Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 20:56
Behavioral task
behavioral1
Sample
45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe
Resource
win10v2004-20240419-en
General
-
Target
45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe
-
Size
716KB
-
MD5
1f1b2616b257659ce51761abf5549b30
-
SHA1
f214d4ea8e6409094643f72b787b9bd3696147fb
-
SHA256
45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8
-
SHA512
40fc3432da44177f71e6883f039ed8fd855ee6254c690a0300f30f3df3bb0d0d5c00d23a26843fe3a9812b94c67da6db9ac86db5cc1ba3395f5c529917c0a58e
-
SSDEEP
12288:tEQoS9qh3gSqPzfAS90FcoAMCY9pCyNVPtziafvIU4Ul/WqbBR+d:t23mzA7n9IyFiO/W4Rk
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 21 IoCs
resource yara_rule behavioral2/memory/1416-0-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3324-12-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3108-151-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/620-150-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-186-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3324-187-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3108-189-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-190-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-193-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-198-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-208-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-212-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-217-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-221-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-225-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-229-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-233-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-237-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-241-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-245-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1416-249-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/1416-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x000e000000023a6d-5.dat UPX behavioral2/memory/3324-12-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3108-151-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/620-150-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-186-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3324-187-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3108-189-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-190-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-193-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-198-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-208-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-212-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-217-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-221-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-225-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-229-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-233-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-237-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-241-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-245-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1416-249-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1416-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x000e000000023a6d-5.dat upx behavioral2/memory/3324-12-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3108-151-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/620-150-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-186-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3324-187-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3108-189-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-190-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-193-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-198-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-208-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-212-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-217-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-221-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-225-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-229-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-233-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-237-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-241-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-245-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1416-249-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\A: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\H: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\K: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\N: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\O: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\P: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\S: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\V: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\I: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\Q: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\Y: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\Z: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\E: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\G: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\M: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\R: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\U: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\W: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\B: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\J: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\L: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File opened (read-only) \??\X: 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\malaysia fucking nude several models mistress .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake sleeping nipples bedroom .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian hardcore [milf] (Samantha).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\handjob animal girls swallow .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\lingerie horse hot (!) boobs boots (Sonja).mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\System32\DriverStore\Temp\gang bang girls (Tatjana,Karin).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\FxsTmp\italian nude animal public nipples 40+ .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\norwegian cum animal hot (!) titts hairy .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\config\systemprofile\french nude hidden cock 40+ (Ashley,Sandy).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\FxsTmp\gang bang masturbation lady .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\IME\SHARED\italian gang bang catfight .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SysWOW64\config\systemprofile\gay horse licking .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\porn voyeur bedroom (Sonja).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Microsoft Office\root\Templates\african beastiality lingerie masturbation swallow .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\russian fetish action uncut .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\swedish horse handjob public nipples hotel (Samantha,Tatjana).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\german animal beastiality catfight boots .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Microsoft\Temp\lingerie fucking voyeur ash shower .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\french kicking hidden upskirt (Sarah,Anniston).zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Microsoft Office\Updates\Download\blowjob big .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\asian trambling nude [bangbus] .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\blowjob sleeping .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\sperm nude hot (!) .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Google\Update\Download\swedish horse lesbian [bangbus] (Melissa).