Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 23:07
Behavioral task
behavioral1
Sample
5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe
Resource
win10v2004-20240426-en
General
-
Target
5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe
-
Size
1.3MB
-
MD5
92b015956231f43ac7238abd139b1f1e
-
SHA1
0b215d356d83c2adf80938ffd2fc071507f3959f
-
SHA256
5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42
-
SHA512
f2a48ddb7158250a5ce6e7c40478b29f539c97d9cb754212b790ff208f7d0f531124be90dcbc65031746f89024769b25d558bebfb603447c2ed26cc0986e5be8
-
SSDEEP
24576:gKuwrXOk+oKl0e/FinAPJzxkuKyd0fIH+Gf6gbVU3kK:eAXOk+Vl9tnzxklyd2IeGY3D
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
resource yara_rule behavioral2/memory/5092-14-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4056-151-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-181-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4056-183-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3400-184-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-186-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-187-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-193-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-203-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-207-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-212-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-216-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-220-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-224-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-228-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-232-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-236-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-240-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1988-244-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/1988-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/files/0x000a000000023363-5.dat UPX behavioral2/memory/5092-14-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4056-151-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-181-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4056-183-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3400-184-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-186-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-187-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-193-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-203-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-207-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-212-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-216-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-220-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-224-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-228-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-232-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-236-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-240-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1988-244-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1988-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x000a000000023363-5.dat upx behavioral2/memory/5092-14-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4056-151-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-181-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4056-183-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3400-184-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-186-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-187-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-193-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-203-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-207-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-212-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-216-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-220-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-224-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-228-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-232-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-236-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-240-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1988-244-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\B: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\S: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\T: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\V: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\Z: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\X: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\G: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\K: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\L: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\N: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\Q: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\W: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\R: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\U: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\H: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\I: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\J: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\M: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\O: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\P: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\Y: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File opened (read-only) \??\E: 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\horse hot (!) castration .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\config\systemprofile\american nude gay [bangbus] femdom .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\FxsTmp\american porn lesbian full movie .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\IME\SHARED\black horse lingerie lesbian cock boots (Curtney).zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian porn blowjob masturbation gorgeoushorny .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\config\systemprofile\blowjob [milf] .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\FxsTmp\canadian lesbian [bangbus] cock Ôï (Sarah).rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\fucking [bangbus] pregnant .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake [bangbus] hairy .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\System32\DriverStore\Temp\japanese kicking fucking catfight feet (Sonja,Karin).mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\IME\SHARED\nude blowjob [milf] wifey .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\japanese gang bang hardcore public hole balls (Liz).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\blowjob voyeur hole YEâPSè& .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\dotnet\shared\porn sperm girls mature (Anniston,Sarah).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\italian handjob xxx several models feet blondie .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\indian beastiality lesbian hidden (Sarah).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\indian kicking sperm [bangbus] young .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\american nude beast lesbian (Sarah).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\fucking voyeur titts mature .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\american action bukkake full movie ash .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Google\Update\Download\lingerie voyeur feet .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Microsoft\Temp\italian nude lesbian hidden feet .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Microsoft Office\root\Templates\russian animal lingerie [bangbus] balls .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\sperm girls feet latex .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Microsoft Office\Updates\Download\brasilian nude sperm masturbation wifey .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\beastiality beast voyeur hole girly (Jade).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\danish fetish hardcore sleeping cock wifey .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Google\Temp\japanese gang bang trambling several models black hairunshaved .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\brasilian kicking trambling voyeur .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\russian beastiality beast masturbation mistress .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\chinese trambling catfight glans boots (Melissa).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\beast licking black hairunshaved (Gina,Karin).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\spanish bukkake hot (!) glans .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\tyrkish cumshot hardcore uncut leather .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\british bukkake licking cock .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\canadian gay several models (Jade).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\CbsTemp\hardcore masturbation .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\brasilian horse beast voyeur cock .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\danish animal horse licking (Janette).mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\trambling public shoes .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\fucking [bangbus] swallow .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\russian beastiality lingerie licking (Tatjana).zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\lingerie uncut .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\danish beastiality lingerie masturbation titts .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\gay lesbian hole wifey (Liz).rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\horse bukkake [milf] young .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\brasilian nude xxx masturbation (Samantha).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\spanish blowjob lesbian granny .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\sperm big .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\malaysia beast licking hole .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\german trambling hot (!) redhair .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\lingerie masturbation hole blondie (Jade).mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\PLA\Templates\japanese porn beast [free] hole boots (Sylvia).zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\danish nude xxx full movie titts .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\german bukkake hot (!) .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\lingerie lesbian (Melissa).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\security\templates\trambling [milf] granny .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\british blowjob hidden black hairunshaved (Sandy,Curtney).mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\chinese lesbian [bangbus] .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\danish handjob xxx several models feet blondie .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\indian handjob lesbian several models upskirt (Gina,Karin).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\brasilian nude hardcore girls cock black hairunshaved .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\cumshot sperm full movie .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\russian action sperm full movie (Melissa).rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\norwegian lingerie hot (!) leather .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\swedish nude blowjob several models YEâPSè& .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\nude xxx uncut young .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\mssrv.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\russian horse xxx girls glans balls .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\norwegian trambling full movie girly .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\fucking [free] (Sylvia).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\black action blowjob uncut bedroom .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\tyrkish horse sperm uncut YEâPSè& .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\japanese cumshot gay catfight feet granny (Curtney).zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\italian animal gay catfight glans stockings .zip.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\sperm public cock lady .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\swedish handjob blowjob [free] young .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\brasilian horse xxx voyeur titts .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\norwegian gay licking bondage .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\german hardcore masturbation young .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\cum horse voyeur feet .avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\asian trambling masturbation glans .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\african gay catfight black hairunshaved .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\african blowjob catfight hole (Gina,Sylvia).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\handjob hardcore hot (!) (Curtney).rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\kicking lingerie big (Liz).mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\spanish beast uncut 50+ .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\black cumshot bukkake sleeping cock .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\horse catfight (Janette).avi.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\action xxx hidden glans .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\sperm sleeping hole lady .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\swedish beastiality xxx several models hole circumcision .mpg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\brasilian cumshot gay hot (!) bondage .mpeg.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\american gang bang bukkake public latex .rar.exe 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 3400 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 4056 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1988 wrote to memory of 5092 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 86 PID 1988 wrote to memory of 5092 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 86 PID 1988 wrote to memory of 5092 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 86 PID 5092 wrote to memory of 4056 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 88 PID 5092 wrote to memory of 4056 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 88 PID 5092 wrote to memory of 4056 5092 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 88 PID 1988 wrote to memory of 3400 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 89 PID 1988 wrote to memory of 3400 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 89 PID 1988 wrote to memory of 3400 1988 5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
-
C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"C:\Users\Admin\AppData\Local\Temp\5f2ac3e28c9819ed8d920a323bc71cb4842b6ad76833576c3e8fc16001e73f42.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\danish fetish hardcore sleeping cock wifey .mpeg.exe
Filesize1.2MB
MD58079b115ad7f4dd7540466fa56077159
SHA18a57ee24aa982af35b80963ab04411daf53386b6
SHA2565d221091d0d5ae721664e24c529f070223efaebcf8c50ccee3cbfe66ea8853f0
SHA512f14d9c65ce7a5e6c3131b914a9dc77e23dd35fb56897f65e33cd7b5b56a3c121a0d6b2b7f7111e4f36b71ed59524adde62fd76a894adf2d497a5660c660caa71