Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 19:03
Behavioral task
behavioral1
Sample
15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe
Resource
win10v2004-20240412-en
General
-
Target
15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe
-
Size
1.9MB
-
MD5
6920f5e14d8f4cdc609f02d54bf28464
-
SHA1
0e88998075bf6a9b79a30595dd987ec158dda00c
-
SHA256
15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b
-
SHA512
4d219e8d8b13dc7bc8123c8a0a5c1a821a552669afc33dc03901d7e7c9f72295c11c47d24b5398d06cd2cf892ee51100d8cdf89ed675d91a852f439c11ba3b5b
-
SSDEEP
49152:Pqj6cuYGTm+gsyJUh4JCUqaZ/ENZrHaBCjO4oqtK1NCvW258zz7oQ:Pqj6uGirJ5CUqaZ/ENZrcC1o114WmQMQ
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/4368-179-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5028-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/396-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-183-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-189-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-198-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-201-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-204-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-208-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-217-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-220-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-223-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-226-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4368-229-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/4368-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x00070000000233f2-5.dat UPX behavioral2/memory/396-153-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-179-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5028-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/396-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-183-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-189-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-198-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-201-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-204-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-208-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-217-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-220-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-223-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-226-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4368-229-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4368-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x00070000000233f2-5.dat upx behavioral2/memory/396-153-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-179-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5028-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/396-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-183-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-198-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4368-229-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\Z: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\H: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\J: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\P: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\S: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\G: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\M: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\E: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\N: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\O: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\T: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\V: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\X: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\A: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\B: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\Q: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\R: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\U: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\W: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\Y: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\I: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File opened (read-only) \??\L: 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\italian kicking lesbian .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\IME\SHARED\chinese lingerie lesbian hotel .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\beastiality big balls .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian blowjob lingerie licking blondie .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\config\systemprofile\asian trambling sleeping nipples ¼ë (Sonja,Sandy).avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\System32\DriverStore\Temp\french horse hidden latex .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\beast trambling [bangbus] shoes .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\fucking animal uncut blondie .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\config\systemprofile\blowjob catfight vagina .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\FxsTmp\canadian nude licking .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\IME\SHARED\chinese fetish lesbian leather (Samantha).avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\kicking gay [free] redhair (Jade).zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Shared Gadgets\italian bukkake uncut .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\swedish sperm uncut blondie .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\lingerie full movie hairy .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Microsoft\Temp\african bukkake [milf] .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\kicking cum hot (!) boots .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\american lingerie action voyeur black hairunshaved .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Google\Update\Download\fucking big .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\hardcore gay masturbation mature .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\handjob bukkake public sm .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\sperm masturbation femdom (Kathrin,Sylvia).avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Microsoft Office\Updates\Download\hardcore blowjob several models redhair .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\american gay licking hairy .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\asian bukkake public .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\german porn public (Jade).rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Microsoft Office\root\Templates\cum porn hidden shower (Anniston,Janette).zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files (x86)\Google\Temp\indian handjob hardcore hidden hole .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\Common Files\microsoft shared\hardcore gay uncut high heels .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Program Files\dotnet\shared\animal fetish [free] beautyfull (Gina,Tatjana).zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\nude uncut swallow .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\spanish lesbian hot (!) .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\CbsTemp\british nude licking sweet (Sylvia,Sonja).zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\indian animal fetish public .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\french animal lesbian hot (!) stockings (Christine,Curtney).mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\beast uncut circumcision .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\malaysia trambling lingerie licking 40+ (Gina,Kathrin).rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\porn catfight .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\blowjob trambling [milf] .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\gang bang public 50+ .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\fucking hot (!) feet 50+ (Sylvia,Jade).mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\swedish cum hidden .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\InstallTemp\american porn big 40+ .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\canadian blowjob cumshot lesbian legs .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\fucking beast uncut boots .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\malaysia lesbian porn [milf] nipples shoes .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\indian blowjob fetish sleeping feet (Sonja).rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\french porn big titts (Kathrin,Sandy).mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\danish gay [bangbus] .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\blowjob big .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\german gang bang [free] high heels (Sylvia,Curtney).mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\danish lingerie hidden sm .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\porn [bangbus] 50+ .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\cumshot hot (!) pregnant .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\handjob public nipples swallow (Sonja,Ashley).zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\french hardcore sperm full movie glans .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\lingerie [bangbus] girly .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\indian handjob catfight hotel .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\canadian gang bang several models .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\fetish catfight girly .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\indian nude [free] boobs bedroom .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\handjob hot (!) feet ash .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\canadian porn big .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\tyrkish bukkake beast public (Sylvia).mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\xxx public legs 50+ (Curtney,Liz).rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\british trambling lesbian hotel .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\african fetish girls nipples .avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\trambling hardcore [milf] hotel (Christine,Kathrin).avi.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\russian beast sperm full movie leather .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\cumshot uncut bondage .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\brasilian lesbian cum [milf] (Sonja,Ashley).mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\malaysia handjob fucking several models hole .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\Temp\indian gang bang full movie wifey .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\british lesbian lesbian voyeur YEâPSè& .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\swedish fetish several models 50+ .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\russian fucking cumshot girls ash 50+ .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\gay gang bang [free] .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\cumshot voyeur feet femdom .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\fucking licking legs circumcision .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\beastiality animal [bangbus] girly .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\asian handjob licking 40+ .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\african nude horse catfight boobs swallow .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\canadian porn public .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\nude nude several models cock redhair (Anniston,Kathrin).mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_34e3bab50607a64b\norwegian sperm hot (!) .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\gang bang cumshot [milf] blondie .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\beast blowjob masturbation 50+ .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\horse big .zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\italian nude porn catfight glans sweet (Melissa,Jade).zip.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\horse porn licking black hairunshaved .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\xxx full movie girly .rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\lingerie [milf] nipples .mpeg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\norwegian beast lingerie uncut cock hairy .mpg.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe File created C:\Windows\PLA\Templates\chinese cumshot cum sleeping nipples blondie (Curtney).rar.exe 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 396 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4368 wrote to memory of 5028 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 88 PID 4368 wrote to memory of 5028 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 88 PID 4368 wrote to memory of 5028 4368 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 88 PID 5028 wrote to memory of 396 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 89 PID 5028 wrote to memory of 396 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 89 PID 5028 wrote to memory of 396 5028 15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe"C:\Users\Admin\AppData\Local\Temp\15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe"C:\Users\Admin\AppData\Local\Temp\15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe"C:\Users\Admin\AppData\Local\Temp\15c9bd8d33a79c44919b33c98ff007571db3d19feb5d850e1fd08d143c7e1c9b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\asian bukkake public .avi.exe
Filesize543KB
MD5a47b6a8c3fc32f33499c6362e4332db7
SHA10bbd957e40ceb828fc5defd5a2496d889a90bf8a
SHA256b127d13470c5e114ec0c7d4a6549f62b465bdb84670b07748911947fd8fbab84
SHA512ec9f57ad8c99abdf5ed6c032b425f4965c310b04dae55cafe7cef99f69997dd35e5841934e751250a3cddb4d3a7e6ca2ffc5ca5589efa06e142286acd0b065f3