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\dotnet\shared\spanish sperm kicking hot (!) vagina swallow (Sonja).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\cum bukkake girls titts .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\blowjob kicking public .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Google\Temp\chinese bukkake xxx lesbian balls .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\danish fucking catfight hole black hairunshaved .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Microsoft\Temp\EU9848.tmp\horse animal lesbian 40+ .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\fetish uncut legs (Sylvia).mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\norwegian trambling lesbian girls leather (Jenna).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\brasilian gay voyeur upskirt .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\danish bukkake several models young (Ashley).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\asian horse horse public pregnant .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\british lingerie catfight .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\fetish lesbian [free] feet YEâPSè& .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\xxx beast sleeping pregnant .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\spanish fucking catfight femdom (Ashley,Jade).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\british nude fucking girls nipples lady .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\malaysia kicking cum hot (!) vagina high heels .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\swedish nude beastiality lesbian balls (Karin,Sandy).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\fetish [free] traffic .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\fucking cumshot big ejaculation .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\spanish blowjob fucking licking high heels .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\indian lingerie catfight (Jade,Sonja).mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\italian handjob lesbian full movie girly .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\assembly\temp\nude nude uncut glans .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SoftwareDistribution\Download\porn lesbian sleeping femdom .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\spanish handjob fucking voyeur hole .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\brasilian fucking lesbian .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\security\templates\american sperm bukkake sleeping Ôï .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\french xxx cumshot [milf] bondage .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\brasilian horse licking .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\CbsTemp\blowjob hot (!) titts shoes (Jenna,Sarah).mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\InputMethod\SHARED\danish nude [free] granny (Sarah).zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\chinese horse girls pregnant .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\Temp\japanese bukkake licking wifey .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\danish gang bang masturbation .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\beast big circumcision .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\brasilian xxx lesbian public ash .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\brasilian gang bang catfight mature (Gina).zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\malaysia fetish horse several models .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\danish kicking full movie hairy .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\handjob fetish [bangbus] young .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\spanish sperm porn [free] .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\japanese beast [free] balls (Janette,Sonja).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\african fetish fetish licking circumcision .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\cum hot (!) beautyfull .mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\american cum fucking [milf] stockings .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\black handjob hidden upskirt .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\malaysia animal animal licking castration (Britney,Sarah).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\russian bukkake horse [free] vagina circumcision .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\chinese bukkake cumshot masturbation femdom .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\canadian fetish hot (!) vagina (Anniston,Liz).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\malaysia xxx nude [milf] sm (Jade).mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\tyrkish beastiality hot (!) ash bondage .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\hardcore beast licking latex (Sandy,Britney).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\russian blowjob hardcore catfight mature .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\canadian beastiality hot (!) legs .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\japanese cumshot action licking girly .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\brasilian kicking public .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\spanish trambling girls titts .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\african horse action public cock leather .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\italian gay [bangbus] YEâPSè& (Melissa).rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\tyrkish lesbian animal licking .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\gang bang horse public upskirt (Britney).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\norwegian porn [milf] .rar.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\handjob action sleeping feet bedroom .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\japanese gang bang [milf] traffic .avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\italian xxx handjob uncut legs (Samantha,Sonja).avi.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\japanese animal sleeping boobs bedroom .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\hardcore [milf] .mpg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\asian bukkake [milf] .zip.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\horse several models leather (Sarah,Sonja).mpeg.exe 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3108 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 620 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1416 wrote to memory of 3324 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 89 PID 1416 wrote to memory of 3324 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 89 PID 1416 wrote to memory of 3324 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 89 PID 1416 wrote to memory of 620 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 90 PID 1416 wrote to memory of 620 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 90 PID 1416 wrote to memory of 620 1416 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 90 PID 3324 wrote to memory of 3108 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 91 PID 3324 wrote to memory of 3108 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 91 PID 3324 wrote to memory of 3108 3324 45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"C:\Users\Admin\AppData\Local\Temp\45580b527b07ed2a7f9f09a23f6f51cbb8789f7060798a0ca085cbbabce5dcc8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\french kicking hidden upskirt (Sarah,Anniston).zip.exe
Filesize424KB
MD5ee1fc2e98ec91c3ecb99c98321fd867e
SHA10e212d6751559b45f646fd54fb3e5368b91d685d
SHA256144556975cf2e9e2e57363776ff9e603918f10b9df942ae80a44feef8d676e24
SHA5121d90c3c9122d57ddc207bb51a417fbf738c80bb7baeb8043d4474403b4f7210265d664392b65d6a8da1641d348c3c527b05c1789de41797a9b944a3c89d590fb