Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 03:44
Behavioral task
behavioral1
Sample
d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe
Resource
win10v2004-20240226-en
General
-
Target
d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe
-
Size
1.3MB
-
MD5
640ed7e89920a108d6308640a775d0dc
-
SHA1
c0e8dfb326f2a3324c4acdcaad79d046a89d24a5
-
SHA256
d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656
-
SHA512
8e8b603031a315f1a01fed04ce093190d51785849153c0f3e5f4891c105df15c34dd52bc6006f35a0d4b43d6c7549df0e85de3b712fffe4c4d4e3ba910055fed
-
SSDEEP
24576:gxgXZD3YVEDrp1B8quAB6sgmPrVUL7xr9Deqy759b3IlEFFnxVsjpv:9ZMVEXpf8bAFj8NRq7dFhxVsJ
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral1/memory/1500-91-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-92-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2508-93-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-94-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-95-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-99-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-103-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-116-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-119-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-128-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-131-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-136-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-139-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-142-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-145-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-148-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1500-151-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral1/memory/1500-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/files/0x0007000000015c69-5.dat UPX behavioral1/memory/2932-13-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2508-57-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-91-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2932-92-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/2508-93-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-94-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-95-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-99-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-103-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-116-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-119-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-128-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-131-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-136-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-139-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-142-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-145-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-148-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral1/memory/1500-151-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1500-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x0007000000015c69-5.dat upx behavioral1/memory/2932-13-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2508-57-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-91-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2932-92-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2508-93-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-94-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-95-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-99-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-103-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-116-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-119-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-128-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-131-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-136-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-139-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-142-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-145-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-148-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1500-151-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\Q: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\U: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\W: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\K: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\M: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\P: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\R: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\T: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\X: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\Y: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\J: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\L: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\Z: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\E: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\H: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\G: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\I: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\O: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\S: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\V: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\A: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File opened (read-only) \??\B: d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\spanish hardcore voyeur (Sandy,Curtney).rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\IME\shared\russian beastiality gay [bangbus] .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\hardcore bukkake sleeping .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\horse voyeur feet .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\tyrkish horse licking femdom .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\System32\DriverStore\Temp\cumshot lesbian hairy .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\config\systemprofile\norwegian porn [milf] feet .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\FxsTmp\french fucking handjob licking hole latex .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\IME\shared\gang bang lesbian (Sandy).mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese action gang bang [bangbus] (Samantha,Ashley).mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Windows Journal\Templates\swedish bukkake full movie shoes .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Google\Temp\horse uncut (Gina,Jenna).mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\blowjob nude several models glans .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Microsoft Office\Templates\asian beast public shower .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files\DVD Maker\Shared\indian handjob lingerie hot (!) .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\american xxx catfight .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\fetish girls boobs sweet (Tatjana,Kathrin).mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\indian nude [milf] sweet .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Common Files\microsoft shared\handjob licking .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\japanese kicking uncut legs .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\beastiality fucking hot (!) vagina sweet .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files\Common Files\Microsoft Shared\lesbian cum [free] femdom .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\handjob sperm girls mature (Sonja,Samantha).rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\canadian animal sleeping cock leather .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Program Files (x86)\Google\Update\Download\asian cumshot sperm lesbian lady .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\tyrkish hardcore [bangbus] boobs .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\sperm fetish girls cock circumcision .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_1412267f4b3bb985\canadian animal several models high heels .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3b85bcbe4734e96a\brasilian xxx sleeping .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\fucking several models wifey .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\tyrkish kicking big .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_9498b282333b64ec\british cum fucking full movie femdom .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\bukkake catfight .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\asian fucking beast [milf] boobs .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\temp\porn beastiality licking glans (Sandy,Samantha).avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\horse lesbian glans sweet (Janette).mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\beast masturbation ìï .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_4fe2107fd06efdd8\trambling blowjob several models .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\cumshot trambling full movie swallow .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_60c2504d62fd4f0e\gay lingerie licking hotel .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\black fucking xxx girls redhair .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\japanese trambling [milf] .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\Downloaded Program Files\tyrkish sperm action [milf] .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\animal [milf] redhair .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\lesbian full movie .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\tmp\japanese kicking xxx big mistress .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_6.1.7600.16385_none_1dd3ce8d1e7524cd\malaysia beast xxx big glans femdom .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\hardcore several models blondie .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\trambling porn [milf] shower .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5d6ada54ed6d35a2\brasilian nude trambling uncut beautyfull .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\italian handjob cumshot several models legs YEâPSè& .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\british kicking several models cock black hairunshaved (Sylvia).mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\action animal [bangbus] cock black hairunshaved (Karin).avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\cum kicking lesbian pregnant (Sonja).mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ea4a469ab7713182\asian gay lesbian masturbation black hairunshaved .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\chinese trambling [milf] .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\animal beastiality catfight hairy .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\horse several models ash .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\asian handjob cumshot hidden lady .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\malaysia beast lingerie catfight titts .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\american beast big ìï .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\french porn [free] ash .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\nude big ejaculation (Karin).mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_7bfdfb15e7184c41\black nude xxx girls .avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\indian kicking several models lady .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\brasilian porn nude masturbation .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\french horse licking feet 40+ (Tatjana).mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\danish fetish handjob several models glans (Sylvia,Curtney).avi.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\british porn fetish masturbation balls .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\action animal big .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\horse [milf] titts stockings (Kathrin).mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\french sperm beastiality hidden lady .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\animal beast several models .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\french beastiality horse sleeping lady .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\kicking girls legs girly .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\spanish beastiality big hole .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\german beastiality [milf] hotel .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\nude cum full movie .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\malaysia nude beast full movie bondage .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\american fetish girls .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\PLA\Templates\american beast horse hot (!) .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\asian gang bang masturbation blondie .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\horse horse licking feet shower (Melissa).zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\chinese bukkake lesbian voyeur penetration .mpeg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\beast [milf] .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\InstallTemp\canadian gay bukkake masturbation sm .zip.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_dd18b2a07d49aa11\italian blowjob public sm .rar.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\mssrv.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\russian fucking lesbian [free] hole .mpg.exe d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 2508 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2932 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 28 PID 1500 wrote to memory of 2932 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 28 PID 1500 wrote to memory of 2932 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 28 PID 1500 wrote to memory of 2932 1500 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 28 PID 2932 wrote to memory of 2508 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 29 PID 2932 wrote to memory of 2508 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 29 PID 2932 wrote to memory of 2508 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 29 PID 2932 wrote to memory of 2508 2932 d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe"C:\Users\Admin\AppData\Local\Temp\d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe"C:\Users\Admin\AppData\Local\Temp\d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe"C:\Users\Admin\AppData\Local\Temp\d380907053d50aec9768ac16b5e3aabf2db1a578725e572d78c3a209efad2656.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
849KB
MD57b4f1f9d15b5a7786af31a6a2210220c
SHA1720146eb90c18cbb628f371b4dc9bcd0f6603994
SHA256ba53c8e4f16bfe5a1b42e767289bb769f0fe2e81582969aa829aafbcf09cecc3
SHA51283561e8b950501a009568ce94387b1e7420c6902cb611dea83c7f98288b4f0a17729fa1d19f95f2d0257d28e2d8169b957282b69f3612c7d14e2c84d3d5c6379