Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 19:44
Behavioral task
behavioral1
Sample
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe
Resource
win10v2004-20240226-en
General
-
Target
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe
-
Size
1.9MB
-
MD5
d1e4373cc1626454e2620772060dc927
-
SHA1
0896212c534e570a86e2306dd3da00cc3027de80
-
SHA256
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985
-
SHA512
eaaf2585bd0a32cbf435a979f7f5b4ca09807899d848a9e9f5499f73d84dfcf55718b917ad9d3cad0b5856ced137e3d2c74b8736aa048985562158283c0991bb
-
SSDEEP
49152:Mfz3An7ikIMch3VT0osQkrIVOm/8UVMViWCibytNX25:0k/2hZ0YkQHVHgen25
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
Processes:
resource yara_rule behavioral2/memory/2748-11-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-16-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2412-17-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-18-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4028-32-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4556-33-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-141-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-153-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-177-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-199-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-202-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-206-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-219-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2748-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
Processes:
resource yara_rule behavioral2/memory/2748-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\gay hot (!) pregnant .mpg.exe UPX behavioral2/memory/4028-12-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-11-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-16-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2412-17-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-18-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4028-32-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4556-33-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-141-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-153-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-177-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-199-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-202-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-206-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-219-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2748-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2748-0-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\gay hot (!) pregnant .mpg.exe upx behavioral2/memory/4028-12-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-11-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-16-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2412-17-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-18-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4028-32-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4556-33-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-141-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-153-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-177-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-202-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2748-230-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription ioc process File opened (read-only) \??\B: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\N: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\R: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\Z: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\Q: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\S: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\W: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\H: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\J: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\K: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\L: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\T: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\X: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\A: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\G: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\M: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\O: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\V: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\Y: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\E: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\I: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\P: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File opened (read-only) \??\U: 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Drops file in System32 directory 12 IoCs
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription ioc process File created C:\Windows\SysWOW64\IME\SHARED\indian beastiality fetish [bangbus] (Sonja,Britney).rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\norwegian hardcore hot (!) latex .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\config\systemprofile\african cum hot (!) YEâPSè& .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\FxsTmp\canadian trambling masturbation .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\IME\SHARED\cumshot xxx hot (!) titts bondage .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\asian xxx fucking [milf] cock .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black animal action several models (Britney,Liz).zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\config\systemprofile\sperm girls hole 50+ .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\System32\DriverStore\Temp\black beast girls legs redhair .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\FxsTmp\japanese xxx girls glans traffic .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\asian beastiality sperm [free] high heels .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\bukkake cum uncut gorgeoushorny .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Drops file in Program Files directory 19 IoCs
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription ioc process File created C:\Program Files (x86)\Google\Temp\swedish sperm sperm hot (!) (Christine).rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Microsoft\Temp\american horse uncut .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\french fucking lingerie uncut mature (Kathrin,Kathrin).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\blowjob uncut swallow .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\african gay hot (!) .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\tyrkish handjob girls cock redhair (Britney).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\asian fucking catfight (Karin,Samantha).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\dotnet\shared\lingerie sleeping balls .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Microsoft Office\root\Templates\swedish hardcore nude public ash bedroom .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\gay hot (!) pregnant .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\handjob cum girls blondie .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\cum nude masturbation .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\hardcore lesbian masturbation nipples swallow .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Google\Update\Download\blowjob kicking sleeping shower (Sandy).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A22979E4-D188-4AF0-A888-04FE21284B11}\EDGEMITMP_19EA3.tmp\british cum cumshot sleeping balls (Jenna).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Common Files\microsoft shared\canadian hardcore porn several models (Karin,Anniston).rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\chinese kicking horse catfight redhair .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\malaysia handjob action uncut .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Program Files\Microsoft Office\Updates\Download\malaysia nude kicking several models (Janette,Kathrin).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Drops file in Windows directory 64 IoCs
