Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 03:09
Behavioral task
behavioral1
Sample
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe
Resource
win10v2004-20240419-en
General
-
Target
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe
-
Size
97KB
-
MD5
a9d9113024886f82aadfa4988765ffa4
-
SHA1
65fe2a95c69931ed4e0c500e9d8372792860e1cd
-
SHA256
d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269
-
SHA512
3e79082e57cc87db7448fc6b59d2c301fb301cc42c89438c8fe6fce843d6905d0449a2ed74cb832c3da64dd64be292ed209faacc043c5c95f2a6cd887e081491
-
SSDEEP
1536:dVRVCaKgzbLc54hukfgvYnouy8jV1Ayj4m/QWR/RFN4g2BXGW+:dfjbLl/gvQouth1Tj4mYWR/REg2BX8
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral1/memory/1952-0-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2572-88-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-92-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2948-101-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-103-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-104-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-107-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-116-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-119-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-124-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-127-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-130-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-133-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-136-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-139-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-142-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-145-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1952-148-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral1/memory/1952-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/files/0x0007000000015d93-5.dat UPX behavioral1/memory/1952-76-0x0000000004F80000-0x0000000004F9D000-memory.dmp UPX behavioral1/memory/2572-88-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-92-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/2948-101-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-103-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-104-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-107-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-116-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-119-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-124-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-127-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-130-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-133-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-136-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-139-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-142-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-145-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1952-148-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1952-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/files/0x0007000000015d93-5.dat upx behavioral1/memory/1952-76-0x0000000004F80000-0x0000000004F9D000-memory.dmp upx behavioral1/memory/2572-88-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-92-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2948-101-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-103-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-104-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-107-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-116-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-119-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-124-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-127-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-130-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-133-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-136-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-139-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-142-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-145-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1952-148-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\N: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\O: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\R: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\U: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\W: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\E: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\S: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\G: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\H: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\I: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\J: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\L: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\M: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\P: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\A: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\V: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\Q: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\T: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\X: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\Y: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\Z: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File opened (read-only) \??\B: d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\porn big .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\System32\DriverStore\Temp\norwegian handjob horse [bangbus] nipples .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\IME\shared\black kicking fetish girls nipples .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\config\systemprofile\french lingerie sleeping leather (Jenna,Sylvia).rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\gay handjob hidden black hairunshaved .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\FxsTmp\canadian sperm trambling lesbian lady .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\IME\shared\american cum several models castration .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese fetish catfight (Tatjana,Gina).avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\german action trambling voyeur .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\SysWOW64\FxsTmp\german fetish hardcore [free] titts blondie .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Windows Journal\Templates\italian fetish gang bang girls glans (Janette,Janette).zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Common Files\microsoft shared\blowjob public .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\african sperm voyeur ash sm .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\american trambling kicking full movie legs hotel .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files\DVD Maker\Shared\kicking gay full movie girly .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\german lingerie uncut .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\french fucking sleeping glans high heels .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\fetish [milf] .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Google\Update\Download\german kicking blowjob [free] .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Microsoft Office\Templates\beast kicking masturbation glans (Sylvia).rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\cumshot licking bedroom .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\cumshot porn lesbian cock mature .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files\Common Files\Microsoft Shared\british lesbian masturbation .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\chinese horse handjob uncut wifey (Kathrin).zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Program Files (x86)\Google\Temp\french hardcore licking .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\russian bukkake masturbation .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\german horse cumshot [free] cock stockings (Jade).mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\german fetish uncut latex .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\chinese cumshot masturbation .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_a945e2c500c90142\trambling horse voyeur .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\african cum kicking several models mistress .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\porn gay sleeping .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\lesbian public feet (Karin).mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\chinese gay xxx masturbation pregnant .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\porn trambling [bangbus] (Anniston).avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_7bfdfb15e7184c41\russian kicking beastiality catfight (Jade,Christine).mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\bukkake sleeping (Christine,Janette).zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_de-de_b4aea777fe683838\cumshot [bangbus] .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_dd18b2a07d49aa11\fetish lesbian sleeping 50+ .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\Downloaded Program Files\brasilian horse big boots .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\swedish handjob [milf] titts high heels .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\swedish beastiality catfight shower .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\gang bang [free] fishy (Jade,Liz).mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\german sperm horse girls bondage .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8c6fc5a7aa8c435d\italian hardcore trambling hot (!) sweet (Sandy,Christine).rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\tyrkish xxx licking .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\malaysia fetish cum [milf] young .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_4d274741486b900c\asian lesbian big .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\tmp\handjob handjob catfight .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\bukkake kicking hot (!) (Curtney,Ashley).rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\lingerie several models gorgeoushorny (Jade).zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\russian cum cumshot voyeur (Liz).mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\black kicking hidden .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\horse licking cock .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\african trambling gang bang several models .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\mssrv.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\german xxx xxx several models shoes .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_657d9a203abeb154\chinese porn sleeping hairy .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\french beastiality nude voyeur feet shoes .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\InstallTemp\spanish blowjob voyeur .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\chinese fetish horse [bangbus] feet .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\lingerie sleeping .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\malaysia cumshot horse uncut hole high heels .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\norwegian fetish horse full movie blondie (Tatjana).rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\canadian beast beast several models bedroom (Sandy).rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aea650787d30ed8a\italian fetish beastiality full movie cock sweet .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\security\templates\american horse lesbian hidden vagina .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\kicking action catfight cock .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5d6ada54ed6d35a2\italian action [bangbus] ash .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\animal cumshot hot (!) ash (Melissa,Curtney).avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\british kicking catfight .avi.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\swedish cumshot beast [milf] ash .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\hardcore blowjob [free] balls .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\temp\nude xxx catfight nipples .mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\russian beast [bangbus] ash wifey .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\british cum gang bang catfight redhair .mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\handjob [milf] feet leather (Sandy,Kathrin).mpg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\norwegian cum sperm voyeur castration (Janette).mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\canadian beast catfight .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\sperm licking blondie .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\indian handjob gay public granny .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\asian lesbian horse lesbian traffic .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\italian porn sleeping nipples (Britney).zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\lesbian hardcore hidden granny .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\chinese horse [bangbus] feet wifey .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\italian beastiality trambling uncut vagina sweet (Sylvia).mpeg.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\chinese animal girls (Curtney).zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\spanish cumshot bukkake uncut penetration .rar.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_4fe2107fd06efdd8\russian lingerie several models sweet .zip.exe d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 2572 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2948 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 28 PID 1952 wrote to memory of 2948 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 28 PID 1952 wrote to memory of 2948 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 28 PID 1952 wrote to memory of 2948 1952 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 28 PID 2948 wrote to memory of 2572 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 29 PID 2948 wrote to memory of 2572 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 29 PID 2948 wrote to memory of 2572 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 29 PID 2948 wrote to memory of 2572 2948 d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe"C:\Users\Admin\AppData\Local\Temp\d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe"C:\Users\Admin\AppData\Local\Temp\d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe"C:\Users\Admin\AppData\Local\Temp\d34de2998fd536ac10b927a0beb00035b00c7dda5908468b96452fe188351269.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD519a24f2da42a9113b2a9b4fcb46bb90e
SHA1e1ae9d599e050adac7b2bfc51393b1c2bbb19e41
SHA256843e81cba239f4a6ec15eef866f2939151257ceab1c29efea9ce9d2d71e2f602
SHA5121c9cfabb8187a0ca6112b50ad6b796a39d620c076f5cafb35467dfb9fe7c36f7d50463b3de0137ff83cc8b1bb6caf0b3bcdc71c5377daa891dbd26469fd0b837