Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 00:39
Behavioral task
behavioral1
Sample
969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe
Resource
win10v2004-20240508-en
General
-
Target
969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe
-
Size
126KB
-
MD5
40832d399b6b6836da4d7f7f27a40da5
-
SHA1
8418d9584e73c3e6da743298534189edb230c89a
-
SHA256
969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571
-
SHA512
81ca2a12529a0097e73c50eb1647bb26a96bccd1c7e668ec42f2eaaf7c28606e5fb24bfd28ba0f491eb84ef23681a2dbd880f2f637fe915ef4f1d8933f2d0e9a
-
SSDEEP
3072:gjbLl/gvQoutp1Tj4mYWR/RYn7s1p4AoZcgsBRB:gjluQoS3Io5RYn7y6Rmn
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/2336-143-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1976-142-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-179-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1368-180-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1976-181-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2336-182-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-183-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-186-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-191-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-201-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-205-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-210-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-214-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-218-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-222-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-226-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-230-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-234-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-238-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4444-242-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 23 IoCs
resource yara_rule behavioral2/memory/4444-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/files/0x00070000000233f2-5.dat UPX behavioral2/memory/1368-18-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/2336-143-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1976-142-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-179-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1368-180-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/1976-181-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/2336-182-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-183-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-186-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-191-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-201-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-205-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-210-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-214-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-218-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-222-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-226-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-230-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-234-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-238-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/4444-242-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4444-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x00070000000233f2-5.dat upx behavioral2/memory/1368-18-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2336-143-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1976-142-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-179-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1368-180-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1976-181-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2336-182-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-183-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-186-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-191-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-201-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-205-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-210-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-214-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-218-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-222-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-226-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-230-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-234-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-238-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4444-242-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\J: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\R: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\T: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\B: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\M: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\N: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\U: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\W: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\X: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\Z: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\H: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\G: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\K: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\P: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\Q: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\S: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\E: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\L: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\O: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\V: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\Y: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File opened (read-only) \??\A: 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\lingerie blowjob girls feet pregnant (Liz).mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\IME\SHARED\cum uncut ¼ë .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\cum lesbian girls .mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\handjob trambling hidden boobs .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\blowjob lesbian sleeping cock Œã .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\porn big hotel .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\config\systemprofile\british action gay girls mature .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\System32\DriverStore\Temp\beast hidden 40+ (Sarah,Jenna).rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\spanish beast catfight lady .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\IME\SHARED\british lesbian lingerie catfight upskirt .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\config\systemprofile\gay licking cock ¼ë .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SysWOW64\FxsTmp\beast licking (Sarah,Jenna).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\spanish porn horse lesbian (Curtney,Sonja).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Google\Update\Download\tyrkish blowjob xxx catfight glans .mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\norwegian handjob porn sleeping hole (Sarah,Liz).mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\dotnet\shared\fucking horse big boobs pregnant .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\british lesbian horse uncut legs (Britney,Jenna).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Microsoft Office\Updates\Download\blowjob kicking [free] femdom .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\british trambling fetish [free] .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\russian trambling girls sweet (Curtney,Christine).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\hardcore nude uncut shower (Kathrin,Jenna).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Microsoft Office\root\Templates\japanese horse public young (Christine,Sylvia).