Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:39
Behavioral task
behavioral1
Sample
b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe
Resource
win10v2004-20240508-en
General
-
Target
b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe
-
Size
1.3MB
-
MD5
3aae777e2adefc6d2b8b11af37e61680
-
SHA1
7b37e9cac7e2860720eaee087c679e5d0577a0e4
-
SHA256
b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43
-
SHA512
80a8deb1300c9fc858c1d204a1e2edaaec46e4d9d12c0bff9d621e65b4d5e44a91b635e289894c921e42a3f6acbc19da55e3d5c4219474201d49066473a2b7c0
-
SSDEEP
24576:bH3TFIqFB2TcMzMKgSJF4ZaXTYvOrxQ6GgGg2pMCKlNVZ0+dI/xdL1tPl:j3TFIqFB24MAKfJCviRRGg2pgjVZ9Ubl
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 2 IoCs
resource yara_rule behavioral1/memory/2828-62-0x0000000000400000-0x0000000000429000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1640-91-0x0000000000400000-0x0000000000429000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/files/0x000700000001431b-5.dat UPX behavioral1/memory/2828-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2828-90-0x0000000001EE0000-0x0000000001F09000-memory.dmp UPX behavioral1/memory/1640-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x000700000001431b-5.dat upx behavioral1/memory/2828-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-90-0x0000000001EE0000-0x0000000001F09000-memory.dmp upx behavioral1/memory/1640-91-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\Q: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\R: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\S: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\Z: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\X: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\E: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\G: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\I: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\J: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\O: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\A: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\B: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\M: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\T: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\V: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\W: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\Y: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\H: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\K: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\L: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\N: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File opened (read-only) \??\U: b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\french lingerie bukkake voyeur mature .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\config\systemprofile\animal sleeping blondie .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\american fetish gay full movie black hairunshaved .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\config\systemprofile\gay big redhair .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\FxsTmp\cumshot gang bang big boobs mistress .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\IME\shared\horse [bangbus] hairy .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\asian action hidden cock (Gina).mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\FxsTmp\cum gay uncut titts lady .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\IME\shared\horse kicking public latex .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\japanese hardcore voyeur castration .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\animal gay uncut bondage (Sandy).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\british lingerie [milf] fishy .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files\Windows Journal\Templates\beast several models .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\fucking trambling [bangbus] penetration .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\russian animal hot (!) mistress .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files\DVD Maker\Shared\lingerie public .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Common Files\microsoft shared\spanish handjob nude uncut .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Google\Update\Download\french action animal [free] wifey (Anniston,Gina).mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\fucking handjob voyeur .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files\Common Files\Microsoft Shared\fucking handjob uncut sweet .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\asian xxx hardcore public ash (Jenna,Sonja).zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\chinese horse trambling public .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Google\Temp\xxx xxx [milf] sweet .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Microsoft Office\Templates\fucking hidden vagina .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\animal handjob masturbation feet .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\lesbian hot (!) sweet .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\handjob full movie vagina .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\mssrv.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\beast uncut black hairunshaved .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\canadian lesbian sperm lesbian .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\fucking public hairy (Janette).mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_9498b282333b64ec\kicking gang bang licking .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\french gang bang masturbation (Curtney,Samantha).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\action girls glans .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\norwegian trambling beastiality sleeping boobs .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\PLA\Templates\gang bang cumshot hot (!) .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\blowjob blowjob public YEâPSè& .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\gang bang licking .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_6.1.7600.16385_none_2958d4a31d2ec64f\chinese blowjob hardcore hot (!) bedroom (Melissa).mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\trambling uncut .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\ZAP9E41.tmp\african beast gang bang licking .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\spanish xxx uncut legs .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\horse several models .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_60a2cbbf935c42b4\german hardcore bukkake uncut .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_dd18b2a07d49aa11\french fetish hidden .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\temp\cum animal hidden hole (Kathrin).mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\action licking .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\black trambling masturbation nipples .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\Temp\african handjob handjob big (Curtney,Sonja).mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\american fetish catfight mature (Sarah).mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\british lingerie blowjob [bangbus] fishy .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\french horse hot (!) glans .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_bacc7ceffc55dca2\brasilian lesbian cum voyeur .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_4d274741486b900c\animal kicking hidden cock sweet .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\handjob gang bang sleeping .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\american animal public .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\nude gay hot (!) .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\canadian porn licking .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\tmp\tyrkish lingerie hidden blondie (Jade).rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\german fetish masturbation vagina upskirt .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\porn beastiality [bangbus] (Janette,Karin).zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\chinese cum horse [milf] ash YEâPSè& .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\japanese horse trambling hidden YEâPSè& .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_7f84cd98a7a56fd8\german porn [free] (Anniston,Sonja).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\beastiality big vagina .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\SoftwareDistribution\Download\japanese lesbian porn sleeping latex (Liz,Karin).mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\sperm lesbian .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\nude masturbation hairy (Jade,Melissa).rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\japanese action action catfight ash wifey .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\animal animal uncut fishy .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\canadian horse [bangbus] titts (Ashley,Anniston).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aea650787d30ed8a\asian porn full movie ash mistress .mpeg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\chinese beast public vagina .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\japanese lingerie xxx masturbation (Samantha,Sandy).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\beastiality voyeur mistress .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\bukkake girls lady .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\swedish trambling animal [milf] (Sandy).zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_f0ca3430257ea13f\canadian fetish animal masturbation .mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\brasilian action lingerie [milf] upskirt .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_d8216ed3d8746200\horse fetish big 40+ .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\japanese trambling girls ash lady (Samantha).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\russian action catfight ash .avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\horse horse voyeur shoes .rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_en-us_00f45b041e1e8fd3\blowjob nude hot (!) hotel .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\horse bukkake sleeping (Karin,Sandy).mpg.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_97a45841ff925aa0\porn hot (!) YEâPSè& .zip.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\chinese kicking beastiality hidden (Sandy,Curtney).rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\hardcore lesbian latex (Karin).rar.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\norwegian blowjob action masturbation (Sarah,Sonja).avi.exe b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 1640 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2828 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 28 PID 2292 wrote to memory of 2828 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 28 PID 2292 wrote to memory of 2828 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 28 PID 2292 wrote to memory of 2828 2292 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 28 PID 2828 wrote to memory of 1640 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 29 PID 2828 wrote to memory of 1640 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 29 PID 2828 wrote to memory of 1640 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 29 PID 2828 wrote to memory of 1640 2828 b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe"C:\Users\Admin\AppData\Local\Temp\b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe"C:\Users\Admin\AppData\Local\Temp\b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe"C:\Users\Admin\AppData\Local\Temp\b8bd483bc39ffb5f8cb6cd843664ea412dadf786f6860e59508c80a3d5bf6f43.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5e35adf35da56a013f8296eb8c6f5eb88
SHA1e9fdede140a6501ac332dadc68f249bd761e3af8
SHA2569bf85914bdb0bd61e603edf323f374a85a22302384a0ea9f0f06f6c75ae39c21
SHA5125545e25c35bf8f4933f97629b16eef67065904a137cc5e7583f33bef52d2de9c3508afdca102a6d1d75ed5b3ed172f01a48b2a3af687ee76e75409abe7e15c83