Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:46
Behavioral task
behavioral1
Sample
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe
Resource
win10v2004-20240508-en
General
-
Target
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe
-
Size
675KB
-
MD5
7095f6e00bd1e869a17ddd41c9c868ef
-
SHA1
cbc2edf03e789d03f036b218881afb007ba60c1e
-
SHA256
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034
-
SHA512
95b903f9c120bc301fa85d370f9440e201b38f9661bd7b3d9d543b92975bf517554eb43b87860e352abe9236de314ff6cc7b3484e12d0d728803728808d5cf63
-
SSDEEP
12288:0EQoSClIFG4ZqbVM7DuWYWJc4LI5qoCmAmQ5aNtff69RVsAo4bJ/:0kIUcqBiDujWgSwQ5E1f6OAoo
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
Processes:
resource yara_rule behavioral2/memory/1008-19-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-178-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1008-179-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1232-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-182-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-184-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-200-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-204-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-207-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-213-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-216-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-219-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-225-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral2/memory/228-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian fetish hot (!) (Karin).mpeg.exe UPX behavioral2/memory/1008-19-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1232-146-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-178-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1008-179-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1232-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-182-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-184-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-200-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-204-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-207-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-213-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-216-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-219-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-225-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/228-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/228-0-0x0000000000400000-0x000000000041E000-memory.dmp upx C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian fetish hot (!) (Karin).mpeg.exe upx behavioral2/memory/1008-19-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1232-146-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-178-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1008-179-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1232-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-182-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-184-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-200-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-216-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/228-228-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription ioc process File opened (read-only) \??\G: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\Y: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\B: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\H: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\I: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\K: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\V: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\E: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\L: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\N: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\W: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\Q: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\R: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\S: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\A: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\J: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\M: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\O: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\P: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\T: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\U: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\X: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File opened (read-only) \??\Z: 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Drops file in System32 directory 12 IoCs
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription ioc process File created C:\Windows\System32\LogFiles\Fax\Incoming\tyrkish bukkake animal catfight nipples fishy .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\handjob [bangbus] shoes .mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\canadian trambling action several models titts leather .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\config\systemprofile\asian animal lingerie [milf] ¼ë .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\FxsTmp\malaysia blowjob horse catfight ash (Samantha).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\IME\SHARED\russian beast hot (!) wifey (Janette).rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\config\systemprofile\black blowjob voyeur legs .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\System32\DriverStore\Temp\russian cumshot bukkake voyeur swallow .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\FxsTmp\beast cumshot sleeping titts hairy (Samantha,Sonja).mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\IME\SHARED\italian hardcore blowjob several models beautyfull .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\french xxx cum hot (!) circumcision .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\nude fetish hot (!) .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Drops file in Program Files directory 18 IoCs
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription ioc process File created C:\Program Files (x86)\Google\Update\Download\african cumshot [free] hole (Curtney,Anniston).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\black sperm [milf] .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\indian beastiality blowjob hot (!) hotel .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Microsoft Office\root\Templates\horse several models feet castration .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian fetish hot (!) (Karin).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\beast several models pregnant .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\beast lesbian mature .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Google\Temp\asian fucking lingerie hidden .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\russian lingerie [milf] (Curtney).mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Common Files\microsoft shared\asian bukkake catfight circumcision .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\cum licking (Christine,Liz).rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\spanish porn beastiality big vagina .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\horse hot (!) hole .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\fucking girls latex .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files (x86)\Microsoft\Temp\nude hidden 40+ .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\dotnet\shared\kicking hidden legs mature .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\black horse licking (Anniston).rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Program Files\Microsoft Office\Updates\Download\japanese trambling several models (Anniston,Kathrin).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Drops file in Windows directory 64 IoCs
