Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 21:35
Behavioral task
behavioral1
Sample
485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe
Resource
win10v2004-20240412-en
General
-
Target
485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe
-
Size
444KB
-
MD5
5b005a461a763216b679783df744fcf2
-
SHA1
85088b377c93582c0d6bf58a12b122ab621fc51b
-
SHA256
485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42
-
SHA512
5cabaf8c06a3942239be7292a3d2a04b3522b31a43f2d07ace4fe0dc51a99ee54b52c416ad39507386b8491960643d5bab11aa5daee90908a26fbf35d3892f66
-
SSDEEP
12288:VEQoSfqUI+IuMY/TTa2GfC5BtmfioYTO6ElHnMRVoBcXhBC6929mM:VlIuMY/TTa5C5LmfidyHWMBOxM
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
resource yara_rule behavioral2/memory/2472-44-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4764-152-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2228-153-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-179-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2472-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4764-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-184-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-224-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-232-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-236-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-240-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-244-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-248-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4340-252-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/4340-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023412-5.dat UPX behavioral2/memory/2472-44-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4764-152-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2228-153-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-179-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2472-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4764-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-184-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-224-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-232-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-236-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-240-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-244-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-248-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4340-252-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4340-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023412-5.dat upx behavioral2/memory/2472-44-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4764-152-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2228-153-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-179-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2472-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4764-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-224-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-240-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-244-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-248-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4340-252-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\W: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\Y: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\Z: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\L: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\N: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\O: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\P: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\T: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\E: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\K: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\M: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\S: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\U: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\V: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\G: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\H: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\I: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\R: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\A: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\B: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\J: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File opened (read-only) \??\X: 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\handjob girls legs (Ashley,Curtney).mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\IME\SHARED\canadian beast full movie boobs .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\gang bang xxx big gorgeoushorny .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\config\systemprofile\beast kicking [bangbus] (Sylvia,Jade).zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\FxsTmp\italian beastiality girls glans .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\hardcore animal hidden boots .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\spanish nude gang bang lesbian .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\asian kicking trambling uncut ash castration (Kathrin).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\FxsTmp\british animal animal [bangbus] (Kathrin,Anniston).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\japanese blowjob masturbation femdom .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\System32\DriverStore\Temp\bukkake public glans black hairunshaved .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SysWOW64\IME\SHARED\cum porn sleeping legs .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\trambling blowjob sleeping glans hotel .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Microsoft\Temp\beast hardcore sleeping .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\chinese xxx beastiality hidden 50+ (Sonja,Christine).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Microsoft Office\root\Templates\tyrkish animal sleeping titts high heels .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\asian bukkake porn sleeping titts latex .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\horse porn sleeping .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Microsoft Office\Updates\Download\black beast voyeur mistress .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\canadian kicking cum hot (!) .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Common Files\microsoft shared\malaysia handjob fetish hot (!) (Sandy,Sylvia).avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\handjob fucking [free] .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Google\Update\Download\japanese sperm [free] .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\blowjob gang bang [milf] .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\swedish porn licking .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\dotnet\shared\brasilian cum lingerie [bangbus] .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\malaysia fucking voyeur glans (Sonja).mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\bukkake uncut feet YEâPSè& .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\animal gang bang [milf] feet mistress .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Program Files (x86)\Google\Temp\horse [free] glans shoes (Melissa,Melissa).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\blowjob blowjob [free] cock fishy (Sylvia,Curtney).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\gay several models ash granny .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\fetish hardcore uncut hole (Christine,Ashley).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\norwegian cumshot gang bang [bangbus] swallow .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\lingerie licking .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\spanish nude [free] titts blondie .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\hardcore [bangbus] ash leather (Tatjana,Curtney).avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\chinese cum [bangbus] hole .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\african horse cum [free] cock high heels (Samantha,Karin).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\action full movie .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\malaysia beast masturbation titts traffic (Samantha).avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\swedish sperm horse hot (!) (Ashley).mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\french hardcore gang bang hot (!) .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\CbsTemp\brasilian fucking nude hidden feet castration .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\tyrkish beast horse uncut YEâPSè& (Kathrin).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\animal public feet .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\russian cumshot kicking full movie bondage (Sandy,Anniston).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\swedish nude beast [milf] titts castration .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\chinese xxx public redhair .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\porn masturbation .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\swedish fucking action uncut redhair (Karin,Sonja).zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\trambling licking vagina .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\malaysia porn full movie (Curtney).avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\asian beastiality several models (Jade).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\xxx hot (!) black hairunshaved .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\action public redhair .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\danish porn xxx full movie legs .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\lingerie masturbation mature .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\japanese nude horse uncut boobs .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\american beast handjob hot (!) (Gina).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\chinese nude handjob voyeur glans ejaculation .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_e79b400a6df5fd2c\handjob voyeur 40+ .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\brasilian fucking masturbation (Britney).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\spanish porn trambling lesbian .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\black lesbian gang bang sleeping (Kathrin).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\malaysia kicking uncut nipples wifey (Karin,Christine).zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\indian handjob action full movie glans balls .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\russian horse handjob hot (!) castration (Sylvia,Samantha).zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\african fetish blowjob girls castration .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\canadian beast girls ash .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\blowjob hidden .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\black lingerie [bangbus] .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\norwegian blowjob girls mistress .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\assembly\temp\fucking full movie Ôï .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\german lesbian fucking hot (!) cock (Ashley,Gina).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\italian kicking several models gorgeoushorny .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\swedish sperm lesbian voyeur .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\norwegian gang bang licking vagina circumcision .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\french nude sleeping (Sarah,Liz).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\gang bang catfight \Û (Sonja,Sarah).zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\indian beast full movie cock (Anniston).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\gay hidden vagina .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\beastiality public .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\tyrkish lingerie hot (!) Ôï (Sonja).mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\malaysia fetish blowjob public .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\spanish blowjob voyeur nipples .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\security\templates\german blowjob sperm sleeping .rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\asian hardcore nude uncut vagina (Janette).rar.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\american trambling big .avi.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\malaysia gang bang porn full movie shower .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\gay hidden .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\american lesbian [milf] .mpeg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\sperm cum [milf] .zip.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\canadian xxx hot (!) feet mistress .mpg.exe 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2228 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 4764 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4340 wrote to memory of 2472 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 88 PID 4340 wrote to memory of 2472 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 88 PID 4340 wrote to memory of 2472 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 88 PID 2472 wrote to memory of 4764 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 93 PID 2472 wrote to memory of 4764 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 93 PID 2472 wrote to memory of 4764 2472 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 93 PID 4340 wrote to memory of 2228 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 94 PID 4340 wrote to memory of 2228 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 94 PID 4340 wrote to memory of 2228 4340 485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"C:\Users\Admin\AppData\Local\Temp\485b9c865bff3d13f40b0fc9c970d1b0b55f800134de6365d97e1f8642eacb42.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\handjob fucking [free] .zip.exe
Filesize2.1MB
MD50011d0c030f6c5a77c3d0478a34052d3
SHA13c0d63622d2ac92b74e946663e30b2a7841de35d
SHA256adfede8b7a799a1062bd5e954ad693abda84a2700eb86a4b32cc6ad1cae04744
SHA51209e1a72229f7f6249529c3b3e7a008a8a9d927d503aad8735ee2c55c8eea98c2a0c448586105164cc3196c7afe1f08a796a2022c05f921d8504e1dcf92c1bb96