Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 18:33
Behavioral task
behavioral1
Sample
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe
Resource
win10v2004-20240426-en
General
-
Target
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe
-
Size
1.6MB
-
MD5
bcefd26185cbc4ab0b9525652972913a
-
SHA1
b2ceebe0a27abda967309b25d9b103698db40fca
-
SHA256
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803
-
SHA512
7f0193ccce0f796b7eecc942d3661aecfaaf4c14d56782a0ec7a904a83584ea3a56ae0d0c9b3b5f93b71fc88f0bfe3231ed5af7e73f988fd2c6149634d54bbdd
-
SSDEEP
24576:VYgK84mc3oQNtuGKJneIez3s+5OHOY+1WFfjchp33CVZsH1jelgS4AhKjiCq:in8zQKneI43958O71WGSVZsHggSHKj6
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
Processes:
resource yara_rule behavioral2/memory/1336-46-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1336-182-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4656-183-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-200-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-203-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-207-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-213-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-216-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-219-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-225-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3312-231-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
Processes:
resource yara_rule behavioral2/memory/3312-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\japanese cumshot lingerie voyeur feet black hairunshaved .avi.exe UPX behavioral2/memory/1336-46-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1336-182-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4656-183-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-200-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-203-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-207-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-213-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-216-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-219-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-225-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3312-231-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3312-0-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\japanese cumshot lingerie voyeur feet black hairunshaved .avi.exe upx behavioral2/memory/1336-46-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1336-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4656-183-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-200-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-203-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3312-231-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription ioc process File opened (read-only) \??\E: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\K: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\M: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\O: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\P: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\T: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\X: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\H: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\V: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\J: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\L: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\Q: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\R: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\U: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\Z: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\Y: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\A: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\B: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\G: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\I: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\N: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\S: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File opened (read-only) \??\W: 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Drops file in System32 directory 12 IoCs
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription ioc process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\horse hidden bedroom (Sonja,Liz).rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\IME\SHARED\lesbian catfight titts .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake full movie glans (Britney,Janette).avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\System32\DriverStore\Temp\american cum lingerie several models .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\FxsTmp\kicking fucking girls hole penetration .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\fucking several models (Tatjana).rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\xxx [free] sweet .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\config\systemprofile\russian cumshot lesbian licking (Tatjana).zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\FxsTmp\lingerie lesbian femdom (Kathrin,Janette).rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\brasilian cumshot blowjob several models titts .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\config\systemprofile\italian handjob fucking catfight gorgeoushorny .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SysWOW64\IME\SHARED\russian fetish bukkake sleeping mature .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Drops file in Program Files directory 19 IoCs
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription ioc process File created C:\Program Files\Microsoft Office\Updates\Download\indian fetish beast [milf] glans .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Microsoft\Temp\italian handjob hardcore licking black hairunshaved .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Common Files\microsoft shared\indian cum lingerie masturbation cock Ôï .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Microsoft Office\root\Templates\american action gay hot (!) girly (Ashley,Sylvia).rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\swedish action bukkake catfight feet redhair (Curtney).mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\beast [milf] granny .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\tyrkish kicking beast public .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\japanese cumshot lingerie voyeur feet black hairunshaved .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\xxx big (Tatjana).zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\chinese xxx girls hole castration (Janette).avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Google\Update\Download\gay voyeur cock shoes (Melissa).mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\american cumshot horse public black hairunshaved .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Microsoft\Temp\EUB476.tmp\sperm uncut gorgeoushorny .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\dotnet\shared\horse blowjob big titts lady .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\swedish handjob blowjob hot (!) (Sarah).mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files (x86)\Google\Temp\italian horse trambling voyeur feet young .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese cumshot lesbian girls sm .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\xxx hidden hairy .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\horse [bangbus] hole gorgeoushorny .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Drops file in Windows directory 64 IoCs
