasilian gang bang gay sleeping sm .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\security\templates\tyrkish gang bang fucking lesbian (Sylvia).mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\beastiality fucking sleeping shower (Ashley,Sylvia).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\asian blowjob girls titts mature .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\fucking full movie glans shoes (Sarah).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\russian action lesbian [milf] bondage (Sandy,Samantha).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\handjob bukkake catfight leather (Britney,Liz).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\italian porn lesbian full movie feet balls (Curtney).zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\italian handjob lesbian several models titts penetration .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\chinese lingerie [milf] leather (Jenna,Jade).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\malaysia lesbian [free] hole upskirt .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\russian porn hardcore girls hole .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\InstallTemp\handjob beast full movie (Tatjana).mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\russian beastiality lingerie several models hole 50+ .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\african fucking girls feet gorgeoushorny .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\xxx [bangbus] titts bondage .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\beast licking feet sm .mpeg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\fetish hardcore [bangbus] bondage .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\russian action blowjob masturbation feet .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\french hardcore uncut hole wifey .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\blowjob lesbian (Sarah).rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\swedish cum fucking full movie feet .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\german horse full movie granny .avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\kicking sperm full movie beautyfull .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\asian beast lesbian mistress .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\german blowjob girls titts (Kathrin,Melissa).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\american beastiality lingerie catfight blondie .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\lingerie hot (!) hotel .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_aaeae146be52e178\xxx voyeur .mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\french blowjob licking latex .zip.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\spanish lingerie catfight hole redhair .rar.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\brasilian animal blowjob catfight feet beautyfull (Karin).avi.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\porn sperm licking glans swallow (Curtney).mpg.exe 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 3740 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2884 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 89 PID 4980 wrote to memory of 2884 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 89 PID 4980 wrote to memory of 2884 4980 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 89 PID 2884 wrote to memory of 3740 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 92 PID 2884 wrote to memory of 3740 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 92 PID 2884 wrote to memory of 3740 2884 06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe"C:\Users\Admin\AppData\Local\Temp\06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe"C:\Users\Admin\AppData\Local\Temp\06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe"C:\Users\Admin\AppData\Local\Temp\06538ddb5255b93b5bd2844ef2445c3d6b4b89d127e186fa12640e289b3fd2f7.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\bukkake several models hole shower (Jade).zip.exe
Filesize1.7MB
MD52678da0719a67436e4f3dab9c59122f7
SHA129aecc1f109433f5f485d3f4aeb5a881c0c268bb
SHA256baed00d606bfd8db0684701a432d746aceb49cb90e829957f56007770620bb83
SHA512ab90ae720f10736e68109c1b454362495390061e6d86de57c65acee6c442d0c46d303178600ded52276dcbe71ac76db1ff673cdb57aa34477ab47d8ccc069461