Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 01:13
Behavioral task
behavioral1
Sample
95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe
Resource
win10v2004-20240412-en
General
-
Target
95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe
-
Size
403KB
-
MD5
7efc322d3f56b57d7945080144e08677
-
SHA1
f9354f399ec1dd8e5495624868d65070bf0dd28e
-
SHA256
95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d
-
SHA512
00fb059caf212c5291d1945d989863c5715cf9178aae46c5fa52c49e5674e6a606d065e6ae166f4fbf93ce6adb736afacf7b8672be1e00f3e6c629644421ac76
-
SSDEEP
6144:tjluQoSDIo5R4nM/40yJNV6dCVEl3o/HPJqcVcy6RDH3BKlVeC3JhneJIgEqO/Rg:tEQoS9qhHM8ElYvoyoDxuVeC3JhHJ1/C
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/1340-13-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/916-148-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-186-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3464-188-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-190-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-191-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-198-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-212-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-217-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-221-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-225-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-229-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-233-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-237-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-241-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-245-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2500-249-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/2500-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x000700000002340c-5.dat UPX behavioral2/memory/1340-13-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3464-145-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/916-148-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-186-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3464-188-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-190-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-191-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-198-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-212-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-217-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-221-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-225-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-229-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-233-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-237-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-241-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-245-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2500-249-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2500-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x000700000002340c-5.dat upx behavioral2/memory/1340-13-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3464-145-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/916-148-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-186-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3464-188-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-190-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-191-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-198-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-212-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-217-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-221-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-225-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-229-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-233-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-237-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-241-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-245-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2500-249-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\Z: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\H: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\I: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\L: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\P: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\Q: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\T: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\W: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\X: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\B: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\E: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\G: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\M: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\R: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\V: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\A: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\S: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\J: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\K: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\N: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\O: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File opened (read-only) \??\U: 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\hardcore hidden feet penetration .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\System32\DriverStore\Temp\brasilian porn trambling girls .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\FxsTmp\russian gang bang xxx several models (Melissa).mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\IME\SHARED\swedish kicking lingerie catfight sm (Gina,Sylvia).mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\hardcore full movie circumcision .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\config\systemprofile\american cumshot blowjob uncut black hairunshaved .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lesbian [bangbus] young .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish animal trambling catfight feet .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\FxsTmp\animal lingerie [milf] penetration .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\IME\SHARED\russian porn lingerie hot (!) feet ash (Tatjana).mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\sperm hidden titts .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\hardcore licking hole .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\tyrkish handjob lingerie hidden feet .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\xxx lesbian 40+ .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\horse full movie bondage .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Microsoft\Temp\sperm uncut titts stockings .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Google\Update\Download\blowjob voyeur blondie .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Microsoft Office\root\Templates\xxx uncut hairy .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\animal lingerie catfight gorgeoushorny .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\blowjob [milf] glans .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Google\Temp\american nude bukkake hidden .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\american beastiality horse girls cock ¤ç (Samantha).zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\black beastiality trambling public glans (Jenna,Liz).mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\dotnet\shared\xxx voyeur .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish gang bang horse voyeur feet shower .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\sperm sleeping 50+ .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Microsoft Office\Updates\Download\sperm hidden hole mature .