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription ioc process File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\japanese handjob fucking hidden bedroom .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\black gang bang xxx masturbation titts .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\german lesbian [bangbus] .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\tyrkish horse blowjob voyeur hole bondage .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\lesbian girls glans 40+ .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\horse catfight cock .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\sperm uncut hole .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\blowjob big .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\american beastiality lingerie [free] cock .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\Downloaded Program Files\black nude lingerie lesbian (Melissa).mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\porn lesbian uncut titts balls .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\norwegian bukkake voyeur titts shower (Tatjana).mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\lesbian [free] shoes .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_34e3bab50607a64b\xxx public cock circumcision .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\assembly\temp\swedish cumshot lingerie public glans .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\hardcore full movie high heels .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\indian handjob lingerie hot (!) mature .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\american horse lingerie sleeping young .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\beastiality horse hot (!) cock high heels (Curtney).mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\canadian bukkake sleeping pregnant .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\gang bang xxx lesbian lady .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\xxx girls glans stockings .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\british lingerie [bangbus] titts .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\porn beast [free] femdom .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\horse [milf] cock .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\french beast [bangbus] high heels .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\lingerie uncut .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\cumshot xxx catfight Ôï .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\swedish handjob blowjob licking .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\spanish lingerie big glans .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\indian beastiality horse [milf] titts (Jenna,Sarah).mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\american action fucking big redhair (Anniston,Janette).zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\malaysia bukkake masturbation hole girly .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\british fucking full movie (Janette).mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\american action sperm licking bondage .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\malaysia sperm licking YEâPSè& .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\spanish lesbian public cock .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\indian beastiality sperm lesbian ash .avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\canadian beast voyeur glans balls .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\british trambling girls cock latex .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\brasilian animal sperm [bangbus] .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\nude trambling licking feet redhair (Janette).rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\german lesbian masturbation hole circumcision (Karin).avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\malaysia blowjob several models traffic .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\danish handjob gay catfight traffic (Christine,Tatjana).avi.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\beastiality hardcore voyeur .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\tyrkish horse trambling licking swallow (Ashley,Liz).mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\cum lingerie public (Liz).mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\brasilian cumshot beast big gorgeoushorny .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\fucking lesbian glans lady .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\norwegian trambling uncut high heels .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\swedish horse blowjob sleeping leather .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\sperm girls (Janette).zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\british sperm [free] glans .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\lesbian masturbation 50+ .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\gay [free] shower .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\japanese gang bang beast full movie feet .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\brasilian action gay uncut sweet .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\indian beastiality horse masturbation titts .mpeg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\bukkake voyeur granny .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\japanese horse sperm [milf] .mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\tyrkish cumshot bukkake lesbian hole .zip.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\african lesbian sleeping cock shower (Melissa).mpg.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\beastiality fucking uncut latex .rar.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exepid process 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 4656 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exedescription pid process target process PID 3312 wrote to memory of 1336 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe PID 3312 wrote to memory of 1336 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe PID 3312 wrote to memory of 1336 3312 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe PID 1336 wrote to memory of 4656 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe PID 1336 wrote to memory of 4656 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe PID 1336 wrote to memory of 4656 1336 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe 0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe"C:\Users\Admin\AppData\Local\Temp\0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe"C:\Users\Admin\AppData\Local\Temp\0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe"C:\Users\Admin\AppData\Local\Temp\0c5c5eaf9f6b807bb514135d3f3b70de847b12f52fe36d97b9349e291bdbf803.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\japanese cumshot lingerie voyeur feet black hairunshaved .avi.exeFilesize
1.1MB
MD5f629976c3b0300920f6842379f6f7fb4
SHA14475630524e1db008a0b45b19a222d7826dfe291
SHA25621f38da6bfc2e999e4778a2758ca4ac2acbdeb310c6d951c4fe4b2e7e915f8ba
SHA512ea6cfa39d18be72c7ec042ad3887fe382dc1bb02080c4b24e11dff564789e3d7aba9c3a6f6a76648b1cee18641dd59c92b75e8d69347c4aa9e6e5e6d819e628e
-
memory/1336-182-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1336-46-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-219-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-210-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-231-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-185-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-187-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-191-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-200-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-203-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-207-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-181-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-213-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-216-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-0-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-222-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-225-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3312-228-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4656-183-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB