Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 21:59
Behavioral task
behavioral1
Sample
549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe
Resource
win10v2004-20240419-en
General
-
Target
549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe
-
Size
799KB
-
MD5
6eed710594e8331321487ae9389285b1
-
SHA1
bde2a2da3ae10db7ce38dc5c0c5efbbaad1da76e
-
SHA256
549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872
-
SHA512
163aa95d16d3738bfe2587ae00d9eec7b59788c5204a3f97db4078ef13979510d060c67c3d7a9e90e841f52a7c2f6ba0debf37193bc50ce01a59d45dee829e54
-
SSDEEP
12288:JEyDMhqhOhY1V+GCRuU6H9G8JImf4EKzn8yOwJIGzv4JCEH3YDqhh:JBOhCV+9RuUs8manO86r9h
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/4684-33-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4684-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2772-182-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-184-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-189-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-198-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-201-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-208-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-217-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-220-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-223-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-226-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4836-229-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral2/memory/4836-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x000a000000023b87-5.dat UPX behavioral2/memory/4684-33-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4684-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2772-182-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-184-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-189-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-198-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-201-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-208-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-217-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-220-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-223-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-226-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4836-229-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4836-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000a000000023b87-5.dat upx behavioral2/memory/4684-33-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4684-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2772-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-198-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4836-229-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\Z: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\B: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\M: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\O: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\Q: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\R: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\G: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\I: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\J: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\S: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\W: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\E: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\K: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\P: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\T: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\U: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\X: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\A: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\H: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\L: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\N: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File opened (read-only) \??\V: 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\sperm kicking [bangbus] upskirt .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese porn big upskirt (Gina,Christine).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\System32\DriverStore\Temp\horse nude girls black hairunshaved .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\FxsTmp\chinese gang bang big wifey .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\kicking hidden .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\trambling lingerie licking glans high heels .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\british kicking catfight boobs upskirt (Curtney).mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\chinese lingerie uncut hairy .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\config\systemprofile\norwegian porn action uncut .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\IME\SHARED\norwegian handjob masturbation mistress .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\fucking porn sleeping .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SysWOW64\config\systemprofile\african trambling catfight boots .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\gay several models lady .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Microsoft Office\root\Templates\african beast [milf] glans (Liz).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\american lingerie fetish several models glans .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Google\Update\Download\tyrkish beastiality lesbian (Ashley,Ashley).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\horse several models granny .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Google\Temp\gang bang [bangbus] black hairunshaved .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\blowjob sperm [free] nipples .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\horse hidden girly .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Microsoft Office\Updates\Download\american fetish uncut ash .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Microsoft\Temp\asian kicking handjob full movie .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\action hidden granny (Janette,Karin).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\trambling lesbian bondage .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\chinese cumshot cumshot hot (!) 40+ (Christine).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\handjob licking circumcision (Karin).zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\spanish sperm gay lesbian .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Common Files\microsoft shared\danish horse nude big .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\dotnet\shared\russian horse hidden redhair (Jenna,Samantha).rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\action hot (!) (Sylvia).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\fetish [milf] (Sylvia,Karin).rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\horse hot (!) nipples redhair .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\danish kicking catfight .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\blowjob lesbian wifey .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\horse horse hot (!) (Anniston,Kathrin).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\british kicking masturbation vagina .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\swedish beast sperm uncut .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\gang bang action [free] Ôï (Christine).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\japanese handjob [bangbus] boots .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\hardcore big shower .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\porn hardcore licking feet (Melissa,Melissa).rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\hardcore lingerie masturbation traffic .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\gang bang porn girls .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\american hardcore horse lesbian .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\british beastiality full movie (Jenna,Karin).rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\blowjob horse [bangbus] (Kathrin).zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\porn girls ash (Sandy).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\canadian nude hot (!) .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\african kicking hidden .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\indian horse voyeur vagina Ôï .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\porn porn uncut titts shower (Jade).mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\french animal voyeur nipples boots .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\black kicking gay hot (!) .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\malaysia lingerie horse [milf] stockings .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\asian porn fucking several models .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\x86_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_bde408a455fc3ece\african bukkake trambling hot (!) .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\CbsTemp\brasilian trambling fucking uncut sm .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\american beastiality gay [free] (Sandy,Jenna).mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\french gang bang public .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\tyrkish handjob voyeur vagina wifey .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\hardcore full movie boobs boots .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\malaysia beast beast public bondage .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\tyrkish blowjob full movie cock girly .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\german xxx beastiality [bangbus] wifey (Jenna).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\british fucking fetish full movie cock .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\tyrkish nude handjob lesbian .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\fucking sperm masturbation gorgeoushorny .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\indian cum masturbation boots (Tatjana).mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\indian xxx sleeping leather .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\porn licking legs castration (Sarah).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\french porn action several models nipples bondage .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\russian action gang bang sleeping bedroom (Sylvia).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\norwegian fetish catfight wifey (Gina,Sarah).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\italian lesbian [milf] boobs mature .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\sperm beastiality [bangbus] girly .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\asian action big shoes .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\xxx licking .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\blowjob hidden gorgeoushorny (Karin,Janette).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\canadian nude cum [bangbus] upskirt (Gina,Sandy).avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\cum beast full movie (Karin).mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\swedish cum cum several models legs redhair .mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\french lesbian xxx big .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\canadian animal voyeur .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\brasilian gay [milf] (Sonja).rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\chinese animal hidden .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\canadian blowjob full movie .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\japanese cumshot porn catfight boobs hotel .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\german cum several models cock high heels .mpg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\gang bang licking titts .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\fetish gay hot (!) hole .zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\danish bukkake fucking [free] (Janette,Sylvia).zip.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\cumshot fetish catfight .avi.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\malaysia gay sleeping YEâPSè& (Kathrin).mpeg.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\trambling fucking lesbian .rar.exe 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 2772 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4684 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 89 PID 4836 wrote to memory of 4684 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 89 PID 4836 wrote to memory of 4684 4836 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 89 PID 4684 wrote to memory of 2772 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 93 PID 4684 wrote to memory of 2772 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 93 PID 4684 wrote to memory of 2772 4684 549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe"C:\Users\Admin\AppData\Local\Temp\549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe"C:\Users\Admin\AppData\Local\Temp\549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe"C:\Users\Admin\AppData\Local\Temp\549a4c0b3220e5efa6e01406d3af451b75f1d67bbe96cb53d296e67222188872.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\action hot (!) (Sylvia).avi.exe
Filesize2.0MB
MD5d52764066bc4488415a2afe0a6e95fa0
SHA1b4f7889e1589073b788692cfc65905f36a67dc40
SHA25673b7f117c7405f2804c5757c558fa7b9166ab4f5e16c958159ddb1de5365192e
SHA512f36e465ce25747bccb565ed9616af2608b567773dbfd746e7bb09e6bac04f59ef42bc1c3e8aaaa793de603e82ea2670f7d149570845f7e0ac08320bc42d6b99a