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Common Files\microsoft shared\italian beastiality horse several models hole .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\russian beastiality sperm lesbian (Janette).avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\black action bukkake [milf] bedroom .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\lesbian masturbation girly .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\italian fetish bukkake hidden cock granny .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\asian trambling voyeur hole .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\lesbian girls cock balls .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\sperm several models .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\fucking [free] .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\indian handjob fucking catfight cock latex (Liz).zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\danish beastiality trambling sleeping .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\beastiality xxx uncut fishy .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\cum blowjob uncut 40+ .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\assembly\temp\russian action lingerie hidden titts .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\bukkake several models bondage .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\blowjob public redhair .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\cumshot lesbian big young .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\danish cum xxx hidden young .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\asian lesbian hot (!) titts .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\handjob blowjob uncut bondage .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\danish fetish lingerie [free] glans balls .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\asian xxx licking hole (Jenna,Melissa).mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\african horse [free] leather .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_aaeae146be52e178\french trambling full movie shoes .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\italian nude horse catfight shoes .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\asian sperm big .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\norwegian sperm hot (!) (Tatjana).zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\french beast several models feet Ôï .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\danish nude hardcore catfight glans .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\british horse voyeur hole .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\porn horse full movie .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\brasilian cumshot horse licking titts boots .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\CbsTemp\indian cumshot horse uncut cock redhair .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\indian gang bang hardcore [milf] hole 50+ (Sarah).rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_c494b3b28da10665\american fetish gay hidden glans swallow (Sylvia).rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\canadian bukkake public (Tatjana).avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\fetish blowjob sleeping cock granny .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\canadian xxx full movie hole .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\russian fetish beast uncut ash .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\american animal trambling public castration .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\black animal lingerie licking femdom .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\brasilian fetish sperm hidden titts black hairunshaved .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\beastiality lingerie licking titts black hairunshaved .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\cumshot gay sleeping (Tatjana).zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\tyrkish horse sperm lesbian glans .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\chinese lesbian hidden stockings .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\gay several models ejaculation .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_a4f93129c473df49\cumshot lingerie girls black hairunshaved .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\lesbian [milf] pregnant .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\french hardcore public glans (Sandy,Samantha).mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\french horse public wifey .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\british xxx full movie wifey .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\gay licking upskirt .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\japanese cumshot gay big hole .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\german trambling voyeur titts bondage .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\cumshot fucking masturbation .rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\lesbian uncut 40+ (Jenna,Sylvia).mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\african blowjob hot (!) Ôï .mpeg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\hardcore licking (Sylvia).zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\japanese handjob bukkake masturbation (Samantha).rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\russian action blowjob lesbian glans .zip.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\black kicking bukkake several models gorgeoushorny .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\trambling hot (!) (Curtney).rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\russian cumshot beast full movie feet .avi.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\kicking gay full movie (Sylvia).rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\norwegian blowjob hidden (Jade).rar.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\norwegian lingerie hot (!) cock bedroom .mpg.exe 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 3464 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 916 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1340 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 88 PID 2500 wrote to memory of 1340 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 88 PID 2500 wrote to memory of 1340 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 88 PID 2500 wrote to memory of 3464 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 89 PID 2500 wrote to memory of 3464 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 89 PID 2500 wrote to memory of 3464 2500 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 89 PID 1340 wrote to memory of 916 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 90 PID 1340 wrote to memory of 916 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 90 PID 1340 wrote to memory of 916 1340 95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
-
C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"C:\Users\Admin\AppData\Local\Temp\95c929dba97314c6c807f5963dd3ebdf4ee1fc123259447146288509cd8f5b6d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish gang bang horse voyeur feet shower .mpg.exe
Filesize1.5MB
MD5b83af13483aa573a1ba49a0b32f3d080
SHA19510b0cc60d5521e76575273d4fff0e836e729a6
SHA25637d0231c8c51b945f32d4db33ea37335bbd74033d6fa02b7e146aaf0eeb18957
SHA512f0f4232f22daa1b1777e6f71abef11498d8844640dcf6cc7b364033054d4b22acdcc8f300b844b264dd76805f855b95c17a9396579ba738fd7cda982b9a3717a
-
Filesize
146B
MD5f5eaaa0c97a9ff3a9bcf37c06566cbea
SHA1cdba904628521117aa782f5e8dfee799206b39a5
SHA256d600c389043b802fdb6472c22c5407096cd01894354481b28c6ec0c58098bd77
SHA51299e5a5a5fc08c199407e6042dcbaee5c3e99276aea10df997d8a73badb48bddf4cd40cd03a163dabc0a34fc0c80e5c8bca9635210e3909059b7c349332e6d9ec