Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 23:37
Behavioral task
behavioral1
Sample
74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe
Resource
win10v2004-20240419-en
General
-
Target
74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe
-
Size
1.3MB
-
MD5
7b945dde0bd07c1e3b9b08bab4271c21
-
SHA1
fe4c743742c38bb89acffb1721876b791691e1b3
-
SHA256
74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239
-
SHA512
a84e30d03ab14d6f7519ab2b4618131f71532d4b9e20d6552ecdfb0bf073efd132316f9b3e2af49f4753476a49b85e69efa2c6701434deb5ed962204d76a1fb8
-
SSDEEP
24576:gJ8ZkDnYhtxrBscQnKn6iXgmKsiYdGeSdRdqKw:68Zk7YhvrBscQK6iXHiiGpW5
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
resource yara_rule behavioral2/memory/2404-61-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2712-167-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-187-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2404-188-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2712-189-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-191-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-192-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-197-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-206-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-209-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-213-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-216-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-219-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-222-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-225-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-228-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-231-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-234-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-237-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/1368-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/files/0x000b000000023bac-5.dat UPX behavioral2/memory/2404-61-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/2712-167-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-187-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/2404-188-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/2712-189-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-191-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-192-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-197-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-206-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-209-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-213-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-216-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-219-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-222-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-225-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-228-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-231-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-234-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-237-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1368-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x000b000000023bac-5.dat upx behavioral2/memory/2404-61-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2712-167-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-187-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2404-188-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2712-189-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-191-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-192-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-197-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-206-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-209-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-213-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-216-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-219-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-222-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-225-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-228-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-231-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-234-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-237-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\L: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\S: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\T: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\X: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\A: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\B: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\G: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\Z: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\M: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\N: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\W: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\Q: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\R: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\V: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\E: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\J: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\K: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\U: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\Y: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\I: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\O: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File opened (read-only) \??\P: 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\xxx gay [bangbus] legs .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\russian cumshot [free] vagina (Samantha).zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\indian gay sperm [bangbus] .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\handjob catfight granny .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\FxsTmp\canadian kicking cum hot (!) latex .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\beastiality handjob voyeur .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\animal porn sleeping .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\config\systemprofile\cumshot uncut blondie .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\IME\SHARED\porn hot (!) titts high heels .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\config\systemprofile\kicking several models titts redhair .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\IME\SHARED\gang bang [milf] stockings .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SysWOW64\FxsTmp\malaysia gang bang several models (Anniston,Tatjana).zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\bukkake handjob voyeur (Ashley).mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\indian gay uncut castration .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Google\Update\Download\fetish full movie .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Microsoft\Temp\EU9848.tmp\beastiality animal girls sm (Liz).avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\british hardcore hardcore hot (!) (Melissa,Karin).zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\spanish nude fucking catfight ash (Sarah,Christine).avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Google\Temp\russian bukkake hidden .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Microsoft\Temp\canadian horse [free] circumcision .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\spanish hardcore beast [free] cock beautyfull .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\danish porn girls glans mature .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\beastiality uncut cock hairy .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Common Files\microsoft shared\american gang bang [free] leather (Curtney).avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\dotnet\shared\cumshot public titts .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\asian fucking [bangbus] .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Microsoft Office\Updates\Download\brasilian fetish sperm masturbation 40+ (Sonja).rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Microsoft Office\root\Templates\chinese beast [milf] .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\norwegian xxx cum masturbation nipples circumcision .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\malaysia cum full movie vagina .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\german animal nude girls upskirt .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\tmp\british handjob full movie balls .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\gang bang blowjob full movie .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\chinese xxx [bangbus] feet ejaculation .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\japanese handjob [bangbus] boobs .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\fucking gay public .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\asian sperm licking .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\fetish horse girls .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\russian gay horse voyeur .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\norwegian horse girls 40+ (Samantha).mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\african horse [free] vagina upskirt (Sonja,Sarah).zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\trambling hidden .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\malaysia beastiality sleeping titts blondie .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\lesbian hardcore masturbation ejaculation (Gina).avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\japanese trambling licking glans .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\spanish gay xxx hidden vagina latex .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\bukkake masturbation .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\asian beast cumshot masturbation blondie .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\gay horse hidden shower .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\Downloaded Program Files\norwegian nude porn lesbian granny .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\porn gay lesbian .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\animal animal catfight beautyfull (Christine,Sonja).mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\tyrkish fucking horse public castration (Britney,Jenna).rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\indian gay lesbian .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\asian gang bang cumshot voyeur mistress .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\german gang bang public cock (Christine,Tatjana).mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\gang bang [free] traffic .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\animal sleeping traffic .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\gang bang [bangbus] ash (Sarah,Tatjana).mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\spanish cum blowjob licking (Sonja,Sylvia).mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\german animal hot (!) stockings .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\fucking voyeur blondie .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\mssrv.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\fucking [free] latex .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\fucking several models cock .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\norwegian beastiality trambling catfight vagina circumcision .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\japanese horse [free] hotel .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\fucking trambling big hole gorgeoushorny .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\italian kicking sleeping ash .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\russian xxx fucking hidden (Britney).rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\spanish lingerie trambling full movie pregnant .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\indian porn fetish catfight vagina .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\hardcore animal hot (!) young .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\chinese cumshot horse licking .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\british handjob girls 40+ (Liz,Sandy).mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\fetish [bangbus] bondage .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\french cumshot lesbian hidden bondage .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\porn handjob [milf] wifey .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\malaysia porn hot (!) YEâPSè& .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\asian blowjob masturbation (Sylvia).rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\italian beast lesbian Ôï (Janette).mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\german beast fetish public boobs shower .mpg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\asian fucking hot (!) vagina mature .zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\action [bangbus] mistress .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\xxx nude uncut feet (Curtney,Sandy).avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\assembly\temp\nude big feet YEâPSè& .avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\CbsTemp\canadian bukkake girls .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\canadian action [free] .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\canadian action public boobs Ôï .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\fucking hidden hotel (Jenna,Melissa).avi.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\brasilian blowjob horse [bangbus] gorgeoushorny .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\bukkake hidden (Melissa,Sonja).rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\handjob beast catfight boots .rar.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\swedish sperm beastiality [free] .mpeg.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\brasilian gang bang public balls (Britney,Sylvia).zip.exe 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 2712 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2404 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 88 PID 1368 wrote to memory of 2404 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 88 PID 1368 wrote to memory of 2404 1368 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 88 PID 2404 wrote to memory of 2712 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 95 PID 2404 wrote to memory of 2712 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 95 PID 2404 wrote to memory of 2712 2404 74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe"C:\Users\Admin\AppData\Local\Temp\74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe"C:\Users\Admin\AppData\Local\Temp\74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe"C:\Users\Admin\AppData\Local\Temp\74e49d3054faf8c80d3ab3b9be28f68e68d059175477573f9e5d88208684b239.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\asian fucking [bangbus] .zip.exe
Filesize554KB
MD5caffcaafaf0d5cee0ee9dff29d4bfaf1
SHA188b430abb19fbc3b75595e49b4a5d797648afc0e
SHA256b2ab95c98222a2953c4f80c92b56f2df647c4258624da47f2b593ee1d7c1be3d
SHA5120111d223fc3fef77ebea4ce1195c22b7104026e6866e2db202ec12c54af19896d1b6b0800dcb4e8cbcc21999602e64efa8c8961330b48a0289b30e8072d6d774