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\bukkake hot (!) feet gorgeoushorny .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\african handjob blowjob big lady .mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Google\Temp\nude hardcore girls .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Common Files\microsoft shared\french horse masturbation .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\asian horse lesbian .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\british porn lesbian cock mature .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\sperm horse uncut (Christine,Liz).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\InputMethod\SHARED\indian sperm big .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\brasilian horse horse masturbation ash (Sonja).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\american kicking trambling sleeping leather (Britney,Gina).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\CbsTemp\bukkake [milf] circumcision .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\chinese animal [free] latex (Tatjana).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\danish gang bang lesbian 50+ .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\swedish horse hot (!) .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\black cum lingerie masturbation leather (Samantha,Samantha).rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\xxx gay hot (!) boobs femdom .mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\russian gay blowjob uncut .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\bukkake sperm catfight black hairunshaved (Sonja).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\black cum masturbation black hairunshaved (Jenna).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\gay lesbian (Sandy,Gina).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\trambling hot (!) balls .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\british horse licking Ôï (Jenna,Sonja).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\horse girls young .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\blowjob catfight boots (Melissa).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\gay licking legs hairy (Sylvia,Anniston).rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\action hidden glans shower (Sonja,Ashley).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\beastiality [free] .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\malaysia blowjob horse lesbian nipples penetration .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\gay [free] (Sonja).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\italian horse licking (Samantha,Anniston).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\horse [free] hole wifey .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\lingerie [bangbus] ash (Sylvia,Tatjana).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\italian hardcore [milf] titts .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\danish nude nude [bangbus] nipples traffic .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\japanese bukkake hardcore hidden hole girly .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\german trambling sleeping circumcision .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\american porn licking ejaculation (Sonja,Karin).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\action hardcore uncut (Janette).mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.546_none_a93e4a2569276206\spanish handjob hidden .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_6115038ba57fcb33\beastiality big (Sylvia).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\spanish lesbian uncut sm .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\spanish trambling catfight vagina wifey .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\sperm fucking lesbian feet pregnant .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\african beast sperm public legs (Karin,Sonja).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\sperm girls .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\horse action big beautyfull (Sylvia,Jade).avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\brasilian lingerie cumshot [bangbus] boobs .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\horse cumshot [bangbus] beautyfull .mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\indian fetish fucking hot (!) .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\canadian bukkake several models cock (Karin,Anniston).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\german action [milf] cock fishy .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\brasilian xxx cumshot voyeur .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\indian blowjob blowjob voyeur nipples fishy (Janette,Sonja).mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\tyrkish lesbian kicking masturbation ash ejaculation .rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\black gay blowjob sleeping feet sweet .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\xxx masturbation high heels .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\danish gay public .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\swedish porn licking boobs balls .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\chinese handjob full movie ash YEâPSè& .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\handjob nude [milf] ash (Christine).rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\american cumshot lesbian several models hole fishy .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\porn nude big titts blondie (Sandy).zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\spanish lesbian cumshot [bangbus] ash (Jenna).rar.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\kicking catfight cock .mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\beast gay [bangbus] .avi.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\african porn gang bang uncut swallow (Jenna).mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\japanese lingerie cum several models .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\handjob full movie .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\bukkake masturbation (Curtney,Samantha).mpeg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\british xxx porn catfight ash 50+ .mpg.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\russian beast [milf] .zip.exe 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 2336 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 1976 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1368 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 84 PID 4444 wrote to memory of 1368 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 84 PID 4444 wrote to memory of 1368 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 84 PID 4444 wrote to memory of 1976 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 85 PID 4444 wrote to memory of 1976 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 85 PID 4444 wrote to memory of 1976 4444 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 85 PID 1368 wrote to memory of 2336 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 86 PID 1368 wrote to memory of 2336 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 86 PID 1368 wrote to memory of 2336 1368 969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"C:\Users\Admin\AppData\Local\Temp\969261cf1c49e4bacc9498f9ee24cea4d54ae1705839d8d7dbdd5c30f8dd1571.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\spanish porn horse lesbian (Curtney,Sonja).avi.exe
Filesize2.0MB
MD539212a9db60ea8c563cd955dc515d2af
SHA14c9589c15c4d8144272515d5770a8d49b23a518e
SHA256176c328a9bdd5d83057abca71442ad30abf0c8b9dddef0a72a3db517c4ccd36b
SHA51249c25d209bfe35bd4ff1f6c5dfc91001d07d5008b1c1262f4bf18b2520ac24cfbad269da93e9318618279aa655e62db5a2d70d569698fc6c72291178162dbe81