Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
Resource
win10v2004-20240426-en
General
-
Target
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
-
Size
1.9MB
-
MD5
e996a72155566902e4097522a9b12b37
-
SHA1
9ff642cfb820a15b86fc945871b7697b4d3468a4
-
SHA256
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f
-
SHA512
3a558f03d1176c370014588f9e28d71d0c4c50226055674ad206050c5e0fb597b9fb91e89ef37587c1e7204b791b190de814cb149ca3b16dc9939b4ad4de665f
-
SSDEEP
49152:uvcpoKq2R0hpziSDJTajPDuXKOPa/DnJ6SAUBvKvdd5IFFVqEC6bJ:+cei04jP8jQDnJ6SAU0vdd4FVqaJ
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
Processes:
resource yara_rule behavioral2/memory/2132-118-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1056-163-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-162-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-178-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1056-181-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-183-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-189-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-199-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-203-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-208-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-212-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-216-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-220-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-224-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-228-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-232-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-236-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1032-240-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
Processes:
resource yara_rule behavioral2/memory/1032-0-0x0000000000400000-0x000000000041C000-memory.dmp UPX C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\black action bukkake licking stockings .mpeg.exe UPX behavioral2/memory/2132-118-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1056-163-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3248-162-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-178-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1056-181-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-183-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-189-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-199-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-203-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-208-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-212-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-216-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-220-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-224-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-228-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-232-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-236-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1032-240-0x0000000000400000-0x000000000041C000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File opened (read-only) \??\G: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\H: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\K: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\L: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\M: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\N: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\V: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\A: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\J: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\S: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\T: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\W: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\B: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\I: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\P: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\R: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\Y: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\Z: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\E: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\O: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\Q: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\U: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\X: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Drops file in System32 directory 12 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File created C:\Windows\SysWOW64\IME\SHARED\blowjob [bangbus] traffic .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\beast uncut titts (Anniston,Curtney).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\african hardcore [bangbus] feet sm (Sylvia).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian kicking sperm licking .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\System32\DriverStore\Temp\xxx licking (Melissa).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\FxsTmp\asian bukkake lesbian hole .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\lesbian full movie penetration .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\swedish cum xxx catfight hole lady (Melissa).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\config\systemprofile\bukkake masturbation bedroom (Sonja,Karin).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\FxsTmp\fucking licking glans .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\IME\SHARED\russian porn lingerie [free] hole YEâPSè& (Tatjana).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\config\systemprofile\lingerie masturbation feet pregnant .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Drops file in Program Files directory 18 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\sperm hot (!) YEâPSè& .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\fucking masturbation .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Google\Update\Download\lesbian masturbation femdom .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\fucking girls beautyfull .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\dotnet\shared\bukkake masturbation .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Microsoft Office\root\Templates\italian animal beast catfight YEâPSè& .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\tyrkish fetish bukkake licking hole boots (Sarah).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\asian horse full movie (Samantha).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\italian horse gay big sm (Britney,Janette).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\danish cum lesbian licking cock (Christine,Melissa).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\italian animal lesbian hot (!) .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Microsoft Office\Updates\Download\japanese action beast uncut beautyfull .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft\Temp\beast uncut (Jade).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Google\Temp\swedish cumshot xxx uncut titts gorgeoushorny (Samantha).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Common Files\microsoft shared\blowjob masturbation (Melissa).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\tyrkish kicking gay public castration .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\black action bukkake licking stockings .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\lesbian full movie .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Drops file in Windows directory 64 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\beast uncut glans (Sonja,Sylvia).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\malaysia sperm sleeping .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\porn gay public feet .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\malaysia lesbian hot (!) (Liz).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\cum sperm full movie feet .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\american handjob trambling [milf] hole young .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\gay sleeping .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\animal lesbian licking .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\american fetish xxx lesbian .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\german gay uncut .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\horse horse [free] .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\kicking lesbian public upskirt .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\horse lesbian sleeping titts .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\african sperm uncut titts .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\cumshot blowjob sleeping .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\african lingerie [bangbus] cock (Britney,Jade).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\danish kicking gay full movie sm .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\german bukkake uncut hole lady (Karin).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\french trambling lesbian glans YEâPSè& (Tatjana).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\horse trambling public (Jade).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\fetish trambling catfight young .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\brasilian action blowjob hidden sweet .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\beast [milf] hole .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\american cum lingerie hidden hole .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\brasilian horse lingerie [bangbus] glans swallow .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\PLA\Templates\lingerie lesbian hole boots .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\african lingerie sleeping bondage .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\french lesbian masturbation hole .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\gang bang lesbian hidden mistress (Jenna,Liz).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\kicking lingerie licking (Sylvia).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\malaysia horse public balls .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\cum sperm public penetration .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\japanese cumshot trambling [milf] (Curtney).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\american beastiality hardcore [milf] cock high heels .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\fetish gay girls latex .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\spanish fucking hot (!) (Liz).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\sperm [bangbus] glans mistress (Sylvia).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\fetish bukkake sleeping .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\japanese kicking lesbian sleeping penetration .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\fucking masturbation titts .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\horse big shoes .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\italian animal bukkake masturbation cock boots (Janette).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\brasilian cum sperm voyeur (Samantha).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\sperm hot (!) hole shower (Karin).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\chinese fucking lesbian feet YEâPSè& (Janette).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\asian beast lesbian YEâPSè& .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\chinese trambling sleeping YEâPSè& .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\xxx hidden hairy .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\danish gang bang bukkake catfight (Samantha).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\danish handjob lingerie public feet .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\spanish fucking girls (Samantha).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\swedish gang bang blowjob big YEâPSè& .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\french lingerie uncut glans .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\Temp\norwegian lingerie licking (Janette).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\italian kicking xxx lesbian feet fishy .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\cum gay [bangbus] penetration .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\indian gang bang gay lesbian hole Ôï .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\x86_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_bde408a455fc3ece\canadian gay hidden titts hotel (Janette).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\xxx big girly .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_34e3bab50607a64b\japanese kicking blowjob uncut .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\InputMethod\SHARED\russian beastiality bukkake masturbation .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\danish gang bang bukkake licking titts (Sonja,Melissa).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\animal lingerie lesbian feet lady .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\lingerie hidden feet mistress (Sarah).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exepid process 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 3248 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 1056 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription pid process target process PID 1032 wrote to memory of 2132 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 1032 wrote to memory of 2132 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 1032 wrote to memory of 2132 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2132 wrote to memory of 3248 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2132 wrote to memory of 3248 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2132 wrote to memory of 3248 2132 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 1032 wrote to memory of 1056 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 1032 wrote to memory of 1056 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 1032 wrote to memory of 1056 1032 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\black action bukkake licking stockings .mpeg.exe
Filesize546KB
MD51dff94c3071e10073fc307e9ed867a4c
SHA1b12d2c7c1dd62561deb4ebe86db904330918e141
SHA256ad8f03683e468a70441baa2dba7ba332bc96db8d58f524b9a36013a387ccd194
SHA512de7d25a1408803b6bf3a611f755e073827fd4a9f16222280ad4792a9bc5fd9cc34ec103d4779f0c38f69799c8dbe7207ab27d44543dcd059f8ad82c0fe3ae646