Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 01:35
Behavioral task
behavioral1
Sample
aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe
Resource
win10v2004-20240412-en
General
-
Target
aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe
-
Size
746KB
-
MD5
a7b883f33d2e969fa33dea07664a24eb
-
SHA1
8ede0f35b52dc8108c73132c2dae8259c27c3263
-
SHA256
aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea
-
SHA512
413006270fe0c8c88f8f5144c77480d352ddff49d6a69fc71350651d5e7e9fbb7ba0c8d4dbe8048a035fd101c22a7eaf4446176176e971a410a16e03b05d54c2
-
SSDEEP
12288:VEQoSfqrFcdaxW5ea3YOusit63WvVEElcAC3K2rbItt5y7dK0W6l3+YjjRUeZR:V3cxR+OsitxSElXIHIn5wdh3lpVX
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 21 IoCs
resource yara_rule behavioral2/memory/3568-92-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1884-163-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3380-164-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-183-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3568-184-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1884-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3380-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-189-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-195-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-209-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-218-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-226-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-234-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-238-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-242-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2420-246-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 23 IoCs
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023429-5.dat UPX behavioral2/memory/3568-92-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1884-163-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3380-164-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-183-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3568-184-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1884-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3380-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-189-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-195-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-209-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-218-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-226-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-234-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-238-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-242-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2420-246-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023429-5.dat upx behavioral2/memory/3568-92-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1884-163-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3380-164-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-183-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3568-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1884-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3380-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-234-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-238-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-242-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2420-246-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\S: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\U: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\G: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\J: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\M: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\T: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\W: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\E: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\I: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\Q: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\X: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\Z: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\A: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\P: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\K: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\L: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\N: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\R: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\V: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\Y: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\B: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File opened (read-only) \??\H: aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\malaysia fucking several models (Sarah).mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\brasilian beastiality fucking catfight high heels .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese cumshot fucking public feet 50+ (Karin).mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\System32\DriverStore\Temp\bukkake full movie .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\IME\SHARED\trambling several models .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\russian kicking horse [free] sm .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black animal horse voyeur bondage (Ashley,Curtney).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\config\systemprofile\black nude lingerie sleeping (Samantha).mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\FxsTmp\blowjob [bangbus] feet granny .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\IME\SHARED\russian cum blowjob voyeur leather .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\gay hot (!) young (Britney,Karin).mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish nude sperm big .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\horse big cock shoes .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Google\Temp\swedish cum blowjob sleeping (Melissa).zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Google\Update\Download\fucking [free] glans .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\swedish gang bang lesbian full movie black hairunshaved .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\beastiality gay [free] (Sylvia).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\danish beastiality xxx hot (!) cock .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\italian action bukkake [free] feet ejaculation .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\dotnet\shared\american nude sperm big glans leather (Liz).avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\beast voyeur .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Microsoft Office\Updates\Download\gay hidden .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\brasilian beastiality trambling catfight feet beautyfull (Curtney).mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\indian nude gay hidden glans shower (Curtney).avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Microsoft\Temp\russian horse beast big hole shower .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Common Files\microsoft shared\indian beastiality sperm catfight wifey .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Microsoft Office\root\Templates\danish beastiality blowjob full movie titts .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\italian kicking lesbian voyeur black hairunshaved .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\bukkake [milf] feet .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\swedish nude xxx [milf] feet ejaculation (Sylvia).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\asian lesbian several models hotel .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\african gay [milf] .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\trambling uncut feet .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\chinese xxx big (Samantha).avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\fetish lingerie sleeping lady .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\cum blowjob hot (!) .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\porn beast several models titts swallow .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\indian action xxx catfight .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\handjob lesbian [bangbus] .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\norwegian trambling hot (!) cock .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\beastiality gay hidden titts black hairunshaved (Melissa).mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\bukkake voyeur ejaculation .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\handjob lingerie [milf] .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\african trambling [bangbus] titts .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\action horse hot (!) glans (Sonja,Tatjana).zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_c494b3b28da10665\blowjob lesbian hole .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\mssrv.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\cumshot lesbian [milf] titts swallow (Tatjana).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\animal hardcore masturbation titts blondie .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\british fucking licking stockings .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\InputMethod\SHARED\japanese porn trambling big hotel .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\american action gay lesbian .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\brasilian cum sperm [milf] glans 50+ .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\canadian gay uncut glans shoes .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\fetish blowjob [bangbus] (Janette).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\beastiality trambling several models mistress (Ashley,Samantha).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\beastiality bukkake [free] .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\japanese gang bang lesbian full movie feet (Sonja,Sarah).zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\black nude hardcore uncut (Samantha).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\danish cum lesbian catfight titts pregnant .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\brasilian kicking horse uncut feet hotel .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\lesbian [bangbus] titts swallow .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\asian trambling catfight YEâPSè& .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\norwegian sperm girls cock (Sonja,Liz).zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\animal blowjob [bangbus] sm .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\brasilian cum trambling licking gorgeoushorny (Britney,Sarah).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\security\templates\indian gang bang fucking lesbian (Curtney).mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\horse horse hot (!) .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\blowjob several models lady (Gina,Melissa).mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\gay catfight castration (Anniston,Tatjana).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\indian gang bang sperm licking .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\norwegian lesbian [bangbus] feet high heels (Melissa).avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\indian kicking lingerie [bangbus] (Melissa).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\norwegian trambling [free] cock pregnant .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\xxx [milf] ash .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\animal blowjob [bangbus] cock redhair .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\norwegian lesbian hidden titts .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\sperm girls (Curtney).mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\malaysia trambling several models glans traffic .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\russian horse beast uncut titts shoes .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\swedish porn beast [free] cock ejaculation .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\german xxx masturbation feet boots .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\danish animal bukkake [milf] .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\russian horse blowjob hot (!) feet blondie .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\lesbian sleeping hole hotel (Melissa).avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_aaeae146be52e178\african fucking girls granny .avi.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\swedish gang bang blowjob [bangbus] titts redhair .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\horse lesbian cock .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\beastiality gay big cock .zip.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\handjob lesbian several models hairy .mpg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\tyrkish nude beast lesbian mistress .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\canadian xxx [milf] boots .rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\chinese lesbian public YEâPSè& (Jenna,Curtney).rar.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\action trambling masturbation traffic .mpeg.exe aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3380 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 1884 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3568 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 90 PID 2420 wrote to memory of 3568 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 90 PID 2420 wrote to memory of 3568 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 90 PID 2420 wrote to memory of 1884 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 92 PID 2420 wrote to memory of 1884 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 92 PID 2420 wrote to memory of 1884 2420 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 92 PID 3568 wrote to memory of 3380 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 94 PID 3568 wrote to memory of 3380 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 94 PID 3568 wrote to memory of 3380 3568 aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"C:\Users\Admin\AppData\Local\Temp\aff05e83fe66f88a09133014df4bb1f788038c3dea296033a51e751f5521b2ea.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\beast voyeur .zip.exe
Filesize2.0MB
MD5cc092ea7a2dddf082e0dbe8bd5584012
SHA11801e195ef2651380bc777770959a98a7d7ab2e5
SHA2562486bb56fca4c7bb0be63b7e5b2e51774dd48e762680931426d48f701dfc2b43
SHA512c92a005f7c43e6910d2109c0fb0b5cb992f5fa80e0c8bfac57c8a44e1dbf6db361aa747b01285fbcd360ef9c0b6e7f687757cd8a96b7dfdbc6ed1000349357cd