Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe
Resource
win10v2004-20240226-en
General
-
Target
5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe
-
Size
2.0MB
-
MD5
245c90151fcc240a5fbf30f2a1a4582d
-
SHA1
a85f49e20780bddff40bd6c8caf69c30b3885d95
-
SHA256
5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59
-
SHA512
1610632308f5f97bf19e5b4d8af6ebbecb27558477a072ec2b2d94f74c19e7bf74855ea65ee8a81da32806372be28dd5d66b565c40cd2021a89c9f1c84212696
-
SSDEEP
49152:5Mtc21ovJLvGVrdIVPnFpd5+gdFGd40Bp/+Lz6TsxW:Mxov5CIpnFpd5+gdf0BmVxW
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 1 IoCs
resource yara_rule behavioral2/files/0x000700000002326b-4.dat INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\K: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\N: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\S: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\W: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\X: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\H: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\B: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\G: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\L: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\M: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\P: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\Q: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\A: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\I: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\O: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\R: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\T: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\V: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\Z: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\E: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\Y: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File opened (read-only) \??\U: 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish horse xxx big leather (Sandy,Curtney).avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\System32\DriverStore\Temp\japanese cum blowjob hidden cock .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\FxsTmp\trambling masturbation hole 50+ (Liz).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\italian beastiality lingerie masturbation latex .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\gay public (Sarah).rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black kicking horse [bangbus] wifey .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\indian beastiality sperm licking hole penetration .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\config\systemprofile\swedish kicking gay catfight (Curtney).mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\IME\SHARED\italian beastiality xxx [free] titts .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\config\systemprofile\trambling hidden (Karin).avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\FxsTmp\brasilian horse beast public hole castration .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SysWOW64\IME\SHARED\indian horse beast uncut cock .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Shared Gadgets\lesbian voyeur .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\hardcore [milf] swallow .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A22979E4-D188-4AF0-A888-04FE21284B11}\EDGEMITMP_19EA3.tmp\american porn beast hot (!) hole .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\hardcore voyeur feet boots (Liz).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Microsoft Office\root\Templates\black gang bang trambling [milf] .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\fucking big hole .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\fucking [milf] hairy (Ashley,Karin).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\hardcore uncut cock mistress .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Google\Temp\tyrkish cum trambling voyeur glans castration (Samantha).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\indian action bukkake [bangbus] latex .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Common Files\microsoft shared\italian horse lesbian sleeping cock ejaculation .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\gay sleeping fishy (Sandy,Liz).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\Microsoft Office\Updates\Download\swedish beastiality blowjob [bangbus] hole ash .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\japanese animal lingerie [bangbus] feet granny (Melissa).rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Google\Update\Download\italian action xxx hidden feet ash .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\beast sleeping pregnant .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\dotnet\shared\lesbian full movie glans (Sandy,Melissa).mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files (x86)\Microsoft\Temp\fucking public Ôï .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\swedish nude lingerie hot (!) 50+ .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\trambling voyeur hole bondage .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\lesbian public titts .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\gay [bangbus] .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\malaysia fucking full movie traffic .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\sperm [milf] titts ejaculation (Samantha).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\cum lesbian uncut hole high heels (Melissa).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\norwegian fucking masturbation high heels .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\CbsTemp\xxx catfight .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\hardcore girls cock .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SoftwareDistribution\Download\trambling uncut .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\brasilian porn sperm masturbation feet 50+ (Karin).avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\tyrkish porn xxx hidden cock fishy .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\spanish hardcore licking cock femdom (Curtney).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\fetish beast full movie feet 40+ .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\trambling girls ash .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\danish kicking lesbian full movie .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\canadian blowjob hot (!) .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\african sperm [free] (Melissa).avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\german xxx girls castration .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\tyrkish action xxx catfight shower .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\horse lingerie hot (!) cock .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\swedish action lesbian [free] feet (Ashley,Jade).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\norwegian lesbian [bangbus] pregnant .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\Downloaded Program Files\american cum xxx [milf] feet (Jenna,Samantha).mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\fucking voyeur hole femdom .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\brasilian nude lesbian masturbation sweet .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\horse big shoes .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\canadian bukkake voyeur shoes .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\PLA\Templates\hardcore several models 50+ .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\horse licking bondage .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\action trambling girls cock boots (Sylvia).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\british gay uncut hole .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\swedish animal beast voyeur cock .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\french xxx girls femdom .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\InputMethod\SHARED\japanese cum blowjob licking .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\security\templates\russian nude fucking sleeping leather (Gina,Liz).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\japanese cum xxx sleeping titts hotel .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\german horse [bangbus] titts sweet (Liz).mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\animal blowjob uncut glans bedroom (Curtney).rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\japanese cum blowjob [free] .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\black gang bang sperm lesbian glans boots (Sarah).mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\xxx masturbation feet .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\hardcore several models cock .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\swedish nude horse uncut .mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\brasilian animal trambling [bangbus] circumcision (Sandy,Liz).mpeg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\japanese nude lesbian big shoes .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\gay girls .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\xxx catfight wifey (Jenna,Janette).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\canadian sperm masturbation blondie .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\beastiality lingerie catfight hole .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\kicking blowjob [milf] glans wifey (Karin).avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\russian kicking sperm full movie sm .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\mssrv.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\indian horse lesbian hidden feet .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\french gay [free] .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\canadian fucking catfight feet .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\cumshot lingerie catfight mature .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\trambling sleeping feet .zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\swedish fetish blowjob girls bedroom .rar.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\assembly\temp\black horse lingerie public feet .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\lesbian catfight cock pregnant .avi.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\cum sperm big hole bedroom (Karin).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\french lesbian public .mpg.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\blowjob big feet stockings (Karin).zip.exe 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3556 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 4148 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3184 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 91 PID 3040 wrote to memory of 3184 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 91 PID 3040 wrote to memory of 3184 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 91 PID 3040 wrote to memory of 4148 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 92 PID 3040 wrote to memory of 4148 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 92 PID 3040 wrote to memory of 4148 3040 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 92 PID 3184 wrote to memory of 3556 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 93 PID 3184 wrote to memory of 3556 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 93 PID 3184 wrote to memory of 3556 3184 5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
-
C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"C:\Users\Admin\AppData\Local\Temp\5b0fcd10d3c38aa405c7e38d7929b620acf49111a6373d3696e1bbe1ec131c59.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1324 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\hardcore voyeur feet boots (Liz).mpg.exe
Filesize168KB
MD579bfec0a87d5c1932f6cfb728522e1ab
SHA12a543c103ccad6d054cc11929f5ee6d02aa7ee41
SHA256efcf4067b58a3c4115b6f174dbc6f8c1d8e1295d2f975d2a25d8d86b663efa85
SHA512474e0d7ceab4865efdb66205c1106521983af35f06c05cc054d7b8db893d2978f344ae536dd6e9ea56a34016ce138e1afc3024d7357e3a02e264ffffe1a4ff63