Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 20:45
Behavioral task
behavioral1
Sample
42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe
Resource
win10v2004-20240508-en
General
-
Target
42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe
-
Size
715KB
-
MD5
6b0f9a128dc57bec79780737202c9053
-
SHA1
80770fe8f5efca25aee32d13a85734d63d36e566
-
SHA256
42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc
-
SHA512
4f5b92746a5a2091ae41c3492b0ad61492072afe2ea556eb4a79c1b79ff187f3b695855a6b84ed32ee7c86ba31eda4656bd7b295ce4eda4ff524dae6ca92835d
-
SSDEEP
12288:JEyDMhqhKkVsnnMKnaOPJaBtnVimOZzeMAO4t/h9NcPGb7wYWu/Qo5cvon:JBOMKnaOPJanxqqLtx7NcPG/Yu/Qa
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/3228-11-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5052-131-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-171-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3228-172-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2416-174-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5052-173-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-175-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-176-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-181-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-201-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-209-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-218-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-226-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4740-234-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/4740-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x000700000002342d-5.dat UPX behavioral2/memory/3228-11-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5052-131-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-171-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3228-172-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2416-174-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5052-173-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-175-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-176-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-181-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-201-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-209-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-218-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-226-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4740-234-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4740-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000700000002342d-5.dat upx behavioral2/memory/3228-11-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5052-131-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-171-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3228-172-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2416-174-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5052-173-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-175-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-176-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-181-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4740-234-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\A: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\H: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\J: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\L: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\P: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\B: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\X: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\Q: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\W: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\Y: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\E: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\G: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\I: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\K: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\N: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\Z: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\V: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\M: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\O: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\R: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\T: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File opened (read-only) \??\U: 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian horse lesbian [milf] feet leather .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\IME\SHARED\black cumshot lesbian several models cock girly .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish nude blowjob several models (Curtney).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\System32\DriverStore\Temp\japanese horse hardcore catfight hole .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\IME\SHARED\blowjob masturbation feet .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\indian nude fucking sleeping bondage .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\xxx full movie cock .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\tyrkish nude lingerie catfight bondage .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese gang bang lingerie catfight feet .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\FxsTmp\lesbian licking (Curtney).avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\config\systemprofile\swedish cumshot lesbian several models cock (Anniston,Karin).rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SysWOW64\FxsTmp\italian action horse [bangbus] ejaculation .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\blowjob voyeur upskirt .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\brasilian cumshot lesbian licking gorgeoushorny .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Microsoft Office\Updates\Download\black cum fucking several models swallow .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\russian porn horse voyeur black hairunshaved .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\russian nude trambling masturbation ejaculation .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Google\Temp\american action horse public hole .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Google\Update\Download\fucking [milf] bondage .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Microsoft Office\root\Templates\lingerie lesbian titts hairy .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\kicking trambling catfight (Karin).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\american handjob trambling [free] (Tatjana).mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\xxx public .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\xxx uncut YEâPSè& (Britney,Liz).avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\tyrkish kicking sperm big redhair (Kathrin,Karin).mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\danish nude hardcore hidden sm (Anniston,Jade).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files\Common Files\microsoft shared\beast [free] glans ejaculation .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\russian porn xxx voyeur .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\japanese nude horse licking lady .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Program Files (x86)\Microsoft\Temp\black fetish sperm public feet ash .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\fucking [free] (Samantha).rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\italian action blowjob public (Samantha).avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\Temp\bukkake [milf] .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\malaysia hardcore several models blondie .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\italian animal blowjob lesbian ash .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\hardcore [free] titts fishy .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\indian horse lesbian [free] .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\japanese animal horse catfight .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\swedish kicking xxx lesbian (Janette).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\norwegian xxx girls hole .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\beastiality lingerie masturbation titts blondie (Tatjana).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\danish action lesbian [free] sweet .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_a4f93129c473df49\hardcore masturbation Ôï (Britney,Tatjana).rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\sperm girls redhair .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\canadian fucking hidden .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\bukkake [milf] .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\russian horse bukkake sleeping (Samantha).rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\norwegian hardcore several models (Tatjana).mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\bukkake hot (!) glans redhair .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\xxx catfight (Sarah).mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\african gay public cock stockings .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\black action bukkake several models Ôï .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\handjob hardcore [free] beautyfull .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\nude blowjob public boots (Sonja,Melissa).mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\cum hardcore catfight feet .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\malaysia gay [free] titts swallow .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\kicking blowjob full movie black hairunshaved .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\danish action gay catfight .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\horse uncut hole fishy (Melissa).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\tyrkish handjob gay voyeur hole sm .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\handjob gay [milf] feet .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\japanese animal blowjob licking titts ash .rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\russian animal beast lesbian .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\tyrkish porn xxx full movie 40+ (Christine,Samantha).avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\bukkake [milf] titts sweet (Janette).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\indian action beast girls .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\chinese bukkake big black hairunshaved .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\british bukkake masturbation granny .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\tyrkish animal trambling sleeping (Karin).rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\malaysia fucking [bangbus] cock gorgeoushorny (Melissa).rar.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\animal xxx girls titts beautyfull .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\porn gay uncut .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\spanish bukkake public titts sweet (Karin).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\animal lesbian public hole traffic (Karin).mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\french sperm [milf] titts Ôï .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\indian fetish trambling catfight cock gorgeoushorny .zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\german bukkake hot (!) penetration .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\bukkake several models titts .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\tyrkish nude lingerie full movie .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\spanish trambling big cock .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\danish porn fucking masturbation .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\malaysia hardcore big titts .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\chinese xxx full movie .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\chinese lesbian [free] feet high heels (Samantha).mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\horse masturbation cock .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\xxx uncut hole high heels (Curtney).mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\lesbian several models castration (Gina,Melissa).avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\canadian lingerie masturbation high heels .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\beastiality xxx sleeping feet fishy (Melissa).zip.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\french gay [free] .avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\spanish bukkake big (Jade).avi.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\CbsTemp\italian gang bang trambling [bangbus] hole 50+ .mpeg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\security\templates\danish kicking beast [milf] hole shower .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\british lingerie several models .mpg.exe 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 2416 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 5052 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4740 wrote to memory of 3228 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 87 PID 4740 wrote to memory of 3228 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 87 PID 4740 wrote to memory of 3228 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 87 PID 4740 wrote to memory of 5052 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 89 PID 4740 wrote to memory of 5052 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 89 PID 4740 wrote to memory of 5052 4740 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 89 PID 3228 wrote to memory of 2416 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 90 PID 3228 wrote to memory of 2416 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 90 PID 3228 wrote to memory of 2416 3228 42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
-
C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"C:\Users\Admin\AppData\Local\Temp\42d289298d77ae686f161504ff219f2c2facf89d43ca29e93501dfe382ffefcc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\kicking trambling catfight (Karin).zip.exe
Filesize93KB
MD5980112ab97f6b635bd1e8077f7ea31bf
SHA13fdd27b15aaab31136f160c9628c2050c5bb0314
SHA256c3abacadbcf4d8cc487786e451f114e262bb34f6c3eab4bf4a7d5bbeca23e2d0
SHA512b4f75e64c5232093b0678252e9ea2477ec2c8b10d08aa9dd9a1a7094befc9940c871e1991e472c99ac13534ca42b12cb0906fd56e124b28d514d63dfd4d193c5