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription ioc process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\spanish fucking fucking several models femdom .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\british animal bukkake uncut .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\mssrv.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\brasilian lingerie fetish uncut black hairunshaved .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\asian bukkake licking traffic .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\malaysia handjob voyeur young .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\beast horse full movie .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\tyrkish horse trambling several models ash swallow .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\brasilian hardcore gang bang [milf] upskirt .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\danish hardcore full movie legs balls (Ashley).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\security\templates\fucking catfight stockings .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\russian gay catfight feet redhair .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\danish gay lesbian [bangbus] granny .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\swedish porn catfight ash (Tatjana).rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\russian handjob hidden sm .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\brasilian lesbian bukkake hot (!) (Sarah,Curtney).zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\russian sperm porn voyeur hairy .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\fetish kicking licking girly (Samantha,Sandy).mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\fetish uncut balls (Sarah,Curtney).mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\gang bang uncut leather .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\danish nude hidden castration .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\gang bang beast [milf] .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\xxx lesbian .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\porn beastiality masturbation cock shower (Karin).mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\blowjob cum [milf] bondage .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\malaysia lesbian porn licking black hairunshaved .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\asian cum uncut titts granny .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\chinese animal horse [free] (Ashley).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\french hardcore [milf] swallow .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\porn [bangbus] .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\american beast full movie .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\french cum hot (!) boots .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\beastiality kicking hot (!) ejaculation .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\italian beast nude [free] stockings .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\indian trambling several models vagina young .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\norwegian bukkake [milf] titts sweet (Jade).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\fetish kicking voyeur leather .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\blowjob hardcore voyeur balls (Jade).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\american handjob beast licking young .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\spanish fetish xxx several models vagina .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\handjob hidden (Britney).zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\xxx licking 50+ .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\CbsTemp\beast handjob full movie vagina .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\animal [milf] ash .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\xxx porn girls Ôï .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\japanese blowjob horse [milf] (Melissa,Tatjana).rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\american beastiality blowjob [milf] boobs blondie .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\gay [milf] penetration .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SoftwareDistribution\Download\nude xxx full movie legs upskirt (Kathrin,Sandy).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\japanese horse fucking lesbian .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\beast masturbation femdom .avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\sperm hardcore voyeur glans leather .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\spanish blowjob beastiality public swallow .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\german beast full movie (Sarah).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\british fucking bukkake uncut lady (Sandy,Anniston).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\spanish xxx [free] latex .zip.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\cumshot sleeping glans boots .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\chinese action fetish [free] sm .mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\horse uncut boots (Jenna).avi.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\french fetish fetish sleeping vagina (Janette).mpg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\animal [free] vagina .mpeg.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\fetish hot (!) Ôï (Tatjana,Karin).rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\danish blowjob gang bang [bangbus] swallow .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\indian bukkake sleeping .rar.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exepid process 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4556 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 4028 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exedescription pid process target process PID 2748 wrote to memory of 2412 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2748 wrote to memory of 2412 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2748 wrote to memory of 2412 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2748 wrote to memory of 4028 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2748 wrote to memory of 4028 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2748 wrote to memory of 4028 2748 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2412 wrote to memory of 4556 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2412 wrote to memory of 4556 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe PID 2412 wrote to memory of 4556 2412 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe 2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"C:\Users\Admin\AppData\Local\Temp\2c87857992f01251dbc651688d1fa470b3e72c1951009e297c4a611247c61985.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4988 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\gay hot (!) pregnant .mpg.exeFilesize
2.0MB
MD5b8782754c885371846d2d8c99d9992d0
SHA18c8e664db9dc75609dda5f576759d040f0927fde
SHA2564ae99e80e6fc1065d15ddc73b287cc69e439df1e2ee0605f7c61b6826f7bedb8
SHA512d896f0630e7ebe9c6993cb09e976f4d3cf10612a2b59b8be6cd177e7bf78b7c0ce78555d0d6a62072cf40e7f66a5de65dbe4cce2dc71934d02f8a438c97230f7
-
memory/2412-17-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-153-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-210-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-16-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-230-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-18-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-222-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-219-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-141-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-0-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-177-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-199-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-202-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-206-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-11-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2748-214-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4028-32-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4028-12-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4556-33-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB