Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 22:02
Behavioral task
behavioral1
Sample
5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe
Resource
win10v2004-20240412-en
General
-
Target
5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe
-
Size
1.2MB
-
MD5
c2e0e391222548e1bdfb703753fdc42e
-
SHA1
1b8e3fc5fa54d82ec9a145fedc01a9ba88a2b744
-
SHA256
5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9
-
SHA512
4b21c85d15677ea6f6d9590e55e375f93e11b72c4a639baec144ab536a1a9f37f74b6ccc9449a1f947b02ec5e714c82fcc91b2641a8c78f0ff380b13d86dd080
-
SSDEEP
24576:Vq8vOhhU94+WEbmNoliED4Oc0HBVo3zz5vM06u+o4RHE/eGMrU2wV:UnhhUSELc0o3z1M06JVRGMrA
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 16 IoCs
resource yara_rule behavioral2/memory/3484-28-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5068-182-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-183-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-184-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-190-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-202-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-206-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-209-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-212-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-215-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-218-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-221-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-224-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-227-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 18 IoCs
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x00070000000233f7-5.dat UPX behavioral2/memory/3484-28-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5068-182-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-183-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-184-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-190-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-202-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-206-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-209-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-212-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-215-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-218-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-221-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-224-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-227-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4744-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x00070000000233f7-5.dat upx behavioral2/memory/3484-28-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5068-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-183-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-202-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-212-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4744-230-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\V: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\X: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\K: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\S: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\Y: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\Z: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\A: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\E: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\I: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\J: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\O: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\P: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\Q: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\U: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\B: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\G: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\H: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\M: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\W: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\L: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\R: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File opened (read-only) \??\T: 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\LogFiles\Fax\Incoming\italian action uncut castration .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian porn handjob masturbation .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\FxsTmp\action beastiality girls (Sandy).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black porn [milf] vagina stockings .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\fetish beastiality licking ash (Britney).mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\config\systemprofile\black sperm sleeping black hairunshaved (Britney,Christine).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\FxsTmp\fetish fetish licking .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\japanese gang bang cum hidden bondage .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\config\systemprofile\british animal handjob hidden glans .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\IME\SHARED\chinese gay voyeur ash ejaculation .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\System32\DriverStore\Temp\lesbian handjob full movie .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SysWOW64\IME\SHARED\spanish gang bang hot (!) .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Download\japanese cum xxx girls titts .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\beastiality hidden hairy .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\malaysia fetish masturbation hole .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\spanish kicking trambling [milf] nipples beautyfull .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\fucking sperm girls boobs bedroom .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\dotnet\shared\american animal trambling voyeur feet (Britney).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\african gang bang bukkake catfight cock stockings (Janette).mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\french action [free] .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Common Files\microsoft shared\beast cum uncut granny .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Google\Update\Download\brasilian cumshot gang bang masturbation .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\beastiality nude [free] boobs stockings .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Microsoft Office\root\Templates\canadian kicking big hotel (Jade,Kathrin).mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\tyrkish fetish hidden .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\kicking girls fishy (Kathrin).rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\swedish animal masturbation (Curtney).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Google\Temp\indian lesbian public upskirt (Jade,Jenna).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files (x86)\Microsoft\Temp\brasilian kicking action [bangbus] .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\russian blowjob horse [milf] fishy .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\japanese animal several models sweet .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\black fucking gang bang big .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\italian hardcore animal big 40+ (Jade,Sarah).mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\xxx public (Melissa,Karin).mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\horse girls hotel (Sonja,Janette).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\hardcore lingerie public .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\lingerie xxx full movie .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\asian horse masturbation circumcision .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\fucking full movie nipples shower (Sonja).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\brasilian handjob [bangbus] cock .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\horse girls .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\chinese lingerie sleeping vagina lady .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\sperm lesbian cock bedroom .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\african action fetish big nipples .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\lingerie full movie vagina .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\malaysia cumshot handjob big shoes .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\blowjob lingerie several models femdom .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\japanese fetish horse several models titts Ôï .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\brasilian beastiality [free] penetration .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\xxx nude [bangbus] latex (Sonja).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\french cum voyeur glans granny (Sandy,Samantha).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\indian lingerie licking boobs latex .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\russian nude hidden .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\horse lesbian voyeur boots .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\black cumshot big upskirt (Sandy,Sylvia).mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\brasilian animal horse several models (Curtney,Janette).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\cum gay [milf] .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\animal licking legs .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\asian cum porn several models young .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\tyrkish cumshot gay catfight girly .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_d58d4747b1d5988c\gay [bangbus] penetration .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\kicking xxx hot (!) glans .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\indian gay voyeur mistress .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\norwegian blowjob horse lesbian 50+ .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\danish gay masturbation castration (Tatjana).mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\brasilian bukkake beastiality [free] legs mistress .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\beast animal catfight (Sonja,Sonja).mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\french horse bukkake several models .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\american xxx catfight .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\british action hot (!) (Jenna,Sonja).rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\Temp\fucking animal hot (!) balls .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\african action sleeping leather (Janette).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\norwegian horse horse voyeur castration .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\african beast cum uncut .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\russian horse several models cock circumcision .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\Downloaded Program Files\swedish hardcore xxx hot (!) .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\malaysia lingerie fucking hidden glans .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\norwegian handjob licking penetration .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\malaysia action horse hidden ash .mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\gay hidden (Janette,Sonja).mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\xxx kicking sleeping titts YEâPSè& .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\tyrkish lingerie nude [free] boots (Gina,Sonja).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\lingerie sperm masturbation ejaculation (Christine).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\chinese kicking horse licking (Sandy).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\black nude girls blondie (Jenna).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\SoftwareDistribution\Download\black horse action uncut 40+ .mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\asian horse handjob [free] .avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\norwegian horse lingerie big granny (Ashley,Karin).avi.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\swedish handjob action [bangbus] (Sandy,Karin).mpg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\InstallTemp\gay lingerie hot (!) mature (Sonja).mpeg.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\fucking licking titts bedroom (Britney).zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\gay beastiality sleeping .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\xxx handjob sleeping .zip.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\malaysia xxx beast [free] feet .rar.exe 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 5068 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3484 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 90 PID 4744 wrote to memory of 3484 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 90 PID 4744 wrote to memory of 3484 4744 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 90 PID 3484 wrote to memory of 5068 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 92 PID 3484 wrote to memory of 5068 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 92 PID 3484 wrote to memory of 5068 3484 5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe"C:\Users\Admin\AppData\Local\Temp\5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe"C:\Users\Admin\AppData\Local\Temp\5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe"C:\Users\Admin\AppData\Local\Temp\5d9fc9650d9e913434a8662e36c75032d7a67e764f5fa25da2e52aaafe76ccc9.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\african gang bang bukkake catfight cock stockings (Janette).mpeg.exe
Filesize463KB
MD5b33134d54066300ccde8252abafab6b2
SHA16cdc841b4a76c554f0e983061409c79418a30332
SHA256d5693c3ac1cf53f40e92ed1b89199bafc41f8bf6b2bfe56fffbd141061812484
SHA512d48cbdd8c33b43d1e52044f8b3e36c3cbfe67bb9a44a4b875d7c198b32acafd4a0336c8065e02ecd8ee78cb08907872a269d2fc003eac5759c8936a752fd984f