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription ioc process File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\cumshot hot (!) hole .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\nude hardcore [bangbus] legs (Christine).mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\american kicking hidden .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\american trambling masturbation .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\brasilian blowjob fetish full movie 40+ .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\assembly\temp\action blowjob hot (!) leather .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\norwegian gay animal hot (!) (Tatjana).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\german porn girls ash femdom .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\swedish fetish sleeping .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\kicking [bangbus] .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\canadian porn [milf] blondie (Janette,Gina).rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\hardcore big feet (Tatjana,Gina).rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\bukkake lingerie voyeur feet sm .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\cumshot voyeur circumcision .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\fucking [milf] .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\american lingerie hidden YEâPSè& .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\fucking [bangbus] leather .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\hardcore hidden .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\swedish xxx voyeur (Tatjana).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\american sperm catfight granny .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\brasilian horse handjob catfight feet hotel .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_a4327320c19e2fa7\kicking handjob lesbian .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\horse [milf] (Britney,Janette).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\italian fetish kicking [free] black hairunshaved .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_67a96afcfa248327\indian porn girls granny .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\asian fetish sleeping .mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\porn masturbation .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\nude uncut cock .mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\japanese lingerie beast public latex .mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\handjob licking hole ejaculation (Sandy,Karin).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\swedish beastiality gang bang hot (!) titts hairy (Britney).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\sperm girls YEâPSè& .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\nude trambling uncut circumcision (Karin).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\indian beast horse hot (!) .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\american cum xxx catfight .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\asian beast animal voyeur vagina .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\cumshot lingerie catfight (Sonja,Sylvia).mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\spanish gang bang animal [milf] titts .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\CbsTemp\action trambling public stockings .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\fucking horse several models blondie .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\italian cumshot lesbian sleeping hairy (Anniston,Karin).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\asian animal [free] high heels .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\malaysia fetish hidden .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\horse [bangbus] swallow .rar.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\blowjob licking pregnant .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\black cum xxx voyeur (Britney).avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\japanese lesbian hidden girly .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\asian trambling hot (!) vagina mature (Samantha,Karin).avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\russian fucking lingerie girls stockings .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\indian nude girls gorgeoushorny (Jade,Sandy).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\japanese cum licking castration (Sarah,Sarah).mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\nude handjob hot (!) titts fishy .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\beastiality hardcore [milf] titts (Jenna).zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\beast fucking lesbian blondie .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\chinese handjob animal several models femdom .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\fucking lesbian masturbation .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\fetish beast catfight boobs bedroom .mpeg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\xxx full movie latex (Karin).avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\spanish nude xxx voyeur nipples lady .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\spanish lesbian porn [bangbus] .avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\asian bukkake animal full movie boobs penetration .mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\xxx gay lesbian lady .zip.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\british horse nude hidden feet mature (Samantha,Sylvia).avi.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe File created C:\Windows\InputMethod\SHARED\beast gang bang [free] .mpg.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exepid process 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 1232 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exedescription pid process target process PID 228 wrote to memory of 1008 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe PID 228 wrote to memory of 1008 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe PID 228 wrote to memory of 1008 228 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe PID 1008 wrote to memory of 1232 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe PID 1008 wrote to memory of 1232 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe PID 1008 wrote to memory of 1232 1008 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe 7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe"C:\Users\Admin\AppData\Local\Temp\7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe"C:\Users\Admin\AppData\Local\Temp\7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe"C:\Users\Admin\AppData\Local\Temp\7de94cd9debc9768c1291f7e9cb885adea6c0767d6986d97edaae57485fbb034.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian fetish hot (!) (Karin).mpeg.exe
Filesize472KB
MD5168811b6b37cd3f028384bcbe76a1628
SHA1ab07945221509c9725c194084bb78ce53460923e
SHA25681b6714868f92cdb536b63d8612fb37ca2f34b37ef683da0ed54c4e9f042cb69
SHA512d51a48e9151f6fac666598c1dfe45356acf5636bfdd89293dbcac30595b7ff895330f4a71f460a0b7e56976e25c658309a56f05e8d1d18d764fcd6b0e2746dee