Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 00:06
Behavioral task
behavioral1
Sample
835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe
Resource
win10v2004-20240419-en
General
-
Target
835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe
-
Size
141KB
-
MD5
bde9bd3fa0deaacd6a081c27501e2cf8
-
SHA1
d73184cb345de69daefa7ed0b7f34c65f7cb8cda
-
SHA256
835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038
-
SHA512
408a8016082681116999d65defa82cad7c5c4897631c7cb2a3cf5f49465366e5b1c2f586a1fd6ba2755361d9e4721f268152c0308f9f558ac37402825ae1513e
-
SSDEEP
3072:JjbLl/gvyDFep1Tj4mYWR/R4nkPR/1aVuyJNs59tSiiS997okr/p94wTn7c15x:JjluyDM3Io5R4nM/40yJNsZuS/5RJT7M
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral1/memory/2912-81-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2736-91-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-95-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2912-104-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2736-105-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-106-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-111-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-114-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-117-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-122-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-125-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-128-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-131-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-134-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-137-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-140-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-143-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2932-146-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral1/memory/2932-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/files/0x00070000000143fb-5.dat UPX behavioral1/memory/2912-81-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2736-91-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-95-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2912-104-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2736-105-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-106-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-111-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-114-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-117-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-122-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-125-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-128-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-131-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-134-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-137-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-140-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-143-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral1/memory/2932-146-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2932-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x00070000000143fb-5.dat upx behavioral1/memory/2912-81-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2736-91-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-95-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2912-104-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2736-105-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-106-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-111-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-114-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-117-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-122-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-125-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-128-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-131-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-134-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-137-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-140-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-143-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2932-146-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\P: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\B: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\E: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\V: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\X: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\Y: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\I: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\T: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\M: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\N: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\R: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\S: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\Z: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\A: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\G: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\L: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\O: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\Q: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\U: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\W: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\H: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File opened (read-only) \??\K: 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\lesbian uncut (Liz).zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\IME\shared\bukkake several models bondage (Anniston,Sarah).zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\xxx uncut 40+ .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\IME\shared\russian kicking horse masturbation swallow .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\FxsTmp\danish action fucking masturbation titts hotel (Janette).mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\brasilian fetish xxx masturbation glans wifey .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\System32\DriverStore\Temp\japanese cum beast voyeur hole .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\FxsTmp\russian beastiality horse [milf] feet .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\config\systemprofile\swedish fetish lingerie hidden feet shoes .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\swedish beastiality bukkake public cock bondage .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\black nude beast catfight .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\horse hidden cock ash (Janette).rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\hardcore uncut sm .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\indian nude sperm [free] glans .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\lingerie catfight cock 50+ .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files\Windows Journal\Templates\beast voyeur hole black hairunshaved (Liz).zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Google\Temp\horse several models cock fishy .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\brasilian fetish lingerie public (Liz).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files\Common Files\Microsoft Shared\japanese gang bang beast [free] cock .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\blowjob hot (!) granny .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Microsoft Office\Templates\blowjob [free] feet .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\brasilian handjob beast voyeur blondie .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Common Files\microsoft shared\fucking big YEâPSè& .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Google\Update\Download\tyrkish fetish bukkake big .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\japanese horse beast lesbian (Melissa).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\fucking sleeping glans mature .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\french blowjob voyeur .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\malaysia bukkake hot (!) granny .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\russian gang bang lesbian hot (!) beautyfull (Christine,Melissa).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\american nude lingerie [milf] glans 40+ .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\black gang bang sperm hidden (Sylvia).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\porn lingerie hidden latex (Sonja,Karin).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\beastiality trambling several models cock 50+ .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\Downloaded Program Files\japanese horse horse [free] cock mistress .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\indian horse sperm several models .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_79642285ffd2a388\japanese horse gay licking .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\gay [bangbus] .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_60c2504d62fd4f0e\american fetish bukkake uncut glans wifey .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\brasilian cumshot hardcore [milf] blondie .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\PLA\Templates\beast uncut .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\handjob beast [free] swallow .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\nude lesbian masturbation beautyfull .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\russian porn lesbian hot (!) .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\italian cumshot blowjob uncut (Melissa).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\sperm [free] hole bedroom .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\animal fucking [milf] (Curtney).rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\african bukkake hot (!) boots (Ashley,Melissa).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\swedish horse horse hidden titts gorgeoushorny .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\horse sperm public granny .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\french sperm uncut hole sweet .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\InstallTemp\brasilian horse sperm [milf] feet beautyfull (Sylvia).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\mssrv.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\beast [free] feet shower (Curtney).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\fucking full movie feet .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\italian beastiality lingerie full movie feet leather (Tatjana).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\african trambling [bangbus] swallow (Sonja,Sarah).mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\action beast [bangbus] redhair .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\hardcore catfight cock 50+ .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\asian blowjob lesbian cock .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\chinese lingerie masturbation hole .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\norwegian trambling public hole .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\cum xxx lesbian .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\norwegian sperm hot (!) cock mistress (Sarah).zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\porn fucking full movie cock .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\italian kicking lingerie big cock bedroom (Jade).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\sperm big glans pregnant .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6208b91f46896156\asian horse hidden young .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\kicking gay [free] titts leather .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\malaysia beast [free] titts .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\lingerie girls .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\malaysia fucking voyeur .avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\gang bang sperm [free] glans sweet .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_a945e2c500c90142\asian sperm licking (Sylvia).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\action lesbian uncut titts .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3b85bcbe4734e96a\porn bukkake masturbation .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\horse bukkake big glans .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\lesbian hidden .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\tyrkish porn lingerie voyeur titts shower .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\norwegian xxx hidden (Curtney).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\porn bukkake big (Samantha).avi.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\black porn fucking uncut boots .rar.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\tyrkish beastiality trambling uncut .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\fucking [milf] glans beautyfull (Sylvia).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\SoftwareDistribution\Download\gay voyeur .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\sperm full movie hole fishy .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\british beast catfight mistress .mpeg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\tyrkish cumshot gay licking beautyfull .zip.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\horse gay [free] titts (Anniston,Jade).mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\russian action beast [free] hole .mpg.exe 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 2736 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2912 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 28 PID 2932 wrote to memory of 2912 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 28 PID 2932 wrote to memory of 2912 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 28 PID 2932 wrote to memory of 2912 2932 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 28 PID 2912 wrote to memory of 2736 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 29 PID 2912 wrote to memory of 2736 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 29 PID 2912 wrote to memory of 2736 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 29 PID 2912 wrote to memory of 2736 2912 835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe"C:\Users\Admin\AppData\Local\Temp\835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe"C:\Users\Admin\AppData\Local\Temp\835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe"C:\Users\Admin\AppData\Local\Temp\835b766b04e54c042879e02bbebc19fc0a977cd02dc316d7e81ccc0743fef038.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5eb5ebcfa8e66133c6ce07d7657bee5ef
SHA1586e210bb07b443d4ef02628f409b66a3d1abc69
SHA256e39c5013203405843d2173804015b8d3aefae133793dae462cb556383b7d186e
SHA512fa6796376edf280014583d964e74a55ef17b09f8d8f7caec669fd214916e7f63e0fe3c32183507d0e510d8b26ca284d6ac3cb3d8d6e6d523f5fcf1eee1